
How to harden machine learning models against adversarial attacks
As attacks become more sophisticated, it is imperative to harden machine learning (ML) models and reduce the adversary’s ability to evade detection.

As attacks become more sophisticated, it is imperative to harden machine learning (ML) models and reduce the adversary’s ability to evade detection.

A malicious Python file found on the PyPI repository adds backdoor and data exfiltration features to what appears to be a legitimate SDK client from SentinelOne.

Days after researchers for Phylum and Checkmarx revealed an ongoing software supply chain attack spreading the W4SP Stealer malware through malicious packages on the Python Package Index (PyPI), ReversingLabs researchers discovered 10 additional PyPI packages pushing modified versions of W4SP that were overlooked.

ReversingLabs Malware Researcher Joseph Edwards takes a deep dive into ZetaNile, a set of open-source software trojans being used by Lazarus/ZINC.

New malware appears or evolves daily, so updating tools like YARA rules for detection is critical. Here's how my research team develops YARA rules.

ReversingLabs’ YARA detection rule for GwisinLocker can help you find this ransomware in your environment.

ReversingLabs’ YARA detection rule for LockBit can help you detect this malicious ransomware in your environment. We break it down for you here.

Discrepancies in reports to the national vulnerability databases (NVD) show the U.S. lags behind China, exposing U.S. firms to cyber attacks.

ReversingLabs’ YARA detection rule for Nokoyawa can help you find this ransomware in your environment.

ReversingLabs has discovered a malicious npm package disguised as the software tool Material Tailwind. Here's an in-depth look at our discovery — and threat analysis.

ReversingLabs’ YARA detection rule for GoodWill can help you find this ransomware in your environment.

In our latest episode of the ConversingLabs podcast, host Paul Roberts interviews ReversingLabs researcher Joseph Edwards about his analysis of Follina, a newly discovered exploit with a pretty name, but nasty intentions.

ReversingLabs’ open source YARA detection rule for Blue Locker can help you find this ransomware in your environment.

ReversingLabs’ YARA detection rule for Acepy can help you find this ransomware in your environment.

After a recent discovery of malicious PyPI packages, questions remain about the security community’s ability to mitigate threats posed to open source repositories.
Get your 14-day free trial of Spectra Assure
Get Free TrialMore about Spectra Assure Free Trial