
SupPy Chain Malware - Detecting malware in package manager repositories
Malicious actors are constantly on the lookout for new attack vectors and techniques, using them to infiltrate even the most secure of organizations.

Malicious actors are constantly on the lookout for new attack vectors and techniques, using them to infiltrate even the most secure of organizations.

Blog 1 of 5 part series on advanced research into modern phishing attacks

Blog 5: Subverting trust with digital counterfeits

Blog 4: You are you, but so am I - certificate impersonation

Tampering with signed objects without breaking the integrity seal

Blog 2: Trust-based models in the age of supply chain attacks

Blog 1: Building secure certificate whitelists

Operation ShadowHammer is a new and highly targeted supply chain attack discovered by Kaspersky Lab.

Guest blog by Edvard Amoroso, Founder and CEO of TAG Cyber

The natural order of things is to evolve, so it was just a matter of time until obfuscations and variations would start appearing in the wild.

Join ReversingLabs Research on a Threat Hunt for revoked D-Link certificates

A 17-year-old vulnerability in Microsoft Office Equation Editor is now confirmed to be exploited by the Cobalt Group

BadRabbit a previously unknown ransomware family which started spreading on October 24th

One constant challenge of modern security will always be the difference between published and implemented specifications.

Learn how to do in depth analysis of compressed and encrypted binary files.
Get your 14-day free trial of Spectra Assure
Get Free TrialMore about Spectra Assure Free Trial