
Inside the EmEditor supply chain compromise
By combining early infrastructure detection with supply chain security controls you can give your defenders a leg up.

By combining early infrastructure detection with supply chain security controls you can give your defenders a leg up.

This RL Researcher’s Notebook highlights the packer’s evolution — and offers a YARA rule to detect all versions.

RL's analysis of an STD Group-operated RAT yielded file indicators to better detect the malware and two YARA rules.
Get your 14-day free trial of Spectra Assure for Software Supply Chain Security
Get Free TrialMore about Spectra Assure Free Trial