<?xml version="1.0" encoding="UTF-8" ?>
<rss version="2.0" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:wfw="http://wellformedweb.org/CommentAPI/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <title>ReversingLabs Blog</title>
    <link>https://www.reversinglabs.com/blog</link>
    <description>Latest blog posts from ReversingLabs</description>
    <language>en-US</language>
    <pubDate>Wed, 15 Apr 2026 06:56:04 GMT</pubDate>
    <dc:date>2026-04-15T06:56:04.273Z</dc:date>
    <dc:language>en</dc:language>
    <lastBuildDate>Wed, 15 Apr 2026 06:56:04 GMT</lastBuildDate>
    <atom:link href="https://www.reversinglabs.com/blog/rss.xml" rel="self" type="application/rss+xml" />
    
    <item>
      <title><![CDATA[Why RL Built Spectra Assure Community]]></title>
      <link>https://www.reversinglabs.com/why-rl-built-spectra-assure-community</link>
      <guid>https://www.reversinglabs.com/why-rl-built-spectra-assure-community</guid>
      <pubDate>Tue, 14 Apr 2026 15:00:00 GMT</pubDate>
      <dc:date>2026-04-14T15:00:00.000Z</dc:date>
      <description><![CDATA[We set out to help dev and AppSec teams secure the village: OSS dependencies, malware, more. Learn how.]]></description>
      <dc:creator><![CDATA[Kadi McKean]]></dc:creator>
      <enclosure url="https://www.reversinglabs.com/api/media/file/Armadilo-Blog%20copy.jpg" type="image/jpeg" />
      <category><![CDATA[Products & Technology]]></category>
    </item>
    <item>
      <title><![CDATA[Graphalgo fake recruiter campaign returns]]></title>
      <link>https://www.reversinglabs.com/graphalgo-campaign-respawned</link>
      <guid>https://www.reversinglabs.com/graphalgo-campaign-respawned</guid>
      <pubDate>Thu, 09 Apr 2026 15:00:00 GMT</pubDate>
      <dc:date>2026-04-09T15:00:00.000Z</dc:date>
      <description><![CDATA[An attack targeting crypto developers has been respawned — with an LLC and new techniques to hide malware.]]></description>
      <dc:creator><![CDATA[Karlo Zanki]]></dc:creator>
      <enclosure url="https://www.reversinglabs.com/api/media/file/Graphalgo-supply-chain-campaign-respawned.jpg" type="image/jpeg" />
      <category><![CDATA[Threat Research]]></category>
    </item>
    <item>
      <title><![CDATA[Claude Mythos: Get your AppSec game on]]></title>
      <link>https://www.reversinglabs.com/mythos-ai-appsec</link>
      <guid>https://www.reversinglabs.com/mythos-ai-appsec</guid>
      <pubDate>Wed, 08 Apr 2026 18:30:00 GMT</pubDate>
      <dc:date>2026-04-08T18:30:00.000Z</dc:date>
      <description><![CDATA[Anthropic's new AI is a 'step change' for exposing software flaws — but also ramps up exploits. Are you ready for it?]]></description>
      <dc:creator><![CDATA[Ericka Chickowski]]></dc:creator>
      <enclosure url="https://www.reversinglabs.com/api/media/file/robot-ai-agents-risk.jpg" type="image/jpeg" />
      <category><![CDATA[AppSec & Supply Chain Security]]></category>
    </item>
    <item>
      <title><![CDATA[28 application security stats that matter]]></title>
      <link>https://www.reversinglabs.com/28-application-security-stats-that-matter</link>
      <guid>https://www.reversinglabs.com/28-application-security-stats-that-matter</guid>
      <pubDate>Tue, 07 Apr 2026 15:00:00 GMT</pubDate>
      <dc:date>2026-04-07T15:00:00.000Z</dc:date>
      <description><![CDATA[AI and open source are redefining the software threat landscape. Here are the key statistics you need to know.]]></description>
      <dc:creator><![CDATA[Jaikumar Vijayan]]></dc:creator>
      <enclosure url="https://www.reversinglabs.com/api/media/file/28.jpg" type="image/jpeg" />
      <category><![CDATA[AppSec & Supply Chain Security]]></category>
    </item>
    <item>
      <title><![CDATA[Axios: How AppSec teams should respond]]></title>
      <link>https://www.reversinglabs.com/axios-appsec-respond</link>
      <guid>https://www.reversinglabs.com/axios-appsec-respond</guid>
      <pubDate>Thu, 02 Apr 2026 18:05:45 GMT</pubDate>
      <dc:date>2026-04-02T18:05:45.922Z</dc:date>
      <description><![CDATA[Here's a mitigations checklist and best practices. Plus: How RL’s xBOM and Spectra Assure Community can help.]]></description>
      <dc:creator><![CDATA[Paul Roberts]]></dc:creator>
      <enclosure url="https://www.reversinglabs.com/api/media/file/axios-secure.software.png" type="image/jpeg" />
      <category><![CDATA[AppSec & Supply Chain Security]]></category>
    </item>
    <item>
      <title><![CDATA[ClickFix: YARA Rules Catch What AV Misses]]></title>
      <link>https://www.reversinglabs.com/clickfix-yara-rule</link>
      <guid>https://www.reversinglabs.com/clickfix-yara-rule</guid>
      <pubDate>Thu, 02 Apr 2026 15:00:00 GMT</pubDate>
      <dc:date>2026-04-02T15:00:00.000Z</dc:date>
      <description><![CDATA[Learn about the antivirus detection gap — and how to develop a simple YARA rule using Spectra Analyze. ]]></description>
      <dc:creator><![CDATA[Toni Dujmović]]></dc:creator>
      <author><![CDATA[toni.dujmovic@reversinglabs.com (Toni Dujmović)]]></author>
      <enclosure url="https://www.reversinglabs.com/api/media/file/How-a-Simple-YARA-Rule-Catches-What-AV-Misses.jpg" type="image/jpeg" />
      <category><![CDATA[Products & Technology]]></category>
    </item>
    <item>
      <title><![CDATA[How JPMC tackles software ‘trust debt’]]></title>
      <link>https://www.reversinglabs.com/opet-jpmc-software-trust-debt-rsac</link>
      <guid>https://www.reversinglabs.com/opet-jpmc-software-trust-debt-rsac</guid>
      <pubDate>Wed, 01 Apr 2026 15:00:00 GMT</pubDate>
      <dc:date>2026-04-01T15:00:00.000Z</dc:date>
      <description><![CDATA[JPMorgan Chase CISO Patrick Opet discussed his letter on third-party software risk — and how that has played out.]]></description>
      <dc:creator><![CDATA[Paul Roberts]]></dc:creator>
      <enclosure url="https://www.reversinglabs.com/api/media/file/software-trust-debt-jpmc.jpg" type="image/jpeg" />
      <category><![CDATA[AppSec & Supply Chain Security]]></category>
    </item>
    <item>
      <title><![CDATA[GenAI Security Project ramps up guidance]]></title>
      <link>https://www.reversinglabs.com/owasp-genai-security-project-updates</link>
      <guid>https://www.reversinglabs.com/owasp-genai-security-project-updates</guid>
      <pubDate>Tue, 31 Mar 2026 15:00:00 GMT</pubDate>
      <dc:date>2026-03-31T15:00:00.000Z</dc:date>
      <description><![CDATA[With AI ramping up risk, OWASP stepped up its project to help AppSec teams get up to speed — and take action.]]></description>
      <dc:creator><![CDATA[John P. Mello Jr.]]></dc:creator>
      <enclosure url="https://www.reversinglabs.com/api/media/file/ramp-up-risk.jpg" type="image/jpeg" />
      <category><![CDATA[AppSec & Supply Chain Security]]></category>
    </item>
    <item>
      <title><![CDATA[AppSec as attacker: Inside Trivy–LiteLLM ]]></title>
      <link>https://www.reversinglabs.com/appsec-weaponized-trivylitellm</link>
      <guid>https://www.reversinglabs.com/appsec-weaponized-trivylitellm</guid>
      <pubDate>Fri, 27 Mar 2026 21:30:00 GMT</pubDate>
      <dc:date>2026-03-27T21:30:00.000Z</dc:date>
      <description><![CDATA[The perimeter isn't your firewall — it's your CI/CD pipeline. Here’s what to know about TeamPCP's supply chain attack.]]></description>
      <dc:creator><![CDATA[Igor Lasic]]></dc:creator>
      <author><![CDATA[ilasic@reversinglabs.com (Igor Lasic)]]></author>
      <enclosure url="https://www.reversinglabs.com/api/media/file/cascading-dolls.jpg" type="image/jpeg" />
      <category><![CDATA[AppSec & Supply Chain Security]]></category>
    </item>
    <item>
      <title><![CDATA[The TeamPCP supply chain attack evolves]]></title>
      <link>https://www.reversinglabs.com/teampcp-supply-chain-attack-spreads</link>
      <guid>https://www.reversinglabs.com/teampcp-supply-chain-attack-spreads</guid>
      <pubDate>Fri, 27 Mar 2026 19:30:00 GMT</pubDate>
      <dc:date>2026-03-27T19:30:00.000Z</dc:date>
      <description><![CDATA[The malicious campaign started with Trivy and Checkmarx and has shifted to LiteLLM  — and now telnix. Here's how.]]></description>
      <dc:creator><![CDATA[Paul Roberts]]></dc:creator>
      <enclosure url="https://www.reversinglabs.com/api/media/file/teampcp-supply-chain-attack.jpg" type="image/jpeg" />
      <category><![CDATA[Threat Research]]></category>
    </item>
    <item>
      <title><![CDATA[Decouple SIEM data to reshape your AppSec]]></title>
      <link>https://www.reversinglabs.com/decouple-your-siem-data</link>
      <guid>https://www.reversinglabs.com/decouple-your-siem-data</guid>
      <pubDate>Thu, 26 Mar 2026 15:00:00 GMT</pubDate>
      <dc:date>2026-03-26T15:00:00.000Z</dc:date>
      <description><![CDATA[Shift to a data security pipeline platform to get software visibility that modern supply chain threats demand.]]></description>
      <dc:creator><![CDATA[Ericka Chickowski]]></dc:creator>
      <enclosure url="https://www.reversinglabs.com/api/media/file/decouple-siem-data.jpg" type="image/jpeg" />
      <category><![CDATA[AppSec & Supply Chain Security]]></category>
    </item>
    <item>
      <title><![CDATA[How AI agents can weaponize IDEs]]></title>
      <link>https://www.reversinglabs.com/how-ai-agents-can-weaponize-ides</link>
      <guid>https://www.reversinglabs.com/how-ai-agents-can-weaponize-ides</guid>
      <pubDate>Wed, 25 Mar 2026 15:00:00 GMT</pubDate>
      <dc:date>2026-03-25T15:00:00.000Z</dc:date>
      <description><![CDATA[Research shows that AI coding can tap integrated development environments to become privileged insider threats. ]]></description>
      <dc:creator><![CDATA[John P. Mello Jr.]]></dc:creator>
      <enclosure url="https://www.reversinglabs.com/api/media/file/robot-inside-ide-threat.jpg" type="image/jpeg" />
      <category><![CDATA[AppSec & Supply Chain Security]]></category>
    </item>
    <item>
      <title><![CDATA[Fake install logs in npm packages load RAT]]></title>
      <link>https://www.reversinglabs.com/npm-fake-install-logs-rat</link>
      <guid>https://www.reversinglabs.com/npm-fake-install-logs-rat</guid>
      <pubDate>Tue, 24 Mar 2026 15:00:00 GMT</pubDate>
      <dc:date>2026-03-24T15:00:00.000Z</dc:date>
      <description><![CDATA[The final-stage malware in the Ghost campaign is a RAT designed to steal crypto wallets and sensitive data.]]></description>
      <dc:creator><![CDATA[Lucija Valentić]]></dc:creator>
      <enclosure url="https://www.reversinglabs.com/api/media/file/Malicious-npm-packages-use-fake-install-logs-to-load-RAT.jpg" type="image/jpeg" />
      <category><![CDATA[Threat Research]]></category>
    </item>
    <item>
      <title><![CDATA[Crypto group ushers in post-quantum security]]></title>
      <link>https://www.reversinglabs.com/ethereum-post-quantum-security</link>
      <guid>https://www.reversinglabs.com/ethereum-post-quantum-security</guid>
      <pubDate>Thu, 19 Mar 2026 15:00:00 GMT</pubDate>
      <dc:date>2026-03-19T15:00:00.000Z</dc:date>
      <description><![CDATA[Here’s a look at the Ethereum Foundation’s new PQC security effort — and why you need to modernize your SecOps.]]></description>
      <dc:creator><![CDATA[John P. Mello Jr.]]></dc:creator>
      <enclosure url="https://www.reversinglabs.com/api/media/file/post-quantum-security.jpg" type="image/jpeg" />
      <category><![CDATA[Security Operations]]></category>
    </item>
    <item>
      <title><![CDATA[OpenClaw lesson: AI agents are a black hole]]></title>
      <link>https://www.reversinglabs.com/openclaw-ai-agents-black-hole-risks</link>
      <guid>https://www.reversinglabs.com/openclaw-ai-agents-black-hole-risks</guid>
      <pubDate>Wed, 18 Mar 2026 15:00:00 GMT</pubDate>
      <dc:date>2026-03-18T15:00:00.000Z</dc:date>
      <description><![CDATA[AI agents create novel attack surfaces and control issues that require rethinking assumptions — and AppSec tooling.]]></description>
      <dc:creator><![CDATA[Ericka Chickowski]]></dc:creator>
      <enclosure url="https://www.reversinglabs.com/api/media/file/openclaw-aiagents-blackhole-risk.jpg" type="image/jpeg" />
      <category><![CDATA[AppSec & Supply Chain Security]]></category>
    </item>
    <item>
      <title><![CDATA[How to Examine Polyglot Files with Spectra Analyze]]></title>
      <link>https://www.reversinglabs.com/examine-polyglot-files-spectra-analyze</link>
      <guid>https://www.reversinglabs.com/examine-polyglot-files-spectra-analyze</guid>
      <pubDate>Tue, 17 Mar 2026 15:00:00 GMT</pubDate>
      <dc:date>2026-03-17T15:00:00.000Z</dc:date>
      <description><![CDATA[Here's how to assess a sample using Spectra Analyze in your environment — and create a YARA rule.]]></description>
      <dc:creator><![CDATA[Josh Morin]]></dc:creator>
      <enclosure url="https://www.reversinglabs.com/api/media/file/Polyglot-File-Examination.webp" type="image/jpeg" />
      <category><![CDATA[Products & Technology]]></category>
    </item>
    <item>
      <title><![CDATA[Make Your SBOMs Actionable with PURLs]]></title>
      <link>https://www.reversinglabs.com/why-your-sboms-need-purls</link>
      <guid>https://www.reversinglabs.com/why-your-sboms-need-purls</guid>
      <pubDate>Thu, 12 Mar 2026 15:00:00 GMT</pubDate>
      <dc:date>2026-03-12T15:00:00.000Z</dc:date>
      <description><![CDATA[Learn how Package URLs improve vulnerability matching, which reduces alert fatigue and simplifies compliance.]]></description>
      <dc:creator><![CDATA[Dave Ferguson]]></dc:creator>
      <enclosure url="https://www.reversinglabs.com/api/media/file/sbom-check.jpg" type="image/jpeg" />
      <category><![CDATA[Products & Technology]]></category>
    </item>
    <item>
      <title><![CDATA[OWASP adopts DockSec: Why it matters]]></title>
      <link>https://www.reversinglabs.com/owasp-adopts-docksec</link>
      <guid>https://www.reversinglabs.com/owasp-adopts-docksec</guid>
      <pubDate>Wed, 11 Mar 2026 15:00:00 GMT</pubDate>
      <dc:date>2026-03-11T15:00:00.000Z</dc:date>
      <description><![CDATA[OWASP has adopted the container security tool to slow information overload. Here’s what you need to know.]]></description>
      <dc:creator><![CDATA[John P. Mello Jr.]]></dc:creator>
      <enclosure url="https://www.reversinglabs.com/api/media/file/docksec-container-security-owasp.jpg" type="image/jpeg" />
      <category><![CDATA[AppSec & Supply Chain Security]]></category>
    </item>
    <item>
      <title><![CDATA[OpenClaw and AI risk: 3 AppSec lessons]]></title>
      <link>https://www.reversinglabs.com/openclaw-agentic-ai-risk</link>
      <guid>https://www.reversinglabs.com/openclaw-agentic-ai-risk</guid>
      <pubDate>Tue, 10 Mar 2026 15:00:00 GMT</pubDate>
      <dc:date>2026-03-10T15:00:00.000Z</dc:date>
      <description><![CDATA[The OpenClaw saga is a case study on the threat from agentic AI, showing how it increases software risk.]]></description>
      <dc:creator><![CDATA[Ericka Chickowski]]></dc:creator>
      <enclosure url="https://www.reversinglabs.com/api/media/file/openclaw-agentic-ai-risk.jpg" type="image/jpeg" />
      <category><![CDATA[AppSec & Supply Chain Security]]></category>
    </item>
    <item>
      <title><![CDATA[Claude Code Security: The pros and cons]]></title>
      <link>https://www.reversinglabs.com/claude-code-security</link>
      <guid>https://www.reversinglabs.com/claude-code-security</guid>
      <pubDate>Thu, 05 Mar 2026 16:00:00 GMT</pubDate>
      <dc:date>2026-03-05T16:00:00.000Z</dc:date>
      <description><![CDATA[The new tool is a step forward on AI coding risk — but it trips on modern threats because it looks only at source code.]]></description>
      <dc:creator><![CDATA[Jaikumar Vijayan]]></dc:creator>
      <enclosure url="https://www.reversinglabs.com/api/media/file/tripping-hazard-sign.jpg" type="image/jpeg" />
      <category><![CDATA[AppSec & Supply Chain Security]]></category>
    </item>
    <item>
      <title><![CDATA[AI-native AppSec: What it is — and why it matters]]></title>
      <link>https://www.reversinglabs.com/ai-native-appsec</link>
      <guid>https://www.reversinglabs.com/ai-native-appsec</guid>
      <pubDate>Wed, 04 Mar 2026 16:00:00 GMT</pubDate>
      <dc:date>2026-03-04T16:00:00.000Z</dc:date>
      <description><![CDATA[AI coding is a game-changer — and requires AI-powered application security to fight fire with fire.]]></description>
      <dc:creator><![CDATA[John P. Mello Jr.]]></dc:creator>
      <enclosure url="https://www.reversinglabs.com/api/media/file/ai-native-fight-fire.jpg" type="image/jpeg" />
      <category><![CDATA[AppSec & Supply Chain Security]]></category>
    </item>
    <item>
      <title><![CDATA[BSIMM16 confirms: AI redefines AppSec]]></title>
      <link>https://www.reversinglabs.com/bsimm16-ai-redefines-appsec</link>
      <guid>https://www.reversinglabs.com/bsimm16-ai-redefines-appsec</guid>
      <pubDate>Tue, 03 Mar 2026 16:00:00 GMT</pubDate>
      <dc:date>2026-03-03T16:00:00.000Z</dc:date>
      <description><![CDATA[AI coding is the new reality — and it will further destabilize software supply chain security. So step up your AppSec.]]></description>
      <dc:creator><![CDATA[John P. Mello Jr.]]></dc:creator>
      <enclosure url="https://www.reversinglabs.com/api/media/file/ai-code-appsec-bsimm.jpg" type="image/jpeg" />
      <category><![CDATA[AppSec & Supply Chain Security]]></category>
    </item>
    <item>
      <title><![CDATA[Inside the NuGet hackers' toolset]]></title>
      <link>https://www.reversinglabs.com/inside-the-nuget-hackers-toolset</link>
      <guid>https://www.reversinglabs.com/inside-the-nuget-hackers-toolset</guid>
      <pubDate>Thu, 26 Feb 2026 16:00:00 GMT</pubDate>
      <dc:date>2026-02-26T16:00:00.000Z</dc:date>
      <description><![CDATA[RL discovered two packages containing scripts that complete a typosquatting toolchain. Here's how it worked.]]></description>
      <dc:creator><![CDATA[Petar Kirhmajer]]></dc:creator>
      <enclosure url="https://www.reversinglabs.com/api/media/file/Inside-the-NuGet-hack-toolset.jpg" type="image/jpeg" />
      <category><![CDATA[Threat Research]]></category>
    </item>
    <item>
      <title><![CDATA[Malicious NuGet package targets Stripe]]></title>
      <link>https://www.reversinglabs.com/malicious-nuget-package-targets-stripe</link>
      <guid>https://www.reversinglabs.com/malicious-nuget-package-targets-stripe</guid>
      <pubDate>Wed, 25 Feb 2026 16:00:00 GMT</pubDate>
      <dc:date>2026-02-25T16:00:00.000Z</dc:date>
      <description><![CDATA[Threat actors targeted developers with a bogus package — a shift away from the recent crypto development hack focus.]]></description>
      <dc:creator><![CDATA[Petar Kirhmajer]]></dc:creator>
      <enclosure url="https://www.reversinglabs.com/api/media/file/Malicious-NuGet-package-targets-Stripe.jpg" type="image/jpeg" />
      <category><![CDATA[Threat Research]]></category>
    </item>
    <item>
      <title><![CDATA[How AI agents upend supply chain security]]></title>
      <link>https://www.reversinglabs.com/how-ai-agents-upend-sscs</link>
      <guid>https://www.reversinglabs.com/how-ai-agents-upend-sscs</guid>
      <pubDate>Tue, 24 Feb 2026 16:00:00 GMT</pubDate>
      <dc:date>2026-02-24T16:00:00.000Z</dc:date>
      <description><![CDATA[Here’s what you need to know about their impact on software security — and what you can do to fight back. ]]></description>
      <dc:creator><![CDATA[Jaikumar Vijayan]]></dc:creator>
      <enclosure url="https://www.reversinglabs.com/api/media/file/ai-supply-chain.jpg" type="image/jpeg" />
      <category><![CDATA[AppSec & Supply Chain Security]]></category>
    </item>
    <item>
      <title><![CDATA[Cybercrime-as-a-service forces a security rethink]]></title>
      <link>https://www.reversinglabs.com/cybercrime-as-a-service</link>
      <guid>https://www.reversinglabs.com/cybercrime-as-a-service</guid>
      <pubDate>Thu, 19 Feb 2026 16:00:00 GMT</pubDate>
      <dc:date>2026-02-19T16:00:00.000Z</dc:date>
      <description><![CDATA[With AI-powered tools readily available, sophisticated attacks no longer require sophisticated attackers.]]></description>
      <dc:creator><![CDATA[Jaikumar Vijayan]]></dc:creator>
      <enclosure url="https://www.reversinglabs.com/api/media/file/cybercrime-as-a-service.jpg" type="image/jpeg" />
      <category><![CDATA[Security Operations]]></category>
    </item>
    <item>
      <title><![CDATA[How to Use YARA Retrohunting for Defense]]></title>
      <link>https://www.reversinglabs.com/yara-retrohunting-detection-engineering</link>
      <guid>https://www.reversinglabs.com/yara-retrohunting-detection-engineering</guid>
      <pubDate>Wed, 18 Feb 2026 16:00:00 GMT</pubDate>
      <dc:date>2026-02-18T16:00:00.000Z</dc:date>
      <description><![CDATA[Learn how to use RL’s analysis of "pkr_mtsi" to advance your detection engineering in Spectra Analyze.]]></description>
      <dc:creator><![CDATA[Ashlee Benge]]></dc:creator>
      <enclosure url="https://www.reversinglabs.com/api/media/file/How-to-Use-YARA-Retrohunting-for-Detection-Engineering.jpg" type="image/jpeg" />
      <category><![CDATA[Products & Technology]]></category>
    </item>
    <item>
      <title><![CDATA[Commercial software risk: New controls required]]></title>
      <link>https://www.reversinglabs.com/commercial-software-risk-new-controls</link>
      <guid>https://www.reversinglabs.com/commercial-software-risk-new-controls</guid>
      <pubDate>Tue, 17 Feb 2026 16:00:00 GMT</pubDate>
      <dc:date>2026-02-17T16:00:00.000Z</dc:date>
      <description><![CDATA[Legacy strategies and tooling can’t manage today’s software threats. Here’s why binary analysis is necessary.]]></description>
      <dc:creator><![CDATA[Ericka Chickowski]]></dc:creator>
      <enclosure url="https://www.reversinglabs.com/api/media/file/commercial-software-risk.jpg" type="image/jpeg" />
      <category><![CDATA[AppSec & Supply Chain Security]]></category>
    </item>
    <item>
      <title><![CDATA[Inside the fake crypto developer recruitment hack]]></title>
      <link>https://www.reversinglabs.com/inside-graphalgo</link>
      <guid>https://www.reversinglabs.com/inside-graphalgo</guid>
      <pubDate>Thu, 12 Feb 2026 16:00:00 GMT</pubDate>
      <dc:date>2026-02-12T16:00:00.000Z</dc:date>
      <description><![CDATA[Here’s a more-in-depth technical analysis of the packages involved in the "graphalgo" campaign.]]></description>
      <dc:creator><![CDATA[Lucija Valentić]]></dc:creator>
      <enclosure url="https://www.reversinglabs.com/api/media/file/Inside-the-fake-crypto-developer-recruiter-campaign-graphalgo.jpg" type="image/jpeg" />
      <category><![CDATA[Threat Research]]></category>
    </item>
    <item>
      <title><![CDATA[Fake recruiter campaign targets crypto devs]]></title>
      <link>https://www.reversinglabs.com/fake-recruiter-campaign-crypto-devs</link>
      <guid>https://www.reversinglabs.com/fake-recruiter-campaign-crypto-devs</guid>
      <pubDate>Wed, 11 Feb 2026 16:00:00 GMT</pubDate>
      <dc:date>2026-02-11T16:00:00.000Z</dc:date>
      <description><![CDATA[A new branch of a fake job recruitment campaign, dubbed "graphalgo," is targeting developers with a RAT.]]></description>
      <dc:creator><![CDATA[Karlo Zanki]]></dc:creator>
      <enclosure url="https://www.reversinglabs.com/api/media/file/Fake-recruiter-campaign-targets-crypto-developers-with-RAT.jpg" type="image/jpeg" />
      <category><![CDATA[Threat Research]]></category>
    </item>
    <item>
      <title><![CDATA[Gartner® CISO Playbook for Commercial SSCS: 3 key insights]]></title>
      <link>https://www.reversinglabs.com/gartner-ciso-playbook-insights</link>
      <guid>https://www.reversinglabs.com/gartner-ciso-playbook-insights</guid>
      <pubDate>Tue, 10 Feb 2026 16:00:00 GMT</pubDate>
      <dc:date>2026-02-10T16:00:00.000Z</dc:date>
      <description><![CDATA[Here are the takeaways CISOs and other security leaders should consider for their TPCRM strategies.]]></description>
      <dc:creator><![CDATA[Carolynn van Arsdale]]></dc:creator>
      <enclosure url="https://www.reversinglabs.com/api/media/file/Gartner-Playbook-Blog-Cover.jpg" type="image/jpeg" />
      <category><![CDATA[AppSec & Supply Chain Security]]></category>
    </item>
    <item>
      <title><![CDATA[Notepad++ hack: Supply chain threats evolve]]></title>
      <link>https://www.reversinglabs.com/notepad-evolution-supply-chain-threats</link>
      <guid>https://www.reversinglabs.com/notepad-evolution-supply-chain-threats</guid>
      <pubDate>Thu, 05 Feb 2026 16:00:00 GMT</pubDate>
      <dc:date>2026-02-05T16:00:00.000Z</dc:date>
      <description><![CDATA[A compromise of the source code editor underscores attack method diversification. It's time to go beyond trust.]]></description>
      <dc:creator><![CDATA[Paul Roberts]]></dc:creator>
      <enclosure url="https://www.reversinglabs.com/api/media/file/notepad-hack-trust.jpg" type="image/jpeg" />
      <category><![CDATA[AppSec & Supply Chain Security]]></category>
    </item>
    <item>
      <title><![CDATA[Lab offers 9 ways to improve MCP security]]></title>
      <link>https://www.reversinglabs.com/vulnerable-mcp-servers-lab</link>
      <guid>https://www.reversinglabs.com/vulnerable-mcp-servers-lab</guid>
      <pubDate>Wed, 04 Feb 2026 16:00:00 GMT</pubDate>
      <dc:date>2026-02-04T16:00:00.000Z</dc:date>
      <description><![CDATA[The Vulnerable MCP Servers Lab delivers integration training, demos, and instruction on attack methods.]]></description>
      <dc:creator><![CDATA[John P. Mello Jr.]]></dc:creator>
      <enclosure url="https://www.reversinglabs.com/api/media/file/mcp-server-security-robot.jpg" type="image/jpeg" />
      <category><![CDATA[Dev & DevSecOps]]></category>
    </item>
    <item>
      <title><![CDATA[RL SSCS Report: A 2025 retrospective]]></title>
      <link>https://www.reversinglabs.com/sscs-report-2025-retrospective</link>
      <guid>https://www.reversinglabs.com/sscs-report-2025-retrospective</guid>
      <pubDate>Tue, 03 Feb 2026 16:00:00 GMT</pubDate>
      <dc:date>2026-02-03T16:00:00.000Z</dc:date>
      <description><![CDATA[ReversingLabs looked at last year’s Software Supply Chain Security Report in the rear-view mirror. Here’s what RL got right — and wrong.]]></description>
      <dc:creator><![CDATA[Carolynn van Arsdale]]></dc:creator>
      <enclosure url="https://www.reversinglabs.com/api/media/file/SSCS%20Report%202025%20Retrospective.jpg" type="image/jpeg" />
      <category><![CDATA[AppSec & Supply Chain Security]]></category>
    </item>
    <item>
      <title><![CDATA[Inside the EmEditor supply chain compromise]]></title>
      <link>https://www.reversinglabs.com/emeditor-supply-chain-compromise</link>
      <guid>https://www.reversinglabs.com/emeditor-supply-chain-compromise</guid>
      <pubDate>Thu, 29 Jan 2026 15:00:00 GMT</pubDate>
      <dc:date>2026-01-29T15:00:00.000Z</dc:date>
      <description><![CDATA[By combining early infrastructure detection with supply chain security controls you can give your defenders a leg up. ]]></description>
      <dc:creator><![CDATA[Robert Simmons]]></dc:creator>
      <enclosure url="https://www.reversinglabs.com/api/media/file/RL-Researcher's-Notebook-1.jpg" type="image/jpeg" />
      <category><![CDATA[Threat Research]]></category>
    </item>
    <item>
      <title><![CDATA[How AI coding is breathing new life into Rust ]]></title>
      <link>https://www.reversinglabs.com/ai-coding-rust</link>
      <guid>https://www.reversinglabs.com/ai-coding-rust</guid>
      <pubDate>Wed, 28 Jan 2026 16:00:00 GMT</pubDate>
      <dc:date>2026-01-28T16:00:00.000Z</dc:date>
      <description><![CDATA[AI tools are making Rust a favorite language of developers — even those maintaining codebases like Microsoft’s.]]></description>
      <dc:creator><![CDATA[John P. Mello Jr.]]></dc:creator>
      <enclosure url="https://www.reversinglabs.com/api/media/file/ai-rust-new-life.jpg" type="image/jpeg" />
      <category><![CDATA[Dev & DevSecOps]]></category>
    </item>
    <item>
      <title><![CDATA[RL SSCS Report 2026: A guidance timeline]]></title>
      <link>https://www.reversinglabs.com/sscs-report-2026-guidance-timeline</link>
      <guid>https://www.reversinglabs.com/sscs-report-2026-guidance-timeline</guid>
      <pubDate>Tue, 27 Jan 2026 19:00:00 GMT</pubDate>
      <dc:date>2026-01-27T19:00:00.000Z</dc:date>
      <description><![CDATA[Here are the guidelines, mandates, frameworks, and goals that have refined software supply chain security policy.]]></description>
      <dc:creator><![CDATA[Carolynn van Arsdale]]></dc:creator>
      <enclosure url="https://www.reversinglabs.com/api/media/file/Guidance%20Timeline%20Blog.jpg" type="image/jpeg" />
      <category><![CDATA[AppSec & Supply Chain Security]]></category>
    </item>
    <item>
      <title><![CDATA[RL SSCS Report 2026: 5 key takeaways]]></title>
      <link>https://www.reversinglabs.com/sscs-report-2026-takeaways</link>
      <guid>https://www.reversinglabs.com/sscs-report-2026-takeaways</guid>
      <pubDate>Tue, 27 Jan 2026 19:00:00 GMT</pubDate>
      <dc:date>2026-01-27T19:00:00.000Z</dc:date>
      <description><![CDATA[OSS and dev tools are targets as AI risk rises. Learn more in the Software Supply Chain Security Report 2026.]]></description>
      <dc:creator><![CDATA[Carolynn van Arsdale]]></dc:creator>
      <enclosure url="https://www.reversinglabs.com/api/media/file/SSCSReport2026-takeaways.jpg" type="image/jpeg" />
      <category><![CDATA[AppSec & Supply Chain Security]]></category>
    </item>
    <item>
      <title><![CDATA[Anthropic’s PSF investment: Why it matters]]></title>
      <link>https://www.reversinglabs.com/anthropic-python-investment</link>
      <guid>https://www.reversinglabs.com/anthropic-python-investment</guid>
      <pubDate>Thu, 22 Jan 2026 16:00:00 GMT</pubDate>
      <dc:date>2026-01-22T16:00:00.000Z</dc:date>
      <description><![CDATA[Here’s what the $1.5M investment in the Python Software Foundation will mean for AI coding and open-source security.]]></description>
      <dc:creator><![CDATA[Jaikumar Vijayan]]></dc:creator>
      <enclosure url="https://www.reversinglabs.com/api/media/file/oss.jpg" type="image/jpeg" />
      <category><![CDATA[Dev & DevSecOps]]></category>
    </item>
    <item>
      <title><![CDATA[SSDF 1.2 sees AppSec as a journey]]></title>
      <link>https://www.reversinglabs.com/ssdf-appsec-journey</link>
      <guid>https://www.reversinglabs.com/ssdf-appsec-journey</guid>
      <pubDate>Wed, 21 Jan 2026 16:00:00 GMT</pubDate>
      <dc:date>2026-01-21T16:00:00.000Z</dc:date>
      <description><![CDATA[NIST has broadened the Secure Software Development Framework to include the full SDLC. Here’s why it matters.]]></description>
      <dc:creator><![CDATA[John P. Mello Jr.]]></dc:creator>
      <enclosure url="https://www.reversinglabs.com/api/media/file/appsec-journey.jpg" type="image/jpeg" />
      <category><![CDATA[AppSec & Supply Chain Security]]></category>
    </item>
    <item>
      <title><![CDATA[Mandatory SBOMs: Why CRA matters]]></title>
      <link>https://www.reversinglabs.com/mandatory-sbom-cra</link>
      <guid>https://www.reversinglabs.com/mandatory-sbom-cra</guid>
      <pubDate>Tue, 20 Jan 2026 16:00:00 GMT</pubDate>
      <dc:date>2026-01-20T16:00:00.000Z</dc:date>
      <description><![CDATA[The EU’s Cyber Resilience Act legally obliges software producers to create and maintain an SBOM. Are you prepared?]]></description>
      <dc:creator><![CDATA[John P. Mello Jr.]]></dc:creator>
      <enclosure url="https://www.reversinglabs.com/api/media/file/sbom-check.jpg" type="image/jpeg" />
      <category><![CDATA[AppSec & Supply Chain Security]]></category>
    </item>
    <item>
      <title><![CDATA[Why governance is key to safe AI adoption]]></title>
      <link>https://www.reversinglabs.com/governance-essential-ai-adoption</link>
      <guid>https://www.reversinglabs.com/governance-essential-ai-adoption</guid>
      <pubDate>Thu, 15 Jan 2026 16:00:00 GMT</pubDate>
      <dc:date>2026-01-15T16:00:00.000Z</dc:date>
      <description><![CDATA[A new CSA report stresses getting out in front of AI risk — and why it matters for SecOps.]]></description>
      <dc:creator><![CDATA[John P. Mello Jr.]]></dc:creator>
      <enclosure url="https://www.reversinglabs.com/api/media/file/guardrail-ai-adoption.jpg" type="image/jpeg" />
      <category><![CDATA[Security Operations]]></category>
    </item>
    <item>
      <title><![CDATA[Shai-hulud post-mortem: A call to action on AppSec]]></title>
      <link>https://www.reversinglabs.com/shai-hulud-call-to-action</link>
      <guid>https://www.reversinglabs.com/shai-hulud-call-to-action</guid>
      <pubDate>Wed, 14 Jan 2026 16:00:00 GMT</pubDate>
      <dc:date>2026-01-14T16:00:00.000Z</dc:date>
      <description><![CDATA[Trigger.dev's experience shows that you need modern controls to combat today's supply chain attacks.]]></description>
      <dc:creator><![CDATA[Jaikumar Vijayan]]></dc:creator>
      <enclosure url="https://www.reversinglabs.com/api/media/file/Shai-hulud%20worm.png" type="image/jpeg" />
      <category><![CDATA[AppSec & Supply Chain Security]]></category>
    </item>
    <item>
      <title><![CDATA[Adversarial AI is on the rise: What you need to know]]></title>
      <link>https://www.reversinglabs.com/adversarial-ai-rise</link>
      <guid>https://www.reversinglabs.com/adversarial-ai-rise</guid>
      <pubDate>Tue, 13 Jan 2026 16:00:00 GMT</pubDate>
      <dc:date>2026-01-13T16:00:00.000Z</dc:date>
      <description><![CDATA[Researchers explain that as threat actors move to AI-enabled malware in active operations, existing defenses will fail.]]></description>
      <dc:creator><![CDATA[John P. Mello Jr.]]></dc:creator>
      <enclosure url="https://www.reversinglabs.com/api/media/file/adversarial-ai-risk.jpg" type="image/jpeg" />
      <category><![CDATA[Security Operations]]></category>
    </item>
    <item>
      <title><![CDATA[How supply chain risk can affect cyber insurance]]></title>
      <link>https://www.reversinglabs.com/supply-chain-risk-insurance</link>
      <guid>https://www.reversinglabs.com/supply-chain-risk-insurance</guid>
      <pubDate>Thu, 08 Jan 2026 16:00:00 GMT</pubDate>
      <dc:date>2026-01-08T16:00:00.000Z</dc:date>
      <description><![CDATA[Gaining visibility into supply chain threats — and adding controls for software risk — are essential to insurability.]]></description>
      <dc:creator><![CDATA[Ericka Chickowski]]></dc:creator>
      <enclosure url="https://www.reversinglabs.com/api/media/file/supply-chain-risk-insurance.jpg" type="image/jpeg" />
      <category><![CDATA[AppSec & Supply Chain Security]]></category>
    </item>
    <item>
      <title><![CDATA[AI technical debt: What it is — and why it matters]]></title>
      <link>https://www.reversinglabs.com/ai-technical-debt</link>
      <guid>https://www.reversinglabs.com/ai-technical-debt</guid>
      <pubDate>Wed, 07 Jan 2026 16:00:00 GMT</pubDate>
      <dc:date>2026-01-07T16:00:00.000Z</dc:date>
      <description><![CDATA[AI platforms exacerbate existing security risks. Here’s what you need to know to stay out of technical debt. ]]></description>
      <dc:creator><![CDATA[John P. Mello Jr.]]></dc:creator>
      <enclosure url="https://www.reversinglabs.com/api/media/file/ai-technical-debt.jpg" type="image/jpeg" />
      <category><![CDATA[Security Operations]]></category>
    </item>
    <item>
      <title><![CDATA[Unpacking the packer ‘pkr_mtsi’]]></title>
      <link>https://www.reversinglabs.com/unpacking-pkr_mtsi</link>
      <guid>https://www.reversinglabs.com/unpacking-pkr_mtsi</guid>
      <pubDate>Tue, 06 Jan 2026 16:00:00 GMT</pubDate>
      <dc:date>2026-01-06T16:00:00.000Z</dc:date>
      <description><![CDATA[This RL Researcher’s Notebook highlights the packer’s evolution — and offers a YARA rule to detect all versions. ]]></description>
      <dc:creator><![CDATA[Robert Simmons]]></dc:creator>
      <enclosure url="https://www.reversinglabs.com/api/media/file/RL-Researcher's-Notebook.jpg" type="image/jpeg" />
      <category><![CDATA[Threat Research]]></category>
    </item>
    <item>
      <title><![CDATA[SF² aims to help you scale SecOps wisely ]]></title>
      <link>https://www.reversinglabs.com/software-factory-security-framework-secops</link>
      <guid>https://www.reversinglabs.com/software-factory-security-framework-secops</guid>
      <pubDate>Tue, 30 Dec 2025 16:00:00 GMT</pubDate>
      <dc:date>2025-12-30T16:00:00.000Z</dc:date>
      <description><![CDATA[The Software Factory Security Framework eyes scaling SecOps as a resource problem — not just head count.]]></description>
      <dc:creator><![CDATA[Jaikumar Vijayan]]></dc:creator>
      <enclosure url="https://www.reversinglabs.com/api/media/file/software-factory.jpg" type="image/jpeg" />
      <category><![CDATA[Security Operations]]></category>
    </item>
    <item>
      <title><![CDATA[AI is upending file security. Here’s how to fight back]]></title>
      <link>https://www.reversinglabs.com/ai-file-security-fight-back</link>
      <guid>https://www.reversinglabs.com/ai-file-security-fight-back</guid>
      <pubDate>Tue, 23 Dec 2025 16:00:00 GMT</pubDate>
      <dc:date>2025-12-23T16:00:00.000Z</dc:date>
      <description><![CDATA[As attacks become AI-optimized and internal AI use rises, enterprises need to modernize their file security strategy. ]]></description>
      <dc:creator><![CDATA[Todd R. Weiss]]></dc:creator>
      <enclosure url="https://www.reversinglabs.com/api/media/file/ai-file-security.jpg" type="image/jpeg" />
      <category><![CDATA[Security Operations]]></category>
    </item>
    <item>
      <title><![CDATA[OWASP tackles AI risk in bold new push]]></title>
      <link>https://www.reversinglabs.com/owasp-tackles-ai-risk-in-bold-new-push</link>
      <guid>https://www.reversinglabs.com/owasp-tackles-ai-risk-in-bold-new-push</guid>
      <pubDate>Thu, 18 Dec 2025 16:00:00 GMT</pubDate>
      <dc:date>2025-12-18T16:00:00.000Z</dc:date>
      <description><![CDATA[The Open Worldwide Application Security Project now includes an Agentic Top 10, an AI testing guide, and an AI vulnerability scoring tool.]]></description>
      <dc:creator><![CDATA[John P. Mello Jr.]]></dc:creator>
      <enclosure url="https://www.reversinglabs.com/api/media/file/ai-risk-uphill-push.jpg" type="image/jpeg" />
      <category><![CDATA[AppSec & Supply Chain Security]]></category>
    </item>
  </channel>
</rss>