
How to Prioritize High-Risk Phishing Attacks You Otherwise Miss
Read More about How to Prioritize High-Risk Phishing Attacks You Otherwise Miss
Read More about How to Prioritize High-Risk Phishing Attacks You Otherwise Miss
Malicious actors are constantly on the lookout for new attack vectors and techniques, using them to infiltrate even the most secure of organizations.
Read More about SupPy Chain Malware - Detecting malware in package manager repositoriesBlog 1 of 5 part series on advanced research into modern phishing attacks
Read More about Catching deceptive links before the clickBlog 5: Subverting trust with digital counterfeits
Read More about Digital Certificates - Models for Trust and Targets for Misuse 5Blog 4: You are you, but so am I - certificate impersonation
Read More about Digital Certificates – Models for Trust and Targets for Misuse 4Tampering with signed objects without breaking the integrity seal
Read More about Digital Certificates – Models for Trust and Targets for Misuse 3Blog 2: Trust-based models in the age of supply chain attacks
Read More about Digital Certificates – Models for Trust and Targets for Misuse 2Blog 1: Building secure certificate whitelists
Read More about Digital Certificates – Models for Trust and Targets for Misuse 1Operation ShadowHammer is a new and highly targeted supply chain attack discovered by Kaspersky Lab.
Read More about Forging the ShadowHammerGuest blog by Edvard Amoroso, Founder and CEO of TAG Cyber
Read More about Integrating Isolation with AnalyticsThe natural order of things is to evolve, so it was just a matter of time until obfuscations and variations would start appearing in the wild.
Read More about Three New DDE Obfuscation MethodsJoin ReversingLabs Research on a Threat Hunt for revoked D-Link certificates
Read More about Detecting Certificate-Signed MalwareA 17-year-old vulnerability in Microsoft Office Equation Editor is now confirmed to be exploited by the Cobalt Group
Read More about ReversingLabs' YARA rule detects a Cobalt payload exploiting CVE-2017-11882One constant challenge of modern security will always be the difference between published and implemented specifications.
Read More about Constant Insecurity: Things you didn’t know about (PE) Portable Executable file formatLearn how to do in depth analysis of compressed and encrypted binary files.
Read More about Reverse engineering software protectionsGet your 14-day free trial of Spectra Assure
Get Free TrialMore about Spectra Assure Free Trial