RL Blog

Latest

3 Ways High-Priority Malware Detection Can Fill SOC Gaps

3 Ways High-Priority Malware Detection Can Fill SOC Gaps

Given today’s threat landscape, operating an enterprise Security Operations Center (SOC) presents a high-stakes challenges. With modern IT infrastructures comprised of a labyrinth of assets, endpoints, and third-party dependencies, threat actors continue to succeed in infiltrating vulnerable systems with inherently sophisticated, difficult-to-detect malware.
Read More
Highlights from Black Hat USA 2019

Highlights from Black Hat USA 2019

Last week the 22nd annual Black Hat conference hosted over 19,000 security professionals in Las Vegas. By all measures, it was a great event, particularly for ReversingLabs, and we wanted to share a few exciting outcomes and informative findings.
Read More
How Detecting High Priority Malware will Accelerate Quality App Development and Release

How Detecting High Priority Malware will Accelerate Quality App Development and Release

When it comes to malware's persistent threat to your business, we typically discuss risk in context to failed compliance with regulations, or we talk about data loss, or we focus on fears around business continuity. But internal application quality and the software supply chain are often left out of the conversation — likely because the risk remains somewhat ambiguous.
Read More
What Are Supply Chain Attacks? How to Protect Your Software Lifecycle

What Are Supply Chain Attacks? How to Protect Your Software Lifecycle

Traditional supply chain attacks impact the production of physical goods. Your supply chain might include partners delivering raw materials, component parts used in manufacturing, as well as distribution of finished goods.Disruption of that supply chain could result in production shutdowns, aging inventory, degraded partner relations, and financial loss.
Read More
Visit ReversingLabs at Black Hat 2019

Visit ReversingLabs at Black Hat 2019

Black Hat and ReversingLabs have a long history together - in 2009 we presented for the first time, and this year represents our 10th anniversary as a company. And as fate would have it, this year ReversingLabs has been named a finalist in the Black Unicorn Awards, part of the Cyber Defense Awards which is sponsored by Cyber Defense Magazine. This recognition as one of 30 Cybersecurity Companies with the potential for $1B valuation is a tremendous honor.
Read More
The Power of Automated Static Analysis

The Power of Automated Static Analysis

Automated static analysis is not subject to traditional virtualization and sandbox evasion techniques and takes place in milliseconds, regardless of file type, size, target OS or platform.
Read More

    Special Reports

    Latest Blog Posts

    Chinese APT Group Exploits SOHO Routers Chinese APT Group Exploits SOHO Routers

    Conversations About Threat Hunting and Software Supply Chain Security

    Reproducible Builds: Graduate Your Software Supply Chain Security Reproducible Builds: Graduate Your Software Supply Chain Security

    Glassboard conversations with ReversingLabs Field CISO Matt Rose

    Software Package Deconstruction: Video Conferencing Software Software Package Deconstruction: Video Conferencing Software

    Analyzing Risks To Your Software Supply Chain