
Malicious ML models discovered on Hugging Face platform
Software development teams working on machine learning take note: RL threat researchers have identified nullifAI, a novel attack technique used on Hugging Face.

Software development teams working on machine learning take note: RL threat researchers have identified nullifAI, a novel attack technique used on Hugging Face.

Learn how RL's Advanced Malware Analysis can help your organization move beyond the sandbox to better guard against malicious files.

Here are key practices you must implement to protect container workloads — and new controls needed for all software — in the age of supply chain security.

When it comes to these two security approaches advanced by CISA for locking down your application security, it's not an either/or proposition. Here's why.

Identity management is key for security, but AI is bringing a lot more non-humans into the mix. The OWASP list calls attention to this. Here are the top takeaways.

AI can improve cybersecurity outcomes, but it also represents an entirely new threat. Upgrade your security strategy — and tooling — for the AI age.

The report emphasizes traditional AppSec practices — but those are no match for new threats from AI/ML. Here's what you need to know.

Here are the key reasons you should consider multi-scanning — and how ReversingLabs’s solution delivers best-of-class performance.

AI's integration across enterprise platforms is "rapidly expanding the global attack surface." Here are five action items for your team.

AppSec experts and software risk managers say doing security checks earlier isn't enough. Here's why — and what else organizations should do.

The study, from the Linux Foundation, OpenSSF, and Harvard, highlights key open-source risk areas. Here's what you need to know.

Here's what's driving the compliance-as-security trend — and why it's essential to go beyond checkbox cybersecurity amid a rapidly changing threat landscape.

Here’s what the 2024 8-K security-incident filings are all about, lessons to be learned — and the bigger picture for cybersecurity.

To avoid compromised packages being introduced as a dependency in a larger project, security teams need to keep an eye peeled for such malicious code.

Ransomware kept its stride in 2024. In 2025, threat actors are moving toward targeting key parts of the software supply chain. Here are key lessons.
Get your 14-day free trial of Spectra Assure
Get Free TrialMore about Spectra Assure Free Trial