RL Blog

Latest

Visit ReversingLabs at Black Hat 2019

Visit ReversingLabs at Black Hat 2019

Black Hat and ReversingLabs have a long history together - in 2009 we presented for the first time, and this year represents our 10th anniversary as a company. And as fate would have it, this year ReversingLabs has been named a finalist in the Black Unicorn Awards, part of the Cyber Defense Awards which is sponsored by Cyber Defense Magazine. This recognition as one of 30 Cybersecurity Companies with the potential for $1B valuation is a tremendous honor.
Read More
The Power of Automated Static Analysis

The Power of Automated Static Analysis

Automated static analysis is not subject to traditional virtualization and sandbox evasion techniques and takes place in milliseconds, regardless of file type, size, target OS or platform.
Read More
Machine Learning: A Belt and Suspenders Approach

Machine Learning: A Belt and Suspenders Approach

A belt and suspenders strategy won't win you any fashion awards, but it can save you from embarrassingly being caught with your pants down in a successful cyber-attack. However, unlike wearing two devices to hold up your pants, cybersecurity professionals can combine overlapping technologies to provide significant synergies that exceed the sum of their parts. That makes a belt and suspenders approach a sound strategy for cybersecurity.
Read More

    Special Reports

    Latest Blog Posts

    Chinese APT Group Exploits SOHO Routers Chinese APT Group Exploits SOHO Routers

    Conversations About Threat Hunting and Software Supply Chain Security

    Reproducible Builds: Graduate Your Software Supply Chain Security Reproducible Builds: Graduate Your Software Supply Chain Security

    Glassboard conversations with ReversingLabs Field CISO Matt Rose

    Software Package Deconstruction: Video Conferencing Software Software Package Deconstruction: Video Conferencing Software

    Analyzing Risks To Your Software Supply Chain