Spectra Assure Free Trial

Get your 14-day free trial of Spectra Assure for Software Supply Chain Security

Get Free TrialMore about Spectra Assure Free Trial
Blog
Events
About Us
Webinars
In the News
Careers
Demo Videos
Cybersecurity Glossary
Contact Us
reversinglabsReversingLabs: Home
Privacy PolicyCookiesImpressum
All rights reserved ReversingLabs © 2026
XX / TwitterLinkedInLinkedInFacebookFacebookInstagramInstagramYouTubeYouTubeblueskyBlueskyRSSRSS
Back to Top
Tomislav Pericin in front of flying books, Learning with ReversingLabs text logo

We don’t stop at our platform explaining how to take confident action against threats. Our experts explain too. Security basics, advanced technology concepts, and the depths of how our solution works. All here!

All Classes

Definition

Let’s get down to the basics! Take a few minutes to brush up on some security terminology. But don't be surprised if you learn something new!

Play Videos about Definition
Definition

Whiteboard

It’s time for the advanced course! Watch one or watch them all. We’re sure you’ll stretch your limits with these innovative concepts!

Play Videos about Whiteboard
Whiteboard

How To

Ok. We’ve told you a lot. Now it’s time to show you a lot! See the top use cases in action that are available to solve your most advanced threat problems.

Experts

Tomislav Peričin

Chief Software Architect & Co-Founder at ReversingLabs

Read More about Tomislav Peričin
Tomislav Peričin

Robert Perica

Threat Analyst at ReversingLabs

Read More about Robert Perica
Robert Perica

Chuck McWhirter

Senior Sales Engineer at ReversingLabs

Read More about Chuck McWhirter

Keep #LearningWithReversingLabs on YouTube

collage of educational resources and youtube windows
Reversing2020 logo with arrows

Tech Community Impressions

ReversingLabs: The More Powerful, Cost-Effective Alternative to VirusTotalSee Why
Skip to main content
Contact UsSupportLoginBlogCommunity
reversinglabs

Threat Research Education

ReversingLabs: Home
Solutions
Secure Software OnboardingSecure Build & ReleaseProtect Virtual MachinesIntegrate Safe Open SourceGo Beyond the SBOM
Increase Email Threat ResilienceDetect Malware in File Shares & StorageAdvanced Malware Analysis SuiteICAP Enabled Solutions
Scalable File AnalysisHigh-Fidelity Threat IntelligenceCurated Ransomware FeedAutomate Malware Analysis Workflows
Products & Technology
Spectra Assure®Software Supply Chain SecuritySpectra DetectHigh-Speed, High-Volume, Large File AnalysisSpectra AnalyzeIn-Depth Malware Analysis & Hunting for the SOCSpectra IntelligenceAuthoritative Reputation Data & Intelligence
Spectra CoreIntegrations
Industry
Energy & UtilitiesFinanceHealthcareHigh TechPublic Sector
Partners
Become a PartnerValue-Added PartnersTechnology PartnersMarketplacesOEM Partners
Alliances
Resources
BlogContent LibraryCybersecurity GlossaryConversingLabs PodcastEvents & WebinarsLearning with ReversingLabsWeekly Insights Newsletter
Customer StoriesDemo VideosDocumentationOpenSource YARA Rules
Company
About UsLeadershipCareersSeries B Investment
EventsRL at RSAC
Press ReleasesIn the News
Pricing
Software Supply Chain SecurityMalware Analysis and Threat Hunting
Request a demo
Menu
Play Videos about How To
How To
deminars green text

Deminars

Why settle for a webinar when you can have a deminar?! Watch our guys take a relevant threat, malware or complex file and step through how our platform detects it at speed!

Read More about Deminars
Deminars
Chuck McWhirter
IT guy in headset
definition underlined
Whiteboard green text
How To green text circled
learning with reversinglabs certification coming soon chat bubble
Tomislav Pericin headshot
Robert Perica headshot
chuck mcwhirter headshot
Tomislav tweet
Igor Lasic tweet
Gunter Ollmann linkedin post
robert perica tweet
tomislav pericin in front of abstract nebula sunburst the next level of stealth blog link
we explain you act
chat bubbles
collage of educational resources and youtube windows
Reversing2020 logo with arrows
Copy Fail Linux yara rules

Copy Fail Flaw: 5 YARA Rules for Detection

Here’s what you need to know about the Linux kernel privilege escalation — and how to use YARA rules to get on top of it.

Learn More about Copy Fail Flaw: 5 YARA Rules for Detection
Copy Fail Flaw: 5 YARA Rules for Detection
Claude AI adds PromptMink malware to crypto trading agent

Claude adds malware to crypto agent

PromptMink has evolved into a malicious dependency in a package that allows access to crypto wallets and funds.

Learn More about Claude adds malware to crypto agent
Claude adds malware to crypto agent
Graphalgo supply chain campaign respawned.

Graphalgo fake recruiter campaign returns

An attack targeting crypto developers has been respawned — with an LLC and new techniques.

Learn More about Graphalgo fake recruiter campaign returns
Graphalgo fake recruiter campaign returns