
Third-party code comes with some baggage
Recognizing risks introduced by statically linked third-party libraries

Recognizing risks introduced by statically linked third-party libraries

They say there’s no such thing as bad press, but getting name recognition for a data breach never feels good. Enter Codecov.

Relying on legacy functionalities comes with inherent security risks

One of the core tenets of computer science is code reuse.


The SunBurst supply chain attack, which was behind the breach of SolarWinds, took sophistication and patience.

Tearing Down HWP Files To Expose a Trojan

When malware lasts longer than your washing machine

YARA is a useful member of the toolset of researchers, threat hunters, incident responder, and many other defenders.

Enriching public threat intelligence
Get your 14-day free trial of Spectra Assure
Get Free TrialMore about Spectra Assure Free Trial