
Catching lateral movement in internal emails
Blog 4 of 5 part series on advanced research into modern phishing attacks

Blog 4 of 5 part series on advanced research into modern phishing attacks

Blog 3 of 5 part series on advanced research into modern phishing attacks

Blog 2 of 5 part series on advanced research into modern phishing attacks


Malicious actors are constantly on the lookout for new attack vectors and techniques, using them to infiltrate even the most secure of organizations.

Blog 1 of 5 part series on advanced research into modern phishing attacks

Blog 5: Subverting trust with digital counterfeits

Blog 4: You are you, but so am I - certificate impersonation

Tampering with signed objects without breaking the integrity seal

Blog 2: Trust-based models in the age of supply chain attacks

Blog 1: Building secure certificate whitelists

Operation ShadowHammer is a new and highly targeted supply chain attack discovered by Kaspersky Lab.

Guest blog by Edvard Amoroso, Founder and CEO of TAG Cyber

The natural order of things is to evolve, so it was just a matter of time until obfuscations and variations would start appearing in the wild.

Join ReversingLabs Research on a Threat Hunt for revoked D-Link certificates
Get your 14-day free trial of Spectra Assure
Get Free TrialMore about Spectra Assure Free Trial