ReversingLabs Integration with Palo Alto Cortex XSOAR
ReversingLabs boosts Cortex XSOAR with threat intel integrations to streamline SOC triage.

(Formerly A1000)
Unpack files, extract internal indicators, and assign a threat level to each file. Access rich context and threat classification across thousands of file types.
Detect IP theft and ransomware attacks with IOCs such as IP, Domain, URL, and Hash. Gather additional contextual information, such as MITRE ATT&CK, network parameters, attack stage, and malware family name.
(Formerly TitaniumCloud)
Acquire threat intelligence data from URLs. Access file reputation data for a file (malicious, suspicious, goodware, or unknown).
(Formerly TitaniumScale)
Extract metadata such as strings, format header details, function names, library dependencies, file segments, capabilities, and static analysis results.


Watch to learn how to upgrade your CI/CD pipeline with binary analysis, threat detection, and secure code signing.

In the last year, ReversingLabs observed a 289% increase in threats involving open-source repositories.

Reduce alert fatigue and eliminate inefficient workflows to address new software supply chain TTPs by using ReversingLabs SSCS.