
Tracking an evolving Discord-based RAT family
RL's analysis of an STD Group-operated RAT yielded file indicators to better detect the malware and two YARA rules.

RL's analysis of an STD Group-operated RAT yielded file indicators to better detect the malware and two YARA rules.

RL researchers detected the first self-replicating worm that compromised npm packages with cloud token-stealing malware. Here's what you need to know.

RL discovered how the crypto contracts were abused — and how this incident is tied to a larger campaign to promote malicious packages on top repositories.

RL has discovered a loophole on VS Code Marketplace that allows threat actors to reuse legitimate, removed package names for malicious purposes.

The eslint-config-prettier package exposed more than 10,000 dependent projects. The incident highlights the growing risks in automated dependency updating.

ETHcode, a VS Code extension for Ethereum smart contract development, was compromised following a GitHub pull request.

ReversingLabs researchers discovered more than 60 GitHub repositories that contain hundreds of trojanized files.

RL researchers detected a new malicious campaign that exploits the Pickle file format on the Python Package Index.

RL researchers detected a sophisticated, malicious package believed to be an ongoing campaign that may be linked to a hacktivist gang.

ReversingLabs’ YARA detection rule for Conti can help you detect this ransomware in your environment. We provide tools and information that you can use to spot CONTI at work in your environment.

A new Python package revives the name of a malicious module to steal source code and secrets from blockchain developers’ machines.

RL researchers have identified yet another npm package that uses malicious patching of local software to hijack cryptocurrency transfers.

RL researchers detected two Python libraries that are designed to steal sensitive data while posing as fixes for a popular cryptocurrency library.

For the first time, RL researchers discover malicious locally-installed npm packages infecting other legitimate packages.

Software development teams working on machine learning take note: RL threat researchers have identified nullifAI, a novel attack technique used on Hugging Face.
Get your 14-day free trial of Spectra Assure
Get Free TrialMore about Spectra Assure Free Trial