RL Blog

Latest

Mirai Botnet Continues to Plague IoT Space

Mirai Botnet Continues to Plague IoT Space

With growing interest in the potential of IoT and connected things, attackers have found opportunities to exploit these devices. New malware and botnets are being specifically built to target IoT devices.
Read More
The PDF invoice that phished you

The PDF invoice that phished you

Phishing attacks are deception attempts that try to trick a person into clicking a link that leads to a credential-stealing page or a malicious application download. Relying on social engineering tactics, they have the potential to grant attackers unauthorized access to infrastructure, services, or information.
Read More
Ransomware in exotic email attachments

Ransomware in exotic email attachments

In the software arena, winning the mind share means becoming widespread to the point of being considered a de facto standard. And when it comes to the ways in which information is shared, this means being the object format everyone gravitates to. While aspirational for many software vendors, such success is impossible to predict, difficult to achieve, and challenging to maintain.
Read More
Catching deceptive links before the phish

Catching deceptive links before the phish

A person may not necessarily have to be a security expert to know when the URL is a bit off. One might feel that the domain is unusually long, or that there are not that many popular websites ending with the top-level domain .services. But what if an average user saw one of these URLs next to a green lock and letters saying Secure? Would they stop to think twice?
Read More
Catching deceptive links before the click

Catching deceptive links before the click

Email-based attacks are a nightmare personified for every defender out there. The average organization receives thousands upon thousands of email messages carrying attachments and links every day.
Read More

    Special Reports

    Latest Blog Posts

    Chinese APT Group Exploits SOHO Routers Chinese APT Group Exploits SOHO Routers

    Conversations About Threat Hunting and Software Supply Chain Security

    Reproducible Builds: Graduate Your Software Supply Chain Security Reproducible Builds: Graduate Your Software Supply Chain Security

    Glassboard conversations with ReversingLabs Field CISO Matt Rose

    Software Package Deconstruction: Video Conferencing Software Software Package Deconstruction: Video Conferencing Software

    Analyzing Risks To Your Software Supply Chain