Products & Technology (3)

May 6, 2020

Introducing Explainable Threat Intelligence

Next-generation threat detection and hunting algorithms built for humans
February 18, 2020

Introducing Explainable Machine Learning

Observing the direction other security companies have taken, we at ReversingLabs felt that something big was missing: No one was focusing on the human element. We found that there wasn't a solution in the market that tried to bridge the gap between detecting malware and helping analysts understand why such detections happened in the first place.
November 27, 2019

10 Billion Files Classified

ReversingLabs passes new milestone in bringing authoratative file intelligence to Security Operations teams
September 25, 2019

Going Beyond Files: Destructive Object Analysis

Malware analysis adapts in response to more complex destructive objects
June 27, 2019

The Power of Automated Static Analysis

Automated static analysis is not subject to traditional virtualization and sandbox evasion techniques and takes place in milliseconds, regardless of file type, size, target OS or platform.
January 14, 2019

Customer Use Case: Combatting Undetected Malware with Tanium and ReversingLabs

We’ve seen some exciting customer results from our partnership with Tanium. This blog focuses on the results and lessons learned from a proof of concept (PoC) completed with one of these customers.
December 13, 2018

Machine Learning: A Belt and Suspenders Approach

A belt and suspenders strategy won't win you any fashion awards, but it can save you from embarrassingly being caught with your pants down in a successful cyber-attack. However, unlike wearing two devices to hold up your pants, cybersecurity professionals can combine overlapping technologies to provide significant synergies that exceed the sum of their parts. That makes a belt and suspenders approach a sound strategy for cybersecurity.