

Mario Vuksan Local Threat Intelligence Interview at Black Hat

How to Mine for Malicious Ruby Gems
Read More about How to Mine for Malicious Ruby Gems
How to Keep Your Secrets SECRET
Read More about How to Keep Your Secrets SECRET
CISO Survival Guide: Operationalizing Third-Party Software Risk Management
Read More about CISO Survival Guide: Operationalizing Third-Party Software Risk Management
Handling the Threat - Securing Open Source Software
Read More about Handling the Threat - Securing Open Source Software
PowerShell Vulnerabilities: How your SOC Team Can Detect the New Quantum Builder Malware Threat
Read More about PowerShell Vulnerabilities: How your SOC Team Can Detect the New Quantum Builder Malware Threat
What You Need to Know: How to Combat the IconBurst Software Supply Chain Attack
Read More about What You Need to Know: How to Combat the IconBurst Software Supply Chain Attack
A Step-by-Step Walk Through of the ReversingLabs Software Assurance Service
Read More about A Step-by-Step Walk Through of the ReversingLabs Software Assurance Service
Building a Better Malware Lab
Read More about Building a Better Malware Lab
How to Use File Reputation Services
Read More about How to Use File Reputation Services
ReversingLabs Enrichment for Anomali ThreatStream
Read More about ReversingLabs Enrichment for Anomali ThreatStream
Detecting Malware Packages: PyPI and Open Source Threats
Read More about Detecting Malware Packages: PyPI and Open Source Threats
Taking Threat Intelligence Programs to the Next Level
Read More about Taking Threat Intelligence Programs to the Next Level