<?xml version="1.0" encoding="UTF-8" ?>
<rss version="2.0" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:wfw="http://wellformedweb.org/CommentAPI/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <title>ReversingLabs Blog</title>
    <link>https://www.reversinglabs.com/blog</link>
    <description>Latest blog posts from ReversingLabs</description>
    <language>en-US</language>
    <pubDate>Fri, 13 Mar 2026 23:25:10 GMT</pubDate>
    <dc:date>2026-03-13T23:25:10.998Z</dc:date>
    <dc:language>en</dc:language>
    <lastBuildDate>Fri, 13 Mar 2026 23:25:10 GMT</lastBuildDate>
    <atom:link href="https://www.reversinglabs.com/blog/rss.xml" rel="self" type="application/rss+xml" />
    
    <item>
      <title><![CDATA[Make Your SBOMs Actionable with PURLs]]></title>
      <link>https://www.reversinglabs.com/blog/why-your-sboms-need-purls</link>
      <guid>https://www.reversinglabs.com/blog/why-your-sboms-need-purls</guid>
      <pubDate>Thu, 12 Mar 2026 15:00:00 GMT</pubDate>
      <dc:date>2026-03-12T15:00:00.000Z</dc:date>
      <description><![CDATA[Learn how Package URLs improve vulnerability matching, which reduces alert fatigue and simplifies compliance.]]></description>
      <dc:creator><![CDATA[Dave Ferguson]]></dc:creator>
      <enclosure url="https://www.reversinglabs.com/api/media/file/sbom-check.jpg" type="image/jpeg" />
      <category><![CDATA[Products & Technology]]></category>
    </item>
    <item>
      <title><![CDATA[OWASP adopts DockSec: Why it matters]]></title>
      <link>https://www.reversinglabs.com/blog/owasp-adopts-docksec</link>
      <guid>https://www.reversinglabs.com/blog/owasp-adopts-docksec</guid>
      <pubDate>Wed, 11 Mar 2026 15:00:00 GMT</pubDate>
      <dc:date>2026-03-11T15:00:00.000Z</dc:date>
      <description><![CDATA[OWASP has adopted the container security tool to slow information overload. Here’s what you need to know.]]></description>
      <dc:creator><![CDATA[John P. Mello Jr.]]></dc:creator>
      <enclosure url="https://www.reversinglabs.com/api/media/file/docksec-container-security-owasp.jpg" type="image/jpeg" />
      <category><![CDATA[AppSec & Supply Chain Security]]></category>
    </item>
    <item>
      <title><![CDATA[OpenClaw and AI risk: 3 AppSec lessons]]></title>
      <link>https://www.reversinglabs.com/blog/openclaw-agentic-ai-risk</link>
      <guid>https://www.reversinglabs.com/blog/openclaw-agentic-ai-risk</guid>
      <pubDate>Tue, 10 Mar 2026 15:00:00 GMT</pubDate>
      <dc:date>2026-03-10T15:00:00.000Z</dc:date>
      <description><![CDATA[The OpenClaw saga is a case study on the threat from agentic AI, showing how it increases software risk.]]></description>
      <dc:creator><![CDATA[Ericka Chickowski]]></dc:creator>
      <enclosure url="https://www.reversinglabs.com/api/media/file/openclaw-agentic-ai-risk.jpg" type="image/jpeg" />
      <category><![CDATA[AppSec & Supply Chain Security]]></category>
    </item>
    <item>
      <title><![CDATA[Claude Code Security: The pros and cons]]></title>
      <link>https://www.reversinglabs.com/blog/claude-code-security</link>
      <guid>https://www.reversinglabs.com/blog/claude-code-security</guid>
      <pubDate>Thu, 05 Mar 2026 16:00:00 GMT</pubDate>
      <dc:date>2026-03-05T16:00:00.000Z</dc:date>
      <description><![CDATA[The new tool is a step forward on AI coding risk — but it trips on modern threats because it looks only at source code.]]></description>
      <dc:creator><![CDATA[Jaikumar Vijayan]]></dc:creator>
      <enclosure url="https://www.reversinglabs.com/api/media/file/tripping-hazard-sign.jpg" type="image/jpeg" />
      <category><![CDATA[AppSec & Supply Chain Security]]></category>
    </item>
    <item>
      <title><![CDATA[AI-native AppSec: What it is — and why it matters]]></title>
      <link>https://www.reversinglabs.com/blog/ai-native-appsec</link>
      <guid>https://www.reversinglabs.com/blog/ai-native-appsec</guid>
      <pubDate>Wed, 04 Mar 2026 16:00:00 GMT</pubDate>
      <dc:date>2026-03-04T16:00:00.000Z</dc:date>
      <description><![CDATA[AI coding is a game-changer — and requires AI-powered application security to fight fire with fire.]]></description>
      <dc:creator><![CDATA[John P. Mello Jr.]]></dc:creator>
      <enclosure url="https://www.reversinglabs.com/api/media/file/ai-native-fight-fire.jpg" type="image/jpeg" />
      <category><![CDATA[AppSec & Supply Chain Security]]></category>
    </item>
    <item>
      <title><![CDATA[BSIMM16 confirms: AI redefines AppSec]]></title>
      <link>https://www.reversinglabs.com/blog/bsimm16-ai-redefines-appsec</link>
      <guid>https://www.reversinglabs.com/blog/bsimm16-ai-redefines-appsec</guid>
      <pubDate>Tue, 03 Mar 2026 16:00:00 GMT</pubDate>
      <dc:date>2026-03-03T16:00:00.000Z</dc:date>
      <description><![CDATA[AI coding is the new reality — and it will further destabilize software supply chain security. So step up your AppSec.]]></description>
      <dc:creator><![CDATA[John P. Mello Jr.]]></dc:creator>
      <enclosure url="https://www.reversinglabs.com/api/media/file/ai-code-appsec-bsimm.jpg" type="image/jpeg" />
      <category><![CDATA[AppSec & Supply Chain Security]]></category>
    </item>
    <item>
      <title><![CDATA[Inside the NuGet hackers' toolset]]></title>
      <link>https://www.reversinglabs.com/blog/inside-the-nuget-hackers-toolset</link>
      <guid>https://www.reversinglabs.com/blog/inside-the-nuget-hackers-toolset</guid>
      <pubDate>Thu, 26 Feb 2026 16:00:00 GMT</pubDate>
      <dc:date>2026-02-26T16:00:00.000Z</dc:date>
      <description><![CDATA[RL discovered two packages containing scripts that complete a typosquatting toolchain. Here's how it worked.]]></description>
      <dc:creator><![CDATA[Petar Kirhmajer]]></dc:creator>
      <enclosure url="https://www.reversinglabs.com/api/media/file/Inside-the-NuGet-hack-toolset.jpg" type="image/jpeg" />
      <category><![CDATA[Threat Research]]></category>
    </item>
    <item>
      <title><![CDATA[Malicious NuGet package targets Stripe]]></title>
      <link>https://www.reversinglabs.com/blog/malicious-nuget-package-targets-stripe</link>
      <guid>https://www.reversinglabs.com/blog/malicious-nuget-package-targets-stripe</guid>
      <pubDate>Wed, 25 Feb 2026 16:00:00 GMT</pubDate>
      <dc:date>2026-02-25T16:00:00.000Z</dc:date>
      <description><![CDATA[Threat actors targeted developers with a bogus package — a shift away from the recent crypto development hack focus.]]></description>
      <dc:creator><![CDATA[Petar Kirhmajer]]></dc:creator>
      <enclosure url="https://www.reversinglabs.com/api/media/file/Malicious-NuGet-package-targets-Stripe.jpg" type="image/jpeg" />
      <category><![CDATA[Threat Research]]></category>
    </item>
    <item>
      <title><![CDATA[How AI agents upend supply chain security]]></title>
      <link>https://www.reversinglabs.com/blog/how-ai-agents-upend-sscs</link>
      <guid>https://www.reversinglabs.com/blog/how-ai-agents-upend-sscs</guid>
      <pubDate>Tue, 24 Feb 2026 16:00:00 GMT</pubDate>
      <dc:date>2026-02-24T16:00:00.000Z</dc:date>
      <description><![CDATA[Here’s what you need to know about their impact on software security — and what you can do to fight back. ]]></description>
      <dc:creator><![CDATA[Jaikumar Vijayan]]></dc:creator>
      <enclosure url="https://www.reversinglabs.com/api/media/file/ai-supply-chain.jpg" type="image/jpeg" />
      <category><![CDATA[AppSec & Supply Chain Security]]></category>
    </item>
    <item>
      <title><![CDATA[Cybercrime-as-a-service forces a security rethink]]></title>
      <link>https://www.reversinglabs.com/blog/cybercrime-as-a-service</link>
      <guid>https://www.reversinglabs.com/blog/cybercrime-as-a-service</guid>
      <pubDate>Thu, 19 Feb 2026 16:00:00 GMT</pubDate>
      <dc:date>2026-02-19T16:00:00.000Z</dc:date>
      <description><![CDATA[With AI-powered tools readily available, sophisticated attacks no longer require sophisticated attackers.]]></description>
      <dc:creator><![CDATA[Jaikumar Vijayan]]></dc:creator>
      <enclosure url="https://www.reversinglabs.com/api/media/file/cybercrime-as-a-service.jpg" type="image/jpeg" />
      <category><![CDATA[Security Operations]]></category>
    </item>
    <item>
      <title><![CDATA[How to Use YARA Retrohunting for Defense]]></title>
      <link>https://www.reversinglabs.com/blog/yara-retrohunting-detection-engineering</link>
      <guid>https://www.reversinglabs.com/blog/yara-retrohunting-detection-engineering</guid>
      <pubDate>Wed, 18 Feb 2026 16:00:00 GMT</pubDate>
      <dc:date>2026-02-18T16:00:00.000Z</dc:date>
      <description><![CDATA[Learn how to use RL’s analysis of "pkr_mtsi" to advance your detection engineering in Spectra Analyze.]]></description>
      <dc:creator><![CDATA[Ashlee Benge]]></dc:creator>
      <enclosure url="https://www.reversinglabs.com/api/media/file/How-to-Use-YARA-Retrohunting-for-Detection-Engineering.jpg" type="image/jpeg" />
      <category><![CDATA[Products & Technology]]></category>
    </item>
    <item>
      <title><![CDATA[Commercial software risk: New controls required]]></title>
      <link>https://www.reversinglabs.com/blog/commercial-software-risk-new-controls</link>
      <guid>https://www.reversinglabs.com/blog/commercial-software-risk-new-controls</guid>
      <pubDate>Tue, 17 Feb 2026 16:00:00 GMT</pubDate>
      <dc:date>2026-02-17T16:00:00.000Z</dc:date>
      <description><![CDATA[Legacy strategies and tooling can’t manage today’s software threats. Here’s why binary analysis is necessary.]]></description>
      <dc:creator><![CDATA[Ericka Chickowski]]></dc:creator>
      <enclosure url="https://www.reversinglabs.com/api/media/file/commercial-software-risk.jpg" type="image/jpeg" />
      <category><![CDATA[AppSec & Supply Chain Security]]></category>
    </item>
    <item>
      <title><![CDATA[Inside the fake crypto developer recruitment hack]]></title>
      <link>https://www.reversinglabs.com/blog/inside-graphalgo</link>
      <guid>https://www.reversinglabs.com/blog/inside-graphalgo</guid>
      <pubDate>Thu, 12 Feb 2026 16:00:00 GMT</pubDate>
      <dc:date>2026-02-12T16:00:00.000Z</dc:date>
      <description><![CDATA[Here’s a more-in-depth technical analysis of the packages involved in the "graphalgo" campaign.]]></description>
      <dc:creator><![CDATA[Lucija Valentić]]></dc:creator>
      <enclosure url="https://www.reversinglabs.com/api/media/file/Inside-the-fake-crypto-developer-recruiter-campaign-graphalgo.jpg" type="image/jpeg" />
      <category><![CDATA[Threat Research]]></category>
    </item>
    <item>
      <title><![CDATA[Fake recruiter campaign targets crypto devs]]></title>
      <link>https://www.reversinglabs.com/blog/fake-recruiter-campaign-crypto-devs</link>
      <guid>https://www.reversinglabs.com/blog/fake-recruiter-campaign-crypto-devs</guid>
      <pubDate>Wed, 11 Feb 2026 16:00:00 GMT</pubDate>
      <dc:date>2026-02-11T16:00:00.000Z</dc:date>
      <description><![CDATA[A new branch of a fake job recruitment campaign, dubbed "graphalgo," is targeting developers with a RAT.]]></description>
      <dc:creator><![CDATA[Karlo Zanki]]></dc:creator>
      <enclosure url="https://www.reversinglabs.com/api/media/file/Fake-recruiter-campaign-targets-crypto-developers-with-RAT.jpg" type="image/jpeg" />
      <category><![CDATA[Threat Research]]></category>
    </item>
    <item>
      <title><![CDATA[Gartner® CISO Playbook for Commercial SSCS: 3 key insights]]></title>
      <link>https://www.reversinglabs.com/blog/gartner-ciso-playbook-insights</link>
      <guid>https://www.reversinglabs.com/blog/gartner-ciso-playbook-insights</guid>
      <pubDate>Tue, 10 Feb 2026 16:00:00 GMT</pubDate>
      <dc:date>2026-02-10T16:00:00.000Z</dc:date>
      <description><![CDATA[Here are the takeaways CISOs and other security leaders should consider for their TPCRM strategies.]]></description>
      <dc:creator><![CDATA[Carolynn van Arsdale]]></dc:creator>
      <enclosure url="https://www.reversinglabs.com/api/media/file/Gartner-Playbook-Blog-Cover.jpg" type="image/jpeg" />
      <category><![CDATA[AppSec & Supply Chain Security]]></category>
    </item>
    <item>
      <title><![CDATA[Notepad++ hack: Supply chain threats evolve]]></title>
      <link>https://www.reversinglabs.com/blog/notepad-evolution-supply-chain-threats</link>
      <guid>https://www.reversinglabs.com/blog/notepad-evolution-supply-chain-threats</guid>
      <pubDate>Thu, 05 Feb 2026 16:00:00 GMT</pubDate>
      <dc:date>2026-02-05T16:00:00.000Z</dc:date>
      <description><![CDATA[A compromise of the source code editor underscores attack method diversification. It's time to go beyond trust.]]></description>
      <dc:creator><![CDATA[Paul Roberts]]></dc:creator>
      <enclosure url="https://www.reversinglabs.com/api/media/file/notepad-hack-trust.jpg" type="image/jpeg" />
      <category><![CDATA[AppSec & Supply Chain Security]]></category>
    </item>
    <item>
      <title><![CDATA[Lab offers 9 ways to improve MCP security]]></title>
      <link>https://www.reversinglabs.com/blog/vulnerable-mcp-servers-lab</link>
      <guid>https://www.reversinglabs.com/blog/vulnerable-mcp-servers-lab</guid>
      <pubDate>Wed, 04 Feb 2026 16:00:00 GMT</pubDate>
      <dc:date>2026-02-04T16:00:00.000Z</dc:date>
      <description><![CDATA[The Vulnerable MCP Servers Lab delivers integration training, demos, and instruction on attack methods.]]></description>
      <dc:creator><![CDATA[John P. Mello Jr.]]></dc:creator>
      <enclosure url="https://www.reversinglabs.com/api/media/file/mcp-server-security-robot.jpg" type="image/jpeg" />
      <category><![CDATA[Dev & DevSecOps]]></category>
    </item>
    <item>
      <title><![CDATA[RL SSCS Report: A 2025 retrospective]]></title>
      <link>https://www.reversinglabs.com/blog/sscs-report-2025-retrospective</link>
      <guid>https://www.reversinglabs.com/blog/sscs-report-2025-retrospective</guid>
      <pubDate>Tue, 03 Feb 2026 16:00:00 GMT</pubDate>
      <dc:date>2026-02-03T16:00:00.000Z</dc:date>
      <description><![CDATA[ReversingLabs looked at last year’s Software Supply Chain Security Report in the rear-view mirror. Here’s what RL got right — and wrong.]]></description>
      <dc:creator><![CDATA[Carolynn van Arsdale]]></dc:creator>
      <enclosure url="https://www.reversinglabs.com/api/media/file/SSCS%20Report%202025%20Retrospective.jpg" type="image/jpeg" />
      <category><![CDATA[AppSec & Supply Chain Security]]></category>
    </item>
    <item>
      <title><![CDATA[Inside the EmEditor supply chain compromise]]></title>
      <link>https://www.reversinglabs.com/blog/emeditor-supply-chain-compromise</link>
      <guid>https://www.reversinglabs.com/blog/emeditor-supply-chain-compromise</guid>
      <pubDate>Thu, 29 Jan 2026 15:00:00 GMT</pubDate>
      <dc:date>2026-01-29T15:00:00.000Z</dc:date>
      <description><![CDATA[By combining early infrastructure detection with supply chain security controls you can give your defenders a leg up. ]]></description>
      <dc:creator><![CDATA[Robert Simmons]]></dc:creator>
      <enclosure url="https://www.reversinglabs.com/api/media/file/RL-Researcher's-Notebook-1.jpg" type="image/jpeg" />
      <category><![CDATA[Threat Research]]></category>
    </item>
    <item>
      <title><![CDATA[How AI coding is breathing new life into Rust ]]></title>
      <link>https://www.reversinglabs.com/blog/ai-coding-rust</link>
      <guid>https://www.reversinglabs.com/blog/ai-coding-rust</guid>
      <pubDate>Wed, 28 Jan 2026 16:00:00 GMT</pubDate>
      <dc:date>2026-01-28T16:00:00.000Z</dc:date>
      <description><![CDATA[AI tools are making Rust a favorite language of developers — even those maintaining codebases like Microsoft’s.]]></description>
      <dc:creator><![CDATA[John P. Mello Jr.]]></dc:creator>
      <enclosure url="https://www.reversinglabs.com/api/media/file/ai-rust-new-life.jpg" type="image/jpeg" />
      <category><![CDATA[Dev & DevSecOps]]></category>
    </item>
    <item>
      <title><![CDATA[RL SSCS Report 2026: A guidance timeline]]></title>
      <link>https://www.reversinglabs.com/blog/sscs-report-2026-guidance-timeline</link>
      <guid>https://www.reversinglabs.com/blog/sscs-report-2026-guidance-timeline</guid>
      <pubDate>Tue, 27 Jan 2026 19:00:00 GMT</pubDate>
      <dc:date>2026-01-27T19:00:00.000Z</dc:date>
      <description><![CDATA[Here are the guidelines, mandates, frameworks, and goals that have refined software supply chain security policy.]]></description>
      <dc:creator><![CDATA[Carolynn van Arsdale]]></dc:creator>
      <enclosure url="https://www.reversinglabs.com/api/media/file/Guidance%20Timeline%20Blog.jpg" type="image/jpeg" />
      <category><![CDATA[AppSec & Supply Chain Security]]></category>
    </item>
    <item>
      <title><![CDATA[RL SSCS Report 2026: 5 key takeaways]]></title>
      <link>https://www.reversinglabs.com/blog/sscs-report-2026-takeaways</link>
      <guid>https://www.reversinglabs.com/blog/sscs-report-2026-takeaways</guid>
      <pubDate>Tue, 27 Jan 2026 19:00:00 GMT</pubDate>
      <dc:date>2026-01-27T19:00:00.000Z</dc:date>
      <description><![CDATA[OSS and dev tools are targets as AI risk rises. Learn more in the Software Supply Chain Security Report 2026.]]></description>
      <dc:creator><![CDATA[Carolynn van Arsdale]]></dc:creator>
      <enclosure url="https://www.reversinglabs.com/api/media/file/SSCSReport2026-takeaways.jpg" type="image/jpeg" />
      <category><![CDATA[AppSec & Supply Chain Security]]></category>
    </item>
    <item>
      <title><![CDATA[Anthropic’s PSF investment: Why it matters]]></title>
      <link>https://www.reversinglabs.com/blog/anthropic-python-investment</link>
      <guid>https://www.reversinglabs.com/blog/anthropic-python-investment</guid>
      <pubDate>Thu, 22 Jan 2026 16:00:00 GMT</pubDate>
      <dc:date>2026-01-22T16:00:00.000Z</dc:date>
      <description><![CDATA[Here’s what the $1.5M investment in the Python Software Foundation will mean for AI coding and open-source security.]]></description>
      <dc:creator><![CDATA[Jaikumar Vijayan]]></dc:creator>
      <enclosure url="https://www.reversinglabs.com/api/media/file/oss.jpg" type="image/jpeg" />
      <category><![CDATA[Dev & DevSecOps]]></category>
    </item>
    <item>
      <title><![CDATA[SSDF 1.2 sees AppSec as a journey]]></title>
      <link>https://www.reversinglabs.com/blog/ssdf-appsec-journey</link>
      <guid>https://www.reversinglabs.com/blog/ssdf-appsec-journey</guid>
      <pubDate>Wed, 21 Jan 2026 16:00:00 GMT</pubDate>
      <dc:date>2026-01-21T16:00:00.000Z</dc:date>
      <description><![CDATA[NIST has broadened the Secure Software Development Framework to include the full SDLC. Here’s why it matters.]]></description>
      <dc:creator><![CDATA[John P. Mello Jr.]]></dc:creator>
      <enclosure url="https://www.reversinglabs.com/api/media/file/appsec-journey.jpg" type="image/jpeg" />
      <category><![CDATA[AppSec & Supply Chain Security]]></category>
    </item>
    <item>
      <title><![CDATA[Mandatory SBOMs: Why CRA matters]]></title>
      <link>https://www.reversinglabs.com/blog/mandatory-sbom-cra</link>
      <guid>https://www.reversinglabs.com/blog/mandatory-sbom-cra</guid>
      <pubDate>Tue, 20 Jan 2026 16:00:00 GMT</pubDate>
      <dc:date>2026-01-20T16:00:00.000Z</dc:date>
      <description><![CDATA[The EU’s Cyber Resilience Act legally obliges software producers to create and maintain an SBOM. Are you prepared?]]></description>
      <dc:creator><![CDATA[John P. Mello Jr.]]></dc:creator>
      <enclosure url="https://www.reversinglabs.com/api/media/file/sbom-check.jpg" type="image/jpeg" />
      <category><![CDATA[AppSec & Supply Chain Security]]></category>
    </item>
    <item>
      <title><![CDATA[Why governance is key to safe AI adoption]]></title>
      <link>https://www.reversinglabs.com/blog/governance-essential-ai-adoption</link>
      <guid>https://www.reversinglabs.com/blog/governance-essential-ai-adoption</guid>
      <pubDate>Thu, 15 Jan 2026 16:00:00 GMT</pubDate>
      <dc:date>2026-01-15T16:00:00.000Z</dc:date>
      <description><![CDATA[A new CSA report stresses getting out in front of AI risk — and why it matters for SecOps.]]></description>
      <dc:creator><![CDATA[John P. Mello Jr.]]></dc:creator>
      <enclosure url="https://www.reversinglabs.com/api/media/file/guardrail-ai-adoption.jpg" type="image/jpeg" />
      <category><![CDATA[Security Operations]]></category>
    </item>
    <item>
      <title><![CDATA[Shai-hulud post-mortem: A call to action on AppSec]]></title>
      <link>https://www.reversinglabs.com/blog/shai-hulud-call-to-action</link>
      <guid>https://www.reversinglabs.com/blog/shai-hulud-call-to-action</guid>
      <pubDate>Wed, 14 Jan 2026 16:00:00 GMT</pubDate>
      <dc:date>2026-01-14T16:00:00.000Z</dc:date>
      <description><![CDATA[Trigger.dev's experience shows that you need modern controls to combat today's supply chain attacks.]]></description>
      <dc:creator><![CDATA[Jaikumar Vijayan]]></dc:creator>
      <enclosure url="https://www.reversinglabs.com/api/media/file/Shai-hulud%20worm.png" type="image/jpeg" />
      <category><![CDATA[AppSec & Supply Chain Security]]></category>
    </item>
    <item>
      <title><![CDATA[Adversarial AI is on the rise: What you need to know]]></title>
      <link>https://www.reversinglabs.com/blog/adversarial-ai-rise</link>
      <guid>https://www.reversinglabs.com/blog/adversarial-ai-rise</guid>
      <pubDate>Tue, 13 Jan 2026 16:00:00 GMT</pubDate>
      <dc:date>2026-01-13T16:00:00.000Z</dc:date>
      <description><![CDATA[Researchers explain that as threat actors move to AI-enabled malware in active operations, existing defenses will fail.]]></description>
      <dc:creator><![CDATA[John P. Mello Jr.]]></dc:creator>
      <enclosure url="https://www.reversinglabs.com/api/media/file/adversarial-ai-risk.jpg" type="image/jpeg" />
      <category><![CDATA[Security Operations]]></category>
    </item>
    <item>
      <title><![CDATA[How supply chain risk can affect cyber insurance]]></title>
      <link>https://www.reversinglabs.com/blog/supply-chain-risk-insurance</link>
      <guid>https://www.reversinglabs.com/blog/supply-chain-risk-insurance</guid>
      <pubDate>Thu, 08 Jan 2026 16:00:00 GMT</pubDate>
      <dc:date>2026-01-08T16:00:00.000Z</dc:date>
      <description><![CDATA[Gaining visibility into supply chain threats — and adding controls for software risk — are essential to insurability.]]></description>
      <dc:creator><![CDATA[Ericka Chickowski]]></dc:creator>
      <enclosure url="https://www.reversinglabs.com/api/media/file/supply-chain-risk-insurance.jpg" type="image/jpeg" />
      <category><![CDATA[AppSec & Supply Chain Security]]></category>
    </item>
    <item>
      <title><![CDATA[AI technical debt: What it is — and why it matters]]></title>
      <link>https://www.reversinglabs.com/blog/ai-technical-debt</link>
      <guid>https://www.reversinglabs.com/blog/ai-technical-debt</guid>
      <pubDate>Wed, 07 Jan 2026 16:00:00 GMT</pubDate>
      <dc:date>2026-01-07T16:00:00.000Z</dc:date>
      <description><![CDATA[AI platforms exacerbate existing security risks. Here’s what you need to know to stay out of technical debt. ]]></description>
      <dc:creator><![CDATA[John P. Mello Jr.]]></dc:creator>
      <enclosure url="https://www.reversinglabs.com/api/media/file/ai-technical-debt.jpg" type="image/jpeg" />
      <category><![CDATA[Security Operations]]></category>
    </item>
    <item>
      <title><![CDATA[Unpacking the packer ‘pkr_mtsi’]]></title>
      <link>https://www.reversinglabs.com/blog/unpacking-pkr_mtsi</link>
      <guid>https://www.reversinglabs.com/blog/unpacking-pkr_mtsi</guid>
      <pubDate>Tue, 06 Jan 2026 16:00:00 GMT</pubDate>
      <dc:date>2026-01-06T16:00:00.000Z</dc:date>
      <description><![CDATA[This RL Researcher’s Notebook highlights the packer’s evolution — and offers a YARA rule to detect all versions. ]]></description>
      <dc:creator><![CDATA[Robert Simmons]]></dc:creator>
      <enclosure url="https://www.reversinglabs.com/api/media/file/RL-Researcher's-Notebook.jpg" type="image/jpeg" />
      <category><![CDATA[Threat Research]]></category>
    </item>
    <item>
      <title><![CDATA[SF² aims to help you scale SecOps wisely ]]></title>
      <link>https://www.reversinglabs.com/blog/software-factory-security-framework-secops</link>
      <guid>https://www.reversinglabs.com/blog/software-factory-security-framework-secops</guid>
      <pubDate>Tue, 30 Dec 2025 16:00:00 GMT</pubDate>
      <dc:date>2025-12-30T16:00:00.000Z</dc:date>
      <description><![CDATA[The Software Factory Security Framework eyes scaling SecOps as a resource problem — not just head count.]]></description>
      <dc:creator><![CDATA[Jaikumar Vijayan]]></dc:creator>
      <enclosure url="https://www.reversinglabs.com/api/media/file/software-factory.jpg" type="image/jpeg" />
      <category><![CDATA[Security Operations]]></category>
    </item>
    <item>
      <title><![CDATA[AI is upending file security. Here’s how to fight back]]></title>
      <link>https://www.reversinglabs.com/blog/ai-file-security-fight-back</link>
      <guid>https://www.reversinglabs.com/blog/ai-file-security-fight-back</guid>
      <pubDate>Tue, 23 Dec 2025 16:00:00 GMT</pubDate>
      <dc:date>2025-12-23T16:00:00.000Z</dc:date>
      <description><![CDATA[As attacks become AI-optimized and internal AI use rises, enterprises need to modernize their file security strategy. ]]></description>
      <dc:creator><![CDATA[Todd R. Weiss]]></dc:creator>
      <enclosure url="https://www.reversinglabs.com/api/media/file/ai-file-security.jpg" type="image/jpeg" />
      <category><![CDATA[Security Operations]]></category>
    </item>
    <item>
      <title><![CDATA[OWASP tackles AI risk in bold new push]]></title>
      <link>https://www.reversinglabs.com/blog/owasp-tackles-ai-risk-in-bold-new-push</link>
      <guid>https://www.reversinglabs.com/blog/owasp-tackles-ai-risk-in-bold-new-push</guid>
      <pubDate>Thu, 18 Dec 2025 16:00:00 GMT</pubDate>
      <dc:date>2025-12-18T16:00:00.000Z</dc:date>
      <description><![CDATA[The Open Worldwide Application Security Project now includes an Agentic Top 10, an AI testing guide, and an AI vulnerability scoring tool.]]></description>
      <dc:creator><![CDATA[John P. Mello Jr.]]></dc:creator>
      <enclosure url="https://www.reversinglabs.com/api/media/file/ai-risk-uphill-push.jpg" type="image/jpeg" />
      <category><![CDATA[AppSec & Supply Chain Security]]></category>
    </item>
    <item>
      <title><![CDATA[NuGet malware targets Nethereum tools]]></title>
      <link>https://www.reversinglabs.com/blog/nuget-malware-crypto-oauth-tokens</link>
      <guid>https://www.reversinglabs.com/blog/nuget-malware-crypto-oauth-tokens</guid>
      <pubDate>Wed, 17 Dec 2025 16:00:00 GMT</pubDate>
      <dc:date>2025-12-17T16:00:00.000Z</dc:date>
      <description><![CDATA[Highlighting an alarming trend, RL has discovered malicious packages targeting crypto wallets and OAuth tokens to steal funds.]]></description>
      <dc:creator><![CDATA[Petar Kirhmajer]]></dc:creator>
      <enclosure url="https://www.reversinglabs.com/api/media/file/Malicious-NuGet.jpg" type="image/jpeg" />
      <category><![CDATA[Threat Research]]></category>
    </item>
    <item>
      <title><![CDATA[Leveraging Spectra Assure and EDR to Mitigate Third-Party Software Risk]]></title>
      <link>https://www.reversinglabs.com/blog/spectra-assure-crowdstrike-tprm</link>
      <guid>https://www.reversinglabs.com/blog/spectra-assure-crowdstrike-tprm</guid>
      <pubDate>Tue, 16 Dec 2025 16:00:00 GMT</pubDate>
      <dc:date>2025-12-16T16:00:00.000Z</dc:date>
      <description><![CDATA[Here’s how to create a compensating control in Crowdstrike to mitigate specific risks in a commercial software package.]]></description>
      <dc:creator><![CDATA[Dave Ferguson]]></dc:creator>
      <category><![CDATA[Products & Technology]]></category>
    </item>
    <item>
      <title><![CDATA[NDAA puts AI cyber risk in the crosshairs]]></title>
      <link>https://www.reversinglabs.com/blog/ndaa-ai-risk</link>
      <guid>https://www.reversinglabs.com/blog/ndaa-ai-risk</guid>
      <pubDate>Thu, 11 Dec 2025 16:00:00 GMT</pubDate>
      <dc:date>2025-12-11T16:00:00.000Z</dc:date>
      <description><![CDATA[What does the future of AI security look like? The latest National Defense Authorization Act gives us a glimpse.]]></description>
      <dc:creator><![CDATA[Saša Zdjelar]]></dc:creator>
      <enclosure url="https://www.reversinglabs.com/api/media/file/dod-ndaa.jpg" type="image/jpeg" />
      <category><![CDATA[Products & Technology]]></category>
    </item>
    <item>
      <title><![CDATA[VS Code extensions contain trojan-laden image]]></title>
      <link>https://www.reversinglabs.com/blog/malicious-vs-code-fake-image</link>
      <guid>https://www.reversinglabs.com/blog/malicious-vs-code-fake-image</guid>
      <pubDate>Wed, 10 Dec 2025 18:00:00 GMT</pubDate>
      <dc:date>2025-12-10T18:00:00.000Z</dc:date>
      <description><![CDATA[RL researchers have identified 19 malicious extensions on the VS Code Marketplace — the majority containing a malicious file posing as a PNG.]]></description>
      <dc:creator><![CDATA[Petar Kirhmajer]]></dc:creator>
      <enclosure url="https://www.reversinglabs.com/api/media/file/Malicious-VS-Code-extensions-use-fake-image-containing-a-trojan.webp" type="image/jpeg" />
      <category><![CDATA[Threat Research]]></category>
    </item>
    <item>
      <title><![CDATA[New Shai-hulud worm spreads: What to know]]></title>
      <link>https://www.reversinglabs.com/blog/new-shai-hulud-worm-spreads-what-to-know</link>
      <guid>https://www.reversinglabs.com/blog/new-shai-hulud-worm-spreads-what-to-know</guid>
      <pubDate>Tue, 09 Dec 2025 17:00:00 GMT</pubDate>
      <dc:date>2025-12-09T17:00:00.000Z</dc:date>
      <description><![CDATA[Shai-hulud 2.0 malware has spread to 795 npm packages — and been downloaded more than 100M times.]]></description>
      <dc:creator><![CDATA[Tomislav Peričin]]></dc:creator>
      <enclosure url="https://www.reversinglabs.com/api/media/file/Shai-huld-The-Second-Coming.webp" type="image/jpeg" />
      <category><![CDATA[Threat Research]]></category>
    </item>
    <item>
      <title><![CDATA[5 ways AI will transform the SOC]]></title>
      <link>https://www.reversinglabs.com/blog/5-ways-ai-will-transform-the-soc</link>
      <guid>https://www.reversinglabs.com/blog/5-ways-ai-will-transform-the-soc</guid>
      <pubDate>Tue, 09 Dec 2025 16:00:00 GMT</pubDate>
      <dc:date>2025-12-09T16:00:00.000Z</dc:date>
      <description><![CDATA[AI will reshape SecOps by tackling alert fatigue and streamlining workflows, for starters. Here’s what to expect.]]></description>
      <dc:creator><![CDATA[Jaikumar Vijayan]]></dc:creator>
      <enclosure url="https://www.reversinglabs.com/api/media/file/ai-transforms-soc.jpg" type="image/jpeg" />
      <category><![CDATA[Security Operations]]></category>
    </item>
    <item>
      <title><![CDATA[Security frameworks fail on supply chain risk]]></title>
      <link>https://www.reversinglabs.com/blog/security-frameworks-fail-supply-chain</link>
      <guid>https://www.reversinglabs.com/blog/security-frameworks-fail-supply-chain</guid>
      <pubDate>Thu, 04 Dec 2025 16:00:00 GMT</pubDate>
      <dc:date>2025-12-04T16:00:00.000Z</dc:date>
      <description><![CDATA[Researchers studied how well the top frameworks mitigate modern attack techniques. They found serious security gaps.]]></description>
      <dc:creator><![CDATA[John P. Mello Jr.]]></dc:creator>
      <enclosure url="https://www.reversinglabs.com/api/media/file/security-frameworks-fail.jpg" type="image/jpeg" />
      <category><![CDATA[AppSec & Supply Chain Security]]></category>
    </item>
    <item>
      <title><![CDATA[Why AI and cloud-native are security game-changers]]></title>
      <link>https://www.reversinglabs.com/blog/ai-cloud-native-game-changers</link>
      <guid>https://www.reversinglabs.com/blog/ai-cloud-native-game-changers</guid>
      <pubDate>Wed, 03 Dec 2025 16:00:00 GMT</pubDate>
      <dc:date>2025-12-03T16:00:00.000Z</dc:date>
      <description><![CDATA[Yesterday's security practices can't tackle today's risks, a new CSA guide notes — making updating tooling essential. ]]></description>
      <dc:creator><![CDATA[John P. Mello Jr.]]></dc:creator>
      <enclosure url="https://www.reversinglabs.com/api/media/file/cloud-ai-game-changer.jpg" type="image/jpeg" />
      <category><![CDATA[AppSec & Supply Chain Security]]></category>
    </item>
    <item>
      <title><![CDATA[RL Threat Intelligence: Context Changes Everything]]></title>
      <link>https://www.reversinglabs.com/blog/reversinglabs-browser-extension-threat-intelligence</link>
      <guid>https://www.reversinglabs.com/blog/reversinglabs-browser-extension-threat-intelligence</guid>
      <pubDate>Tue, 02 Dec 2025 16:00:00 GMT</pubDate>
      <dc:date>2025-12-02T16:00:00.000Z</dc:date>
      <description><![CDATA[Learn how the ReversingLabs Browser Extension operationalizes RL threat intelligence cloud in powerful ways.]]></description>
      <dc:creator><![CDATA[Jim Wojno]]></dc:creator>
      <author><![CDATA[jim.wojno@reversinglabs.com (Jim Wojno)]]></author>
      <enclosure url="https://www.reversinglabs.com/api/media/file/ReversingLabs-Threat-Intelligence-Cover.webp" type="image/jpeg" />
      <category><![CDATA[Products & Technology]]></category>
    </item>
    <item>
      <title><![CDATA[Bootstrap script exposes PyPI to domain takeovers]]></title>
      <link>https://www.reversinglabs.com/blog/bootstrap-script-exposes-pypi-to-domain-takeover-attack</link>
      <guid>https://www.reversinglabs.com/blog/bootstrap-script-exposes-pypi-to-domain-takeover-attack</guid>
      <pubDate>Wed, 26 Nov 2025 13:00:00 GMT</pubDate>
      <dc:date>2025-11-26T13:00:00.000Z</dc:date>
      <description><![CDATA[Proving the road to takeover is paved with setuptools alternatives, the script for a popular Python package for building and installing PyPI packages leaves them vulnerable.]]></description>
      <dc:creator><![CDATA[Vladimir Pezo]]></dc:creator>
      <author><![CDATA[vladimir.pezo@reversinglabs.com (Vladimir Pezo)]]></author>
      <enclosure url="https://www.reversinglabs.com/api/media/file/PyPI_domain_takeover.webp" type="image/jpeg" />
      <category><![CDATA[Threat Research]]></category>
    </item>
    <item>
      <title><![CDATA[OWASP Top 10 tackles supply chain risk]]></title>
      <link>https://www.reversinglabs.com/blog/owasp-top-10-supply-chain-risk</link>
      <guid>https://www.reversinglabs.com/blog/owasp-top-10-supply-chain-risk</guid>
      <pubDate>Thu, 20 Nov 2025 16:00:00 GMT</pubDate>
      <dc:date>2025-11-20T16:00:00.000Z</dc:date>
      <description><![CDATA[The Open Worldwide Application Security Project’s widely used AppSec priority list is expanding to cover systemic risk.]]></description>
      <dc:creator><![CDATA[John P. Mello Jr.]]></dc:creator>
      <enclosure url="https://www.reversinglabs.com/api/media/file/supply-chain-risk.jpg" type="image/jpeg" />
      <category><![CDATA[AppSec & Supply Chain Security]]></category>
    </item>
    <item>
      <title><![CDATA[Software quality's decline: How AI accelerates it]]></title>
      <link>https://www.reversinglabs.com/blog/software-quality-collapse-ai-accelerate</link>
      <guid>https://www.reversinglabs.com/blog/software-quality-collapse-ai-accelerate</guid>
      <pubDate>Tue, 18 Nov 2025 16:00:00 GMT</pubDate>
      <dc:date>2025-11-18T16:00:00.000Z</dc:date>
      <description><![CDATA[Development is in freefall toward software entropy and insecurity. Can spec-driven development help?]]></description>
      <dc:creator><![CDATA[Ericka Chickowski]]></dc:creator>
      <enclosure url="https://www.reversinglabs.com/api/media/file/software-quality-collapse.jpg" type="image/jpeg" />
      <category><![CDATA[Dev & DevSecOps]]></category>
    </item>
    <item>
      <title><![CDATA[CTEM advances vulnerability management]]></title>
      <link>https://www.reversinglabs.com/blog/ctem-advances-vulnerability-management</link>
      <guid>https://www.reversinglabs.com/blog/ctem-advances-vulnerability-management</guid>
      <pubDate>Tue, 18 Nov 2025 16:00:00 GMT</pubDate>
      <dc:date>2025-11-18T16:00:00.000Z</dc:date>
      <description><![CDATA[Gartner's Continuous Threat Exposure Management model represents an evolution from CVSS. Here’s what you need to know.]]></description>
      <dc:creator><![CDATA[John P. Mello Jr.]]></dc:creator>
      <enclosure url="https://www.reversinglabs.com/api/media/file/vm-evolve-ctem.jpg" type="image/jpeg" />
      <category><![CDATA[AppSec & Supply Chain Security]]></category>
    </item>
    <item>
      <title><![CDATA[Vet PowerShell Modules with Spectra Assure Community]]></title>
      <link>https://www.reversinglabs.com/blog/vet-powershell-modules-spectra-assure-community</link>
      <guid>https://www.reversinglabs.com/blog/vet-powershell-modules-spectra-assure-community</guid>
      <pubDate>Thu, 13 Nov 2025 16:00:00 GMT</pubDate>
      <dc:date>2025-11-13T16:00:00.000Z</dc:date>
      <description><![CDATA[PowerShell's broad use and open access make it an attractive target for supply chain attacks. Here's how Spectra Assure Community can help.]]></description>
      <dc:creator><![CDATA[Jasmine Noel]]></dc:creator>
      <enclosure url="https://www.reversinglabs.com/api/media/file/Vet-Your-PowerShell.webp" type="image/jpeg" />
      <category><![CDATA[Products & Technology]]></category>
    </item>
    <item>
      <title><![CDATA[AI vulnerability reporting fails maintainers]]></title>
      <link>https://www.reversinglabs.com/blog/ai-vulnerability-reporting-fails</link>
      <guid>https://www.reversinglabs.com/blog/ai-vulnerability-reporting-fails</guid>
      <pubDate>Wed, 12 Nov 2025 16:00:00 GMT</pubDate>
      <dc:date>2025-11-12T16:00:00.000Z</dc:date>
      <description><![CDATA[Google and others are inundating developers with AI-driven reporting. Are AI-enabled fixes the answer? ]]></description>
      <dc:creator><![CDATA[Paul Roberts]]></dc:creator>
      <enclosure url="https://www.reversinglabs.com/api/media/file/developer-stress.jpg" type="image/jpeg" />
      <category><![CDATA[AppSec & Supply Chain Security]]></category>
    </item>
    <item>
      <title><![CDATA[MITRE ATT&CK v18: What’s in it — and why it matters]]></title>
      <link>https://www.reversinglabs.com/blog/mitre-attck-v18-whats-in-it--and-why-it-matters</link>
      <guid>https://www.reversinglabs.com/blog/mitre-attck-v18-whats-in-it--and-why-it-matters</guid>
      <pubDate>Tue, 11 Nov 2025 16:00:00 GMT</pubDate>
      <dc:date>2025-11-11T16:00:00.000Z</dc:date>
      <description><![CDATA[Learn what’s been added to the framework — and how you can use it to advance your threat detection and response.]]></description>
      <dc:creator><![CDATA[Jaikumar Vijayan]]></dc:creator>
      <enclosure url="https://www.reversinglabs.com/api/media/file/att%26ckv18.png" type="image/jpeg" />
      <category><![CDATA[Security Operations]]></category>
    </item>
  </channel>
</rss>