<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:news="http://www.google.com/schemas/sitemap-news/0.9" xmlns:xhtml="http://www.w3.org/1999/xhtml" xmlns:mobile="http://www.google.com/schemas/sitemap-mobile/1.0" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xmlns:video="http://www.google.com/schemas/sitemap-video/1.1">
<url><loc>https://www.reversinglabs.com/blog/axios-appsec-respond</loc><lastmod>2026-04-03T16:05:44.706Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/clickfix-yara-rule</loc><lastmod>2026-04-02T14:35:33.086Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/opet-jpmc-software-trust-debt-rsac</loc><lastmod>2026-04-02T17:54:31.633Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/appsec-weaponized-trivylitellm</loc><lastmod>2026-03-27T18:34:50.255Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/teampcp-supply-chain-attack-spreads</loc><lastmod>2026-03-31T16:54:44.122Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/owasp-genai-security-project-updates</loc><lastmod>2026-03-31T14:02:03.875Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/npm-fake-install-logs-rat</loc><lastmod>2026-03-24T12:00:30.570Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/decouple-your-siem-data</loc><lastmod>2026-03-26T13:05:33.741Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/how-ai-agents-can-weaponize-ides</loc><lastmod>2026-03-30T19:40:10.469Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/examine-polyglot-files-spectra-analyze</loc><lastmod>2026-03-17T12:52:23.792Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/openclaw-ai-agents-black-hole-risks</loc><lastmod>2026-03-30T19:40:52.950Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/ethereum-post-quantum-security</loc><lastmod>2026-03-19T19:22:10.529Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/why-your-sboms-need-purls</loc><lastmod>2026-03-16T12:56:20.077Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/openclaw-agentic-ai-risk</loc><lastmod>2026-03-30T19:41:18.808Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/claude-code-security</loc><lastmod>2026-03-30T19:42:03.239Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/inside-the-nuget-hackers-toolset</loc><lastmod>2026-02-26T14:33:50.467Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/ai-native-appsec</loc><lastmod>2026-03-30T19:42:55.307Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/malicious-nuget-package-targets-stripe</loc><lastmod>2026-02-26T14:35:07.911Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/owasp-adopts-docksec</loc><lastmod>2026-03-11T15:50:36.123Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/how-ai-agents-upend-sscs</loc><lastmod>2026-03-30T19:43:21.024Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/bsimm16-ai-redefines-appsec</loc><lastmod>2026-03-25T17:32:41.503Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/inside-graphalgo</loc><lastmod>2026-02-12T14:54:27.901Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/cybercrime-as-a-service</loc><lastmod>2026-02-19T15:26:46.805Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/fake-recruiter-campaign-crypto-devs</loc><lastmod>2026-02-12T14:59:43.590Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/yara-retrohunting-detection-engineering</loc><lastmod>2026-02-25T13:31:41.621Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/commercial-software-risk-new-controls</loc><lastmod>2026-03-25T17:38:13.320Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/notepad-evolution-supply-chain-threats</loc><lastmod>2026-02-18T21:20:17.630Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/vulnerable-mcp-servers-lab</loc><lastmod>2026-03-05T15:12:20.687Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/gartner-ciso-playbook-insights</loc><lastmod>2026-03-25T17:50:40.520Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/emeditor-supply-chain-compromise</loc><lastmod>2026-01-30T14:05:22.574Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/ai-coding-rust</loc><lastmod>2026-01-28T19:15:34.856Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/anthropic-python-investment</loc><lastmod>2026-01-22T15:05:50.732Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/sscs-report-2026-guidance-timeline</loc><lastmod>2026-01-27T15:55:08.246Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/sscs-report-2025-retrospective</loc><lastmod>2026-02-03T14:25:20.378Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/sscs-report-2026-takeaways</loc><lastmod>2026-01-27T15:46:57.710Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/ssdf-appsec-journey</loc><lastmod>2026-01-21T14:02:53.435Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/mandatory-sbom-cra</loc><lastmod>2026-03-25T20:58:11.806Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/shai-hulud-call-to-action</loc><lastmod>2026-01-15T19:07:39.108Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/governance-essential-ai-adoption</loc><lastmod>2026-01-29T21:57:52.903Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/adversarial-ai-rise</loc><lastmod>2026-01-13T13:00:08.312Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/supply-chain-risk-insurance</loc><lastmod>2026-01-08T14:47:20.758Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/ai-technical-debt</loc><lastmod>2026-01-07T15:13:30.849Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/unpacking-pkr_mtsi</loc><lastmod>2026-01-06T22:40:58.179Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/software-factory-security-framework-secops</loc><lastmod>2025-12-30T15:14:12.306Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/nuget-malware-crypto-oauth-tokens</loc><lastmod>2026-01-28T21:30:37.868Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/owasp-tackles-ai-risk-in-bold-new-push</loc><lastmod>2025-12-18T13:00:06.476Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/ai-file-security-fight-back</loc><lastmod>2025-12-23T14:26:38.717Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/ndaa-ai-risk</loc><lastmod>2025-12-11T13:52:42.865Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/spectra-assure-crowdstrike-tprm</loc><lastmod>2025-12-17T14:22:26.232Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/malicious-vs-code-fake-image</loc><lastmod>2025-12-15T14:00:48.546Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/5-ways-ai-will-transform-the-soc</loc><lastmod>2025-12-09T16:43:54.954Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/security-frameworks-fail-supply-chain</loc><lastmod>2026-03-25T21:01:28.549Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/ai-cloud-native-game-changers</loc><lastmod>2025-12-03T14:43:14.062Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/new-shai-hulud-worm-spreads-what-to-know</loc><lastmod>2026-01-28T21:35:48.217Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/bootstrap-script-exposes-pypi-to-domain-takeover-attack</loc><lastmod>2026-01-28T21:37:41.100Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/reversinglabs-browser-extension-threat-intelligence</loc><lastmod>2025-12-04T13:32:10.365Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/owasp-top-10-supply-chain-risk</loc><lastmod>2025-11-20T18:05:37.791Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/software-quality-collapse-ai-accelerate</loc><lastmod>2025-11-19T15:12:49.553Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/vet-powershell-modules-spectra-assure-community</loc><lastmod>2025-11-13T14:06:57.647Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/ai-vulnerability-reporting-fails</loc><lastmod>2025-11-12T22:01:00.277Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/mitre-attck-v18-whats-in-it--and-why-it-matters</loc><lastmod>2025-11-12T19:49:36.825Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/powershell-gallery-simplify-sscs-attacks</loc><lastmod>2025-11-13T14:11:14.871Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/ai-security-tool-key-exposures</loc><lastmod>2026-01-06T16:42:52.663Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/ctem-advances-vulnerability-management</loc><lastmod>2025-11-18T15:03:21.632Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/tracking-discord-rat-family</loc><lastmod>2025-10-30T14:14:32.662Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/vibe-coding-controls-critical</loc><lastmod>2025-11-06T17:17:23.638Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/npm-security-shai-hulud</loc><lastmod>2025-11-12T17:26:17.571Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/yara-rules-macos-malware-hunting</loc><lastmod>2026-02-25T13:32:04.740Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/how-to-secure-ai-in-container-workloads</loc><lastmod>2025-10-30T14:12:15.534Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/ai-coding-velocity-risk</loc><lastmod>2025-10-30T14:11:18.277Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/triaging-maldocs-with-spectra-analyze</loc><lastmod>2026-02-25T13:32:48.178Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/rl-math-updates-q3-2025</loc><lastmod>2025-10-30T14:30:04.405Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/mcp-server-credential-weakness</loc><lastmod>2025-10-16T14:57:57.479Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/aspm-modern-appsec-essential</loc><lastmod>2025-10-21T14:01:13.035Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/kiteworks</loc><lastmod>2025-10-16T17:23:22.008Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/vibe-coding-lessons</loc><lastmod>2025-10-16T17:22:41.892Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/command-zero</loc><lastmod>2025-10-16T17:30:59.437Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/postmark-mcp-attack-takeaways</loc><lastmod>2025-10-08T22:40:21.366Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/security-byproduct-modern-tooling</loc><lastmod>2025-10-16T17:59:06.665Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/attack-surface-risk-management-asm</loc><lastmod>2025-10-16T18:01:34.111Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/hunting-sharphounds-with-spectra-analyze</loc><lastmod>2026-02-25T13:33:07.771Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/open-source-commercial-funding</loc><lastmod>2025-10-16T17:35:19.832Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/faq-shai-hulud-explained</loc><lastmod>2025-10-17T13:08:57.012Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/cve-genie-vulnerability-management</loc><lastmod>2025-10-16T17:36:16.872Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/shai-hulud-worms-eat-devops</loc><lastmod>2025-10-16T17:32:25.155Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/deadlines-vs-secure-code</loc><lastmod>2025-10-16T17:38:45.145Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/cisa-new-sbom-standards</loc><lastmod>2025-10-16T17:39:26.310Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/how-ai-coding-tools-can-learn</loc><lastmod>2025-10-16T17:40:19.119Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/shai-hulud-worm-npm</loc><lastmod>2026-01-07T17:19:51.721Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/9-key-ai-threat-categories-aicm</loc><lastmod>2025-10-16T17:41:04.941Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/spectra-assure-integration-with-activestate-ospm</loc><lastmod>2025-09-10T12:00:46.439Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/npm-github-crypto-hacks-what-to-know</loc><lastmod>2025-10-16T17:41:56.762Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/ransomware-2025-infostealers-on-the-march</loc><lastmod>2025-09-09T13:17:33.889Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/pypi-domain-resurrection</loc><lastmod>2025-10-16T17:42:46.766Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/cisa-tool-software-onboarding-tpsrm</loc><lastmod>2025-09-11T12:00:06.695Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/ai-borne-ransomware-has-arrived</loc><lastmod>2025-10-16T17:44:49.653Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/ethereum-contracts-malicious-code</loc><lastmod>2026-01-20T15:49:57.924Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/malware-vs-code-extension-names</loc><lastmod>2026-01-28T21:25:23.539Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/dpe-speed-development-boost-appsec</loc><lastmod>2025-10-16T17:51:24.376Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/aws-amazonq-ai-incident</loc><lastmod>2025-10-16T17:51:53.665Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/ai-coding-tools-security</loc><lastmod>2025-10-16T17:53:34.970Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/immutable-laws-of-security-at-25</loc><lastmod>2025-10-16T17:53:54.676Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/eslint-hack</loc><lastmod>2025-10-16T17:54:49.787Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/ai-coding-tools-old-school-hacks</loc><lastmod>2025-10-16T17:55:12.007Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/owasp-genai-incident-response-guide</loc><lastmod>2026-03-23T14:20:00.208Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/devsecops-devex-software-security</loc><lastmod>2025-10-16T17:55:41.737Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/modern-development-5-appsec-action-items</loc><lastmod>2025-10-16T17:56:44.767Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/owasp-aivss-agentic-ai-risk</loc><lastmod>2025-08-15T17:57:23.011Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/policy-as-code-secure-sdlc</loc><lastmod>2025-08-05T16:58:45.620Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/sharepoint-toolshell-zero-day-what-we-know</loc><lastmod>2025-08-01T14:03:31.089Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/the-true-cost-of-cves-why-you-must-move-beyond-vulnerabilities</loc><lastmod>2025-08-01T14:04:49.632Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/fully-autonomous-development-is-coming-is-your-appsec-ready</loc><lastmod>2025-08-01T14:07:10.356Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/vibe-coding-seductive-but-risky</loc><lastmod>2025-07-30T23:35:02.119Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/announcing-rl-spectra-analyze-version-95</loc><lastmod>2025-09-02T19:04:53.368Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/devs-vet-your-vs-code-plugins-with-spectra-assure-community</loc><lastmod>2025-09-02T19:34:18.568Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/malicious-pull-request-infects-vscode-extension</loc><lastmod>2025-08-01T06:17:36.374Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/lessons-learned-from-3cxs-software-supply-chain-compromise</loc><lastmod>2025-09-17T19:29:52.455Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/rats-in-the-library</loc><lastmod>2025-07-31T19:36:44.684Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/ai-security-and-tooling-report-shows-how-hype-and-reality-diverge</loc><lastmod>2025-07-31T01:03:29.653Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/euvd-vulnerability-database-ecosystem</loc><lastmod>2025-07-30T23:55:51.578Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/safe-and-trusted-why-the-spectra-assure-community-badge-belongs-on-your-open-source-project</loc><lastmod>2025-07-31T00:03:43.409Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/red-teaming-agentic-ai-key-takeaways-from-csas-new-guide</loc><lastmod>2025-07-30T23:59:18.817Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/threat-actor-banana-squad-exploits-github-repos-in-new-campaign</loc><lastmod>2026-01-28T21:44:13.823Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/what-is-tpsrm</loc><lastmod>2025-07-31T00:13:04.190Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/why-complex-binary-analysis-is-essential-for-tpsrm</loc><lastmod>2025-07-31T00:07:11.069Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/how-to-accelerate-pqc-migration-leveraging-cboms-for-cryptographic-asset-discovery</loc><lastmod>2026-03-19T14:15:45.514Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/how-to-speed-up-tprm-approvals-with-spectra-assure</loc><lastmod>2025-09-02T21:40:52.971Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/dod-secure-software-with-sboms-and-automation-required</loc><lastmod>2025-07-31T00:10:56.249Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/owasp-chat-playground-lets-you-toy-around-with-ai-security</loc><lastmod>2025-07-31T00:33:54.679Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/january-2023-updates-to-reversinglabs-elastic-threat-infrastructure</loc><lastmod>2025-07-31T21:22:32.813Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/january-2023-updates-to-reversinglabs-threat-analysis-and-hunting-solution</loc><lastmod>2025-06-09T21:40:22.816Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/jsonwebtoken-flaw-highlights-supply-chain-risks</loc><lastmod>2025-06-09T21:31:30.513Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/its-not-a-secret-if-you-publish-it-on-pypi</loc><lastmod>2025-07-31T20:12:02.517Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/it-only-takes-one-line-of-code-to-ruin-your-day</loc><lastmod>2025-07-31T20:11:16.315Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/is-your-macos-safe-from-attack-what-2019-has-shown-us</loc><lastmod>2025-07-31T20:10:35.993Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/introducing-explainable-threat-intelligence</loc><lastmod>2025-07-31T20:07:07.762Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/introducing-explainable-machine-learning</loc><lastmod>2025-07-31T20:06:20.453Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/interview-tomislav-pericin-explains-nists-new-secure-software-development-framework</loc><lastmod>2025-07-31T18:17:21.002Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/industry-and-government-agree-sboms-are-a-no-brainer</loc><lastmod>2025-07-31T14:36:54.237Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/hunting-for-ransomware-with-combined-pan-xsoar-integrations</loc><lastmod>2025-07-31T19:54:07.179Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/less-talk-more-action-high-hopes-for-cisas-c-scrm-software-supply-chain-security-office</loc><lastmod>2025-12-02T18:37:13.974Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/hunting-for-ransomware</loc><lastmod>2025-07-31T20:02:48.540Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/lessons-from-log4shell-4-takeaways-for-devsecops-teams</loc><lastmod>2025-06-09T19:53:55.564Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/how-you-can-help-prevent-credential-stuffing-attacks</loc><lastmod>2025-07-31T16:43:32.508Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/how-to-harden-ml-models-against-adversarial-attacks</loc><lastmod>2025-07-31T19:53:29.740Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/how-cisas-c-scrm-could-fill-the-gaps-on-software-supply-chain-security-policy-and-process</loc><lastmod>2025-07-31T18:06:42.716Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/highlights-from-black-hat-usa-2019</loc><lastmod>2025-07-30T23:32:13.777Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/hidden-cobra</loc><lastmod>2025-07-31T18:13:53.185Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/gwisinlocker-ransomware-targets-south-korean-industrial-and-pharmaceutical-companies</loc><lastmod>2025-07-30T23:31:02.289Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/groundhog-day-npm-package-caught-stealing-browser-passwords</loc><lastmod>2025-06-09T16:44:31.682Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/how-detecting-high-priority-malware-will-accelerate-quality-app-development-and-release</loc><lastmod>2025-07-31T19:36:08.842Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/google-open-source-staffer-layoffs-put-our-software-supply-chain-security-at-risk</loc><lastmod>2025-06-09T16:04:24.321Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/google-gets-behind-guac-to-take-a-bite-out-of-supply-chain-insecurity</loc><lastmod>2025-08-13T14:02:46.440Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/google-cloud-takes-next-step-on-supply-chain-risk-uk-issues-new-software-security-guidance</loc><lastmod>2025-06-09T15:34:55.667Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/iconburst-npm-software-supply-chain-attack-grabs-data-from-apps-websites</loc><lastmod>2025-08-01T00:01:07.095Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/going-behind-the-scene-of-cybercrime-group-fin6s-attack-on-retail-and-hospitality</loc><lastmod>2025-06-09T14:22:14.290Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/github-repojacking-10-lessons-for-software-teams</loc><lastmod>2025-06-09T14:04:05.617Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/github-copilots-ml-code-brushes-ready-for-a-bob-ross-happy-little-accident</loc><lastmod>2025-06-09T13:55:31.738Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/get-smart-leveraging-threat-intel-to-detect-ransomware</loc><lastmod>2025-06-09T13:45:27.258Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/hawkish-applications-lurking-in-your-macos-environment</loc><lastmod>2025-06-07T01:01:22.133Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/heres-what-happened-with-log4shell-while-you-were-out</loc><lastmod>2025-06-07T00:55:02.781Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/going-beyond-files-destructive-object-analysis</loc><lastmod>2025-06-07T00:50:29.112Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/how-deep-scanning-protects-your-data-in-the-cloud</loc><lastmod>2025-12-03T19:42:52.458Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/how-to-build-trust-in-a-zero-trust-environment</loc><lastmod>2025-06-07T00:38:33.292Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/how-abusech-evolved-from-a-blog-to-an-essential-threat-hunting-platform</loc><lastmod>2025-06-07T00:32:49.976Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/how-to-prioritize-high-risk-phishing-attacks-you-otherwise-miss</loc><lastmod>2025-06-07T00:27:48.960Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/how-to-detect-supply-chain-attacks</loc><lastmod>2025-06-07T00:23:43.486Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/integrating-isolation-with-analytics</loc><lastmod>2025-12-01T22:54:13.257Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/iran-backed-apt-actors-utilize-cves-to-carry-out-cyber-attacks-on-critical-infrastructure</loc><lastmod>2025-06-07T00:04:04.927Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/join-reversinglabs-at-alamo-ace-in-san-antonio-texas-to-see-the-latest-in-advanced-malware-hunting</loc><lastmod>2025-08-01T17:36:04.946Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/leaky-app-exposes-toyota-supplier-network</loc><lastmod>2025-06-06T23:51:25.600Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/leverage-third-party-software-validation-to-bolster-your-supply-chain-security</loc><lastmod>2025-06-06T23:46:54.189Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/log4j-is-why-you-need-an-sbom</loc><lastmod>2025-06-06T23:40:11.339Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/log4j-one-year-in-attacks-software-supply-chain-security</loc><lastmod>2025-06-06T23:01:10.602Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/machine-learning-a-belt-and-suspenders-approach</loc><lastmod>2025-12-02T19:26:26.965Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/machine-learning-for-humans</loc><lastmod>2025-06-06T22:23:37.157Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/malware-in-images</loc><lastmod>2025-06-06T22:16:32.603Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/ai-unleashed-are-you-repared-for-next-gen-software-supply-chain-attacks</loc><lastmod>2025-08-05T13:55:05.005Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/gartner-explains-why-sboms-are-critical-to-software-supply-chain-security-management</loc><lastmod>2025-06-06T21:52:33.299Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/gaps-nvd-increases-china-cyber-threat</loc><lastmod>2025-06-06T21:46:43.868Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/from-the-labs-yara-rule-for-detecting-lockbit</loc><lastmod>2025-06-06T21:41:50.422Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/metas-gdpr-fine-why-your-devops-needs-red-teaming</loc><lastmod>2025-06-06T21:49:07.583Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/forging-the-shadowhammer</loc><lastmod>2025-06-06T21:35:49.606Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/five-uses-of-yara</loc><lastmod>2025-06-06T21:28:16.719Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/exposing-ryuk-variants-using-yara</loc><lastmod>2025-06-06T21:20:11.970Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/expanding-security-visibility-to-reduce-software-supply-chain-risk</loc><lastmod>2025-06-06T21:07:11.300Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/microsoft-disables-excel-office-macros-by-default-will-it-matter</loc><lastmod>2025-06-06T21:31:42.170Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/mining-for-malicious-ruby-gems</loc><lastmod>2025-06-06T21:01:00.163Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/excel-40-macros</loc><lastmod>2025-06-06T21:03:15.812Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/mirai-botnet-continues-to-plague-iot-space</loc><lastmod>2025-12-03T19:48:01.078Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/end-to-end-supply-chain-security-requires-dev-teams-and-the-soc-shift-left-together</loc><lastmod>2025-06-06T20:40:25.211Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/emotets-back-how-to-keep-from-getting-hacked</loc><lastmod>2025-06-06T20:22:15.133Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/mistakes-to-avoid-in-choosing-a-file-reputation-service</loc><lastmod>2025-06-06T20:30:52.047Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/dropbox-reveals-hack-what-devops-can-learn-from-it</loc><lastmod>2025-06-06T20:17:48.294Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/dotnet-loaders</loc><lastmod>2025-06-06T20:01:10.966Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/digital-certificatesyou-are-you-but-so-am-i</loc><lastmod>2025-07-31T18:01:38.461Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/digital-certificates-models-for-trust-and-targets-for-misuse</loc><lastmod>2025-07-31T17:59:42.069Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/digital-certificates-impersonated-executives-as-certificate-identity-fronts</loc><lastmod>2025-07-31T17:55:43.231Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/devs-dont-rely-on-github-copilot-legal-risk-is-real</loc><lastmod>2025-06-06T18:58:46.923Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/devops-teams-bgp-is-horribly-insecure-heres-how-to-fix-it</loc><lastmod>2025-06-06T18:42:55.645Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/devops-lesson-from-toyota-fail-crash-test-secrets</loc><lastmod>2025-06-06T18:35:26.820Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/detecting-certificate-signed-malware</loc><lastmod>2025-12-01T22:52:24.239Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/deepmind-alphacode-buggy-insecure-software-ahoy</loc><lastmod>2025-06-06T17:52:39.063Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/data-exfiltrator</loc><lastmod>2025-06-06T17:45:58.696Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/cvs-dde-exploits-and-obfuscation</loc><lastmod>2025-06-06T16:48:49.488Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/customer-use-case-combatting-undetected-malware-with-tanium-and-reversinglabs</loc><lastmod>2025-12-01T21:54:45.535Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/crosspoint-capital-invests-in-reversinglabs-to-scale-supply-chain-security-offerings</loc><lastmod>2025-08-01T17:12:24.884Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/core-js-beware-hidden-dependecies-from-russian-devs</loc><lastmod>2025-06-06T16:28:41.315Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/conversinglabs-unpacking-the-follina-exploit</loc><lastmod>2025-06-06T16:23:11.423Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/conversinglabs-ep-2-conti-pivots-as-ransomware-as-a-service-struggles</loc><lastmod>2025-06-06T16:18:58.705Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/constant-insecurity-things-you-didnt-know-about-pe-portable-executable-file-format</loc><lastmod>2025-06-06T16:15:21.841Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/code-reuse-across-packers-and-dll-loaders</loc><lastmod>2025-06-06T16:11:56.974Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/cisos-guide-to-protecting-against-modern-software-risks</loc><lastmod>2025-06-06T15:43:26.502Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/ciso-remote-workforce-secon</loc><lastmod>2025-06-06T15:37:13.267Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/cisa-log4j-threat-will-linger-for-years</loc><lastmod>2025-06-06T15:31:00.799Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/circleci-hack-is-a-red-flag-for-security-teams-on-the-software-supply-chain</loc><lastmod>2025-06-06T15:27:10.683Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/cicd-security-upgrade-your-software-supply-chain-security-tools</loc><lastmod>2025-06-06T15:21:39.017Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/cd-security-breaches-update-software-security-approach</loc><lastmod>2025-06-06T15:15:25.103Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/chatty-ai-just-a-toy</loc><lastmod>2025-06-06T15:06:00.413Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/catching-lateral-movement-in-internal-emails</loc><lastmod>2025-06-06T14:45:59.732Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/chatgpt-parlor-trick-or-stack-overflow-replacement</loc><lastmod>2025-06-06T14:56:48.047Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/catching-deceptive-links-before-the-phish</loc><lastmod>2025-06-06T14:28:21.135Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/catching-deceptive-links-before-the-click</loc><lastmod>2025-07-31T15:44:26.861Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/c-scrm-were-from-the-government-and-were-here-to-help-with-software-supply-chain-security</loc><lastmod>2025-06-06T13:53:58.982Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/buckle-up-for-black-hat-2022-here-are-the-sessions-your-security-team-should-not-miss</loc><lastmod>2025-06-06T13:43:22.369Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/breaking-uefi-firmware-authenticode-security-model</loc><lastmod>2025-06-06T13:41:08.931Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/breaking-the-windows-authenticode-security-model</loc><lastmod>2025-12-02T19:49:09.180Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/breaking-the-linux-authenticode-security-model</loc><lastmod>2025-06-06T13:23:21.641Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/black-hat-colonial-pipeline-ransomware-attack-no-surprise</loc><lastmod>2025-06-06T12:57:19.658Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/beware-impostor-http-libraries-lurk-on-pypi</loc><lastmod>2025-06-06T12:53:32.692Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/automated-static-analyis-vs-dynamic-analysis</loc><lastmod>2025-08-13T13:36:51.937Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/assessment-cybersecurity-executive-order-one-year-on</loc><lastmod>2025-06-06T12:41:55.432Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/apple-and-google-hit-with-big-privacy-law-claims</loc><lastmod>2025-06-06T12:33:51.137Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/app-sec-software-supply-chain-security-derek-fisher</loc><lastmod>2025-06-06T12:16:29.520Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/lessons-learned-circleci-secrets-breach-webinar</loc><lastmod>2025-07-31T20:29:55.066Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/lastpass-breach-revelations-big-lessons-for-devsecops-teams</loc><lastmod>2025-07-31T20:26:10.685Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/modern-architectures-require-new-security-strategies-for-digital-assets</loc><lastmod>2025-07-31T20:43:45.982Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/app-sec-is-addicted-to-vulnerabilities-why-software-supply-chain-attacks-demand-modernization</loc><lastmod>2025-07-31T15:07:31.339Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/introducing-new-secrets-management-capabilities-for-mitigating-software-supply-chain-risk</loc><lastmod>2025-12-01T21:46:04.274Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/github-enforces-2fa-its-about-time-given-the-state-of-supply-chain-security</loc><lastmod>2025-07-31T18:02:40.047Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/jenkins-patches-high-severity-xss-vulnerabilities-lessons-learned-from-coreplague</loc><lastmod>2025-07-31T20:12:55.464Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/from-the-labs-yara-rule-for-detecting-nb65</loc><lastmod>2025-07-31T17:05:45.683Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/how-bulk-pull-requests-could-help-scale-open-source-bug-fixes-in-the-supply-chain</loc><lastmod>2025-07-31T18:17:58.242Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/move-over-npm-now-vs-code-extensions-cant-be-trusted</loc><lastmod>2025-06-05T21:56:38.787Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/national-cyber-director-supply-chain-key-to-cyber-resilience</loc><lastmod>2025-06-05T21:05:39.033Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/new-features-for-the-a1000-version-64</loc><lastmod>2025-06-05T20:59:08.062Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/new-features-for-titaniumscale-version-30</loc><lastmod>2025-06-05T20:56:04.059Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/do-you-trust-ai-to-find-application-security-holes-while-you-sleep</loc><lastmod>2025-07-31T16:38:15.329Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/new-malicious-packages-in-pypi-repo</loc><lastmod>2025-06-05T20:53:30.405Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/nist-guidance-raises-bar-for-federal-software-supply-chain</loc><lastmod>2025-06-05T20:36:04.157Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/nists-supply-chain-security-guidelines-for-cicd-what-you-need-to-know</loc><lastmod>2025-06-05T20:30:22.837Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/integrate-threat-hunting-into-the-soc-triage-process-to-mitigate-software-supply-chain-risk</loc><lastmod>2025-12-01T21:32:51.440Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/notes-from-the-field-extending-carbon-black-visibility-to-undetected-malware</loc><lastmod>2025-12-02T20:03:32.718Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/npm-coinminer-what-you-see-is-not-always-what-you-get-0</loc><lastmod>2025-06-05T19:55:27.136Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/not-all-sboms-are-the-same-choose-wisely</loc><lastmod>2025-12-30T19:32:22.339Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/dockers-buildkit-adds-supply-chain-security-features</loc><lastmod>2025-12-01T22:55:22.325Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/npm-dependency-confusion-hacks-target-german-firms</loc><lastmod>2025-06-05T19:46:38.576Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/cisa-cybersecurity-performance-goals-update-supply-chain-security</loc><lastmod>2025-12-03T19:45:52.489Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/open-source-malware-sows-havoc-on-supply-chain</loc><lastmod>2025-06-05T19:29:16.183Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/nvd-analysis-2022-why-you-need-to-modernize-your-software-security-approach</loc><lastmod>2025-06-05T19:38:01.257Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/openssf-survey-supply-chain-security-practices</loc><lastmod>2025-06-05T19:19:26.723Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/openssfs-npm-best-practices-a-great-first-step-for-boosting-software-supply-chain-security</loc><lastmod>2025-06-05T19:10:52.708Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/has-public-usb-juice-jacking-made-it-into-the-wild</loc><lastmod>2025-07-31T18:12:27.353Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/openssfs-open-source-software-security-mobilization-plan</loc><lastmod>2025-06-05T19:03:11.401Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/oscr-targets-software-supply-chains-attacks</loc><lastmod>2025-06-05T18:57:41.487Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/github-oscr-supply-chain-security</loc><lastmod>2025-07-31T21:05:49.878Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/owasp-at-a-crossroads-mark-curpheys-call-for-relevancy-in-the-age-of-software-supply-chain-security</loc><lastmod>2025-06-05T18:46:02.825Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/packagist-php-repo-supply-chain-threat-what-you-need-to-know</loc><lastmod>2025-06-05T18:36:35.724Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/eu-cyber-laws-will-make-foss-devs-liable</loc><lastmod>2025-07-31T16:48:06.337Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/pandemic-boon-for-public-private-cybersecurity</loc><lastmod>2025-07-31T22:59:50.709Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/platform-technology-updates-better-malware-detection-for-multiple-image-formats-with-titaniumcore</loc><lastmod>2025-07-31T21:13:12.081Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/plugging-secrets-leaks-requires-protecting-the-full-software-and-technolgy-stack</loc><lastmod>2025-07-31T16:51:34.932Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/companies-scramble-to-cover-the-software-supply-chain-security-gaps-survey-takeaways</loc><lastmod>2025-12-01T22:44:52.250Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/package-names-repurposed-to-push-malware-on-pypi</loc><lastmod>2025-07-31T21:11:53.762Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/poorweb-exploiting-document-formats</loc><lastmod>2025-07-31T21:14:03.370Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/pypi-repo-poisoned-with-colour-blind-rat</loc><lastmod>2025-06-05T16:58:48.652Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/pytorch-supply-chain-attack-dependency-confusion-burns-devops</loc><lastmod>2025-06-05T16:50:38.567Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/rana-android-malware</loc><lastmod>2025-06-05T16:42:18.200Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/cisas-security-by-design-for-software-its-a-starting-point-not-an-endpoint</loc><lastmod>2025-07-31T16:52:29.335Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/ransomware-in-exotic-email-attachments</loc><lastmod>2025-06-05T16:14:43.896Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/ransomware-intelligence-that-drives-operations</loc><lastmod>2025-06-05T16:01:53.884Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/how-to-operationalize-sboms-for-incident-response</loc><lastmod>2025-07-31T19:55:31.680Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/red-flags-fly-over-supply-chain-compromised-3cx-update</loc><lastmod>2025-06-05T15:59:21.345Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/modernize-your-soc-with-advanced-malware-analysis-dedicated-supply-chain-security-and-key-best-practices</loc><lastmod>2025-12-02T19:45:06.567Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/reflection-attacks-dont-be-part-of-the-problem</loc><lastmod>2025-06-05T15:46:29.561Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/reminiscence-of-the-flashback</loc><lastmod>2025-06-05T15:38:32.123Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/researchers-exploit-gaps-in-vehicle-software-supply-chain</loc><lastmod>2025-06-05T15:32:24.458Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/red-teamers-take-on-ai-at-def-con-31</loc><lastmod>2025-06-05T15:40:03.950Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/retread-ransomware</loc><lastmod>2025-06-05T15:18:02.048Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/reverse-engineering-software-protections</loc><lastmod>2025-06-05T14:58:15.289Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/reversing-software-compressions-tale-dragons-and-men-who-slay-them</loc><lastmod>2025-06-05T14:54:26.958Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/reversinglabs-cloud-deep-scan-file-sharing-security</loc><lastmod>2025-06-05T14:46:39.931Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/reversinglabs-content-pack-for-microsoft-sentinel</loc><lastmod>2025-06-05T14:41:57.370Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/reversinglabs-elastic-threat-infrastructure-titaniumscale</loc><lastmod>2025-12-01T21:47:10.405Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/reversinglabs-expands-new-offices</loc><lastmod>2025-06-05T14:28:10.892Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/reversinglabs-and-synopsys-join-forces-to-combat-software-supply-chain-threats</loc><lastmod>2025-12-15T21:24:24.122Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/coalition-takes-down-russian-espionage-tool-github-plugs-api-leaks</loc><lastmod>2025-07-31T23:25:38.495Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/hot-to-detect-debugger-evasion-exception-flooding</loc><lastmod>2025-07-31T16:28:44.552Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/how-to-use-threat-intelligence-indicator-feeds-with-microsoft-sentinel</loc><lastmod>2025-07-31T20:01:02.907Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/msi-uefi-key-breach-how-safe-are-your-secrets</loc><lastmod>2025-07-31T20:28:00.023Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/rats-found-hiding-in-the-npm-attic</loc><lastmod>2025-07-31T21:19:22.567Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/red-teaming-a-country-the-2021-indian-government-hack</loc><lastmod>2025-07-31T19:58:04.301Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/reversinglabs-file-enrichment-api-for-microsoft-sentinel</loc><lastmod>2025-07-31T19:59:48.146Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/pypi-paused-as-automated-attack-overwhelms-admins</loc><lastmod>2025-07-31T21:17:04.836Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/reversinglabs-introduces-ali-khan-as-the-companys-first-field-ciso</loc><lastmod>2025-07-31T15:04:55.066Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/reversinglabs-launches-managed-software-assurance-program</loc><lastmod>2025-09-02T20:32:00.172Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/reversinglabs-on-going-beyond-the-sbom-at-forrester-security-risk-forum</loc><lastmod>2025-07-30T23:33:49.575Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/reversinglabs-proud-be-among-supporters-movember</loc><lastmod>2025-06-04T18:55:26.231Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/reversinglabs-sdk-for-python</loc><lastmod>2025-06-04T18:46:34.593Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/reversinglabs-webcamp-zagreb-2017</loc><lastmod>2025-08-06T02:59:15.296Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/reversinglabs-at-webcamp-zagreb-2017</loc><lastmod>2025-08-06T02:59:07.369Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/reversinglabs-yara-rule-detects-badrabbit-encryption-routine-specifics</loc><lastmod>2026-01-21T15:28:25.618Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/qa-with-reversinglabs-coo-peter-doggart-with-software-supply-chain-security-your-brand-is-at-stake</loc><lastmod>2025-07-31T21:18:15.815Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/reversinglabs-yara-rule-detects-cobalt-payload-exploiting-cve-2017-11882</loc><lastmod>2025-06-04T18:20:46.009Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/risk-not-worth-taking</loc><lastmod>2025-06-04T18:17:40.676Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/rocking-the-foundations-of-a-trust-based-digital-code-signing-system</loc><lastmod>2025-06-04T18:15:07.598Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/app-sec-and-generative-ai-can-tools-like-nemo-guardrails-contain-the-the-supply-chain-risk</loc><lastmod>2025-12-02T18:15:34.947Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/ai-extinction-risk-could-ai-wipe-out-humans-using-software-backdoors</loc><lastmod>2025-07-31T01:07:09.758Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/pypi-hackers-code-new-tactic-researchers-caught-em-red-handed</loc><lastmod>2025-07-31T21:15:53.229Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/static-file-analysis-critical-tool-your-malware-detection-toolkit</loc><lastmod>2025-12-02T19:59:48.937Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/sbom-what-it-is-and-why-it-matters-software-supply-chain-security</loc><lastmod>2025-06-04T16:00:35.147Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/moveit-supply-chain-bug-exploited-for-two-years</loc><lastmod>2025-07-31T20:46:26.863Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/how-do-you-trust-open-source-software</loc><lastmod>2025-07-31T18:07:15.173Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/rsa-conference-2023-must-see-app-sec-and-software-supply-chain-security-talks</loc><lastmod>2026-03-02T22:16:02.181Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/rsa-conference-2023-supply-chain-ukraine-ai</loc><lastmod>2025-06-04T15:37:00.375Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/cisa-sbom-a-rama-tackles-challenges-5-key-takeaways</loc><lastmod>2025-07-31T15:43:17.337Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/rsa-spotlights-supply-chain-critical-infrastructure-cyber-risk</loc><lastmod>2025-06-04T15:12:02.824Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/from-the-labs-yara-rule-for-detecting-hermeticransom</loc><lastmod>2025-06-04T15:14:52.570Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/rust-mojo-linux-memory-safe-code</loc><lastmod>2025-06-04T14:47:49.120Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/rustlang-shines-with-its-day-in-the-sun</loc><lastmod>2025-06-04T14:40:38.442Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/sbom-critical-but-first-step-software-supply-chain-security</loc><lastmod>2025-07-15T19:50:27.123Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/sbom-facts-know-whats-in-software-fend-off-supply-chain-attacks</loc><lastmod>2025-06-04T14:09:06.736Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/sboms-medical-devices-kevin-fu-what-to-expect</loc><lastmod>2025-06-04T13:45:34.163Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/sca-is-key-but-no-substitute-for-comprehensive-software-supply-chain-security</loc><lastmod>2025-06-04T13:39:53.710Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/secrets-exposed-how-hackers-are-gaining-access-to-development-secrets</loc><lastmod>2025-06-04T13:32:15.472Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/secrets-exposed-modern-development-open-source-repositories-expose-secrets-en-masse</loc><lastmod>2025-06-04T13:26:50.322Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/secrets-exposed-special-report-takeaways</loc><lastmod>2025-06-04T13:18:26.413Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/secure-software-blogwatch-solarwinds</loc><lastmod>2025-06-04T13:00:52.938Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/secure-your-development-secrets-3-essential-steps</loc><lastmod>2025-06-04T12:46:02.956Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/self-attestation-what-software-teams-need-to-know</loc><lastmod>2025-06-04T12:34:54.988Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/sentinelsneak-malicious-pypi-module-poses-as-security-sdk</loc><lastmod>2025-06-04T12:30:19.640Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/how-to-investigate-security-incidents-with-threat-intelligence-in-microsoft-sentinel</loc><lastmod>2025-07-31T19:54:47.905Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/owasp-readies-top-10-for-llm-app-sec-risk-what-your-software-team-needs-to-know</loc><lastmod>2025-07-31T21:09:52.689Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/passkeys-standard-time-to-add-it-to-your-dev-plans</loc><lastmod>2025-07-31T21:12:32.030Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/mitres-system-of-trust-a-discussion-about-standardizing-software-supply-chain-risk</loc><lastmod>2025-07-31T19:32:18.160Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/hackers-breached-ups-data-for-sms-phish-spree</loc><lastmod>2025-07-31T18:11:51.382Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/give-your-microsoft-sentinel-security-incidents-some-style</loc><lastmod>2025-07-31T18:03:10.540Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/heres-mitres-top-25-cwe-list-with-your-old-vuln-favorites</loc><lastmod>2025-07-31T18:13:07.302Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/another-rsa-conference-for-the-record-books</loc><lastmod>2025-07-31T15:06:42.187Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/operation-brainleeches-malicious-npm-packages-fuel-supply-chain-and-phishing-attacks</loc><lastmod>2025-07-31T21:05:16.068Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/from-the-labs-yara-rule-for-detecting-stealc</loc><lastmod>2025-07-31T17:07:53.417Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/new-features-for-reversinglabs-titaniumscale-version-34</loc><lastmod>2025-09-02T20:36:20.948Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/introducing-new-capabilities-to-continuously-improve-software-supply-chain-security</loc><lastmod>2025-07-31T20:07:42.964Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/eu-us-data-transfer-laws-back-in-hotseat-data-security-adds-to-privacy-concerns</loc><lastmod>2025-07-31T16:48:43.321Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/shift-soc-left-integrate-devops-security-operations</loc><lastmod>2025-06-04T12:20:15.600Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/sifting-files-cyber</loc><lastmod>2025-06-03T19:17:10.714Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/slsa-10-build-provenance-supply-chain-security</loc><lastmod>2025-06-03T19:14:46.677Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/smart-security-operations-data-enrichment-for-soc-efficiency</loc><lastmod>2025-06-03T19:02:41.743Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/owasp-takes-cyclonedx-beyond-the-sbom</loc><lastmod>2025-07-31T16:27:25.609Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/smash-and-grab-astralocker-2-pushes-ransomware-direct-from-office-docs</loc><lastmod>2025-06-03T18:54:34.721Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/cisa-and-nsas-cicd-security-guidance</loc><lastmod>2025-07-31T16:50:58.334Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/jumpcloud-hack-nation-state-phish-highlights-third-party-risk</loc><lastmod>2025-08-06T03:18:04.034Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/can-safer-programming-languages</loc><lastmod>2025-07-31T22:32:39.711Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/from-the-labs-yara-rule-for-detecting-minodo</loc><lastmod>2025-07-31T17:05:02.111Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/ai-further-complicates-software-supply-chain-security</loc><lastmod>2025-07-31T14:59:53.516Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/no-net-for-some-no-root-for-devs-google-cuts-off-staff-internet-for-safety</loc><lastmod>2025-07-31T20:59:45.412Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/more-malicious-npm-packages-found-in-wake-of-jumpcloud-supply-chain-hack</loc><lastmod>2025-07-31T20:45:40.967Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/how-to-use-the-reversinglabs-enrichment-offer-for-microsoft-sentinel</loc><lastmod>2025-07-31T20:00:27.354Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/rust-programming-language-progress-report-supply-chain-security</loc><lastmod>2025-07-31T22:31:25.705Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/fraudgptwormgpt-scammy-for-now-but-a-worrying-signpost-for-software-security</loc><lastmod>2025-07-31T16:53:05.133Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/why-using-sca-to-build-your-sboms-is-a-risky-proposition</loc><lastmod>2025-09-04T13:52:07.809Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/reversinglabs-hacker-summer-camp-see-you-there</loc><lastmod>2025-07-31T21:20:29.212Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/black-hat-sessions-you-dont-want-to-miss</loc><lastmod>2025-07-31T14:52:33.436Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/ai-deep-learning-enables-attackers-to-hear-your-password</loc><lastmod>2025-07-31T20:31:18.658Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/hackers-ramp-up-abuse-of-cloudflare-tunnels-for-stealthy-connections</loc><lastmod>2025-07-31T23:25:04.984Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/reversinglabs-path-success-customers-products-key</loc><lastmod>2025-07-31T21:25:47.830Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/owasp-program-founder-calls-for-supply-chain-security-that-goes-beyond-vulnerability-detection</loc><lastmod>2025-07-31T21:08:12.970Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/ai-coding-helpers-get-failing-grade</loc><lastmod>2025-07-31T15:01:11.243Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/cisa-secure-by-design-and-financial-liability-too-much-too-soon</loc><lastmod>2025-07-31T15:49:14.460Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/researchers-hack-casino-card-shuffling-for-full-control-cheats-discordio-breach-causes-shutdown</loc><lastmod>2025-07-31T23:39:26.948Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/risk-modeling-initiative-guac-alytics</loc><lastmod>2025-07-31T21:27:32.344Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/fake-roblox-api-packages-luna-grabber-npm</loc><lastmod>2025-12-02T17:50:58.586Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/sneaky-tools-infiltrating-your-mac-fortress</loc><lastmod>2025-06-02T19:54:53.577Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/software-composition-analysis-sca-the-evolution-of-application-security</loc><lastmod>2025-06-02T19:48:07.209Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/software-supply-chain-risk-and-sbom-automation-the-next-step-in-modern-security-practices</loc><lastmod>2025-06-02T19:43:14.125Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/software-supply-chain-risk-demands-our-attention</loc><lastmod>2025-06-02T19:35:34.260Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/sans-devsecops-report-5-key-takeaways</loc><lastmod>2025-07-31T22:34:42.987Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/software-supply-chain-security-and-financial-services-mind-gap-ast</loc><lastmod>2025-12-02T18:42:00.652Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/chaos-engineering-and-the-art-of-security-why-its-key-to-resilient-software</loc><lastmod>2025-07-31T22:55:29.133Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/software-supply-chain-security-compliance-get-out-front</loc><lastmod>2025-06-02T19:21:30.645Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/software-supply-chain-security-is-no-game-or-is-it</loc><lastmod>2025-06-02T19:11:39.838Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/epss-cvss-application-security-risk</loc><lastmod>2025-07-31T16:46:55.373Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/software-supply-chain-security-mitre-system-of-trust</loc><lastmod>2025-06-02T19:07:05.107Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/software-supply-chain-security-reality-check-webinar</loc><lastmod>2025-12-01T21:58:44.288Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/after-russian-arrests-revil-rolls-on</loc><lastmod>2025-06-02T18:51:14.133Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/after-hack-circleci-tells-devs-to-update-secrets-now</loc><lastmod>2025-12-02T18:10:13.707Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/apple-devices-increasingly-under-attack</loc><lastmod>2025-08-01T00:29:10.596Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/nists-supply-chain-security-guidelines-for-cicd-what-you-need-to-know</loc><lastmod>2025-06-02T18:41:34.447Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/reversinglabs-a1000-threat-analysis-and-hunting-solution-update-drives-secops-forward</loc><lastmod>2025-09-02T20:34:53.653Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/r77-rootkit-typosquatting-npm-threat-research</loc><lastmod>2025-07-31T23:59:37.925Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/rust-geared-up-for-bare-metal-3-key-mobile-security-benefits</loc><lastmod>2025-07-31T22:30:45.096Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/github-boosts-secrets-scanning-why-supply-chain-security-is-key</loc><lastmod>2025-07-31T18:01:09.400Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/iamreboot-malicious-nuget-packages-exploit-msbuild-loophole</loc><lastmod>2025-07-31T20:03:41.173Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/reversinglabs-titaniumcloud-v2-v120-app-for-splunk-soar</loc><lastmod>2025-07-31T23:55:22.984Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/ai-and-transparency-how-ml-model-creators-can-protect-against-supply-chain-attacks</loc><lastmod>2025-07-31T19:51:30.290Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/protestware-taps-npm-to-call-out-wars-in-ukraine-gaza</loc><lastmod>2025-07-31T21:15:05.765Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/reversinglabs-launches-software-supply-chain-security-availability-in-aws-marketplace</loc><lastmod>2025-08-06T20:45:52.674Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/how-legacy-app-sec-holds-back-securebydesign</loc><lastmod>2025-07-31T22:42:49.349Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/software-supply-chain-security-too-costly-to-fail-and-about-to-get-much-costlier</loc><lastmod>2025-06-02T15:02:34.508Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/software-supply-chain-security-takes-center-stage-at-black-hat-2022</loc><lastmod>2026-03-02T22:14:21.343Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/how-ai-can-help-appsec-teams</loc><lastmod>2025-07-31T14:50:42.338Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/developers-behaving-badly-why-holistic-appsec-is-key</loc><lastmod>2025-07-31T16:30:46.189Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/spotting-malicious-excel4-macros</loc><lastmod>2025-06-02T14:47:11.353Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/spying-on-spynet</loc><lastmod>2025-12-01T21:33:41.915Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/subverting-trust-with-digital-counterfeits</loc><lastmod>2025-08-06T03:26:39.241Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/sunburst-the-next-level-of-stealth</loc><lastmod>2025-06-02T13:57:44.960Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/supply-chain-attacks</loc><lastmod>2025-07-29T21:12:47.886Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/advancing-the-cybersecurity-industry-with-the-sorel-20m-initiative</loc><lastmod>2025-12-02T18:00:55.877Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/a1000-version-60</loc><lastmod>2025-06-02T13:12:14.327Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/a1000-70-latest-update-threat-analysis-and-hunting-solution</loc><lastmod>2025-06-02T13:03:14.299Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/a-look-back-at-2021-the-year-supply-chain-threats-went-mainstream</loc><lastmod>2025-06-02T12:51:04.655Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/a-look-back-at-2021-the-year-ransomware-took-the-gloves-off</loc><lastmod>2025-12-02T20:50:12.810Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/8-cicd-security-best-practices-software-pipeline</loc><lastmod>2025-06-02T12:43:41.034Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/7-things-that-threaten-sbom-success</loc><lastmod>2025-06-02T12:31:51.120Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/6-things-you-may-have-missed-at-hacker-summer-camp</loc><lastmod>2025-06-02T12:19:56.352Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/6-reasons-software-security-teams-need-to-go-beyond-vulnerability-response</loc><lastmod>2025-12-02T17:55:10.354Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/6-key-misconceptions-about-sboms</loc><lastmod>2025-07-31T18:04:15.028Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/5-ways-apis-can-be-the-weak-link-in-supply-chain-security</loc><lastmod>2025-07-31T15:10:56.176Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/5-reasons-why-you-need-a-saasbom</loc><lastmod>2025-07-31T14:47:48.973Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/5-reasons-why-cyber-attackers-love-developers</loc><lastmod>2025-07-31T14:47:04.792Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/5-best-practices-sboms-cicd</loc><lastmod>2025-07-31T14:45:16.665Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/5-ai-threats-keeping-soc-teams-up-at-night</loc><lastmod>2025-07-31T14:41:05.579Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/4-ways-gitops-can-help-secure-your-software-pipeline</loc><lastmod>2025-07-31T14:37:26.710Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/3cx-supply-chain-attack-targeted</loc><lastmod>2025-07-31T22:53:42.387Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/3-ways-high-priority-malware-detection-can-fill-soc-gaps</loc><lastmod>2025-07-31T14:36:13.033Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/3-reasons-for-appsec-folks-to-be-excited-about-reversinglabs</loc><lastmod>2025-07-31T14:34:29.890Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/20-app-sec-pros-to-follow</loc><lastmod>2025-07-31T01:04:48.082Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/10-tips-for-building-an-enterprise-threat-modeling-program</loc><lastmod>2025-07-31T14:32:44.501Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/2fa-and-the-sdlc-how-authentication-can-improve-software-supply-chain-security</loc><lastmod>2025-07-31T20:41:17.161Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/secure-ai-development-guidance-what-appsec-teams-needs-to-know</loc><lastmod>2025-07-31T22:39:52.440Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/malware-leveraging-public-infrastructure-like-github-on-the-rise</loc><lastmod>2025-07-31T20:38:02.288Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/5-lessons-learned-from-the-huggingface-api-breach</loc><lastmod>2025-07-31T22:58:09.676Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/esf-steps-up-guidance-with-call-for-binary-analysis-reproducible-builds</loc><lastmod>2025-07-31T16:47:34.644Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/from-the-labs-yara-rule-for-detecting-bibi-wiper</loc><lastmod>2025-07-31T16:54:17.351Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/jetbrains-teamcity-software-supply-chain-attack-a-sunburt-redux</loc><lastmod>2025-07-31T22:58:44.377Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/software-supply-chain-risks-addressed-in-new-gartner-report</loc><lastmod>2025-06-02T19:56:56.251Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/key-reasons-organizations-fail-third-party-risk-management</loc><lastmod>2025-08-20T20:49:53.330Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/how-soc-analysts-and-threat-hunters-can-expose-hidden-malware-undetected-by-edrs</loc><lastmod>2025-07-31T19:50:14.843Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/a-definitive-guide-to-software-supply-chain-guidance</loc><lastmod>2025-07-31T14:55:58.503Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/2023-updates-in-review-malware-analysis-and-threat-hunting</loc><lastmod>2025-12-01T21:37:40.451Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/a-partial-history-of-software-supply-chain-attacks</loc><lastmod>2025-08-06T03:15:16.822Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/github-actions-hack-bolsters-case-for-complex-binary-analysis</loc><lastmod>2025-07-31T18:00:30.027Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/gitgot-cybercriminals-using-github-to-store-stolen-data</loc><lastmod>2025-07-31T17:59:47.944Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/high-profile-breach-disclosures-spotlight-new-era-of-ciso-liability</loc><lastmod>2025-07-31T20:02:15.565Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/lessons-from-the-mercedes-benz-github-source-code-leak</loc><lastmod>2025-07-31T20:28:38.703Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/ciso-accountability-in-the-era-of-software-supply-chain-security</loc><lastmod>2025-07-31T15:51:51.318Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/cloudflare-source-code-breach-lessons-learned</loc><lastmod>2025-07-31T22:57:03.823Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/how-to-stop-the-30-of-phishing-attacks-being-missed</loc><lastmod>2025-07-31T19:57:14.124Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/increase-your-siem-and-soar-return-on-investment-with-reversinglabs</loc><lastmod>2025-12-01T21:48:07.438Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/supply-chain-attacks-you-can-learn-from</loc><lastmod>2025-07-31T14:46:23.468Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/meet-the-new-rl-partner-program</loc><lastmod>2025-08-07T18:35:20.840Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/a-cisos-open-letter-on-third-party-cyber-risk-key-takeaways</loc><lastmod>2025-06-02T12:45:56.705Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/10-hacker-summer-camp-speakers-to-follow-year-round</loc><lastmod>2025-12-02T18:34:57.790Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/supply-chain-security-debt-weighing-down</loc><lastmod>2025-05-29T22:58:16.566Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/supply-chain-security-uncle-sam-wants-you-to-secure-your-code</loc><lastmod>2025-05-29T22:50:52.554Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/suppy-chain-malware-detecting-malware-in-package-manager-repositories</loc><lastmod>2025-08-19T23:34:11.997Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/survey-finds-software-supply-chain-security-top-of-mind-for-dev-teams</loc><lastmod>2025-05-29T22:38:13.539Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/complexity-and-software-supply-chain-security-study-5-key-takeaways</loc><lastmod>2025-07-31T14:44:18.810Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/taidoor-a-truly-persistent-threat</loc><lastmod>2025-05-29T22:28:08.050Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/tampering-lurks-below-the-surface-key-problems-with-software-integrity-validation</loc><lastmod>2025-05-29T21:56:18.070Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/attackers-leverage-pypi-to-sideload-malicious-dlls</loc><lastmod>2025-07-31T15:27:02.707Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/10-supply-chain-attacks-your-software-team-can-learn-from</loc><lastmod>2025-08-18T21:54:17.748Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/10-billion-files-classified</loc><lastmod>2025-06-09T22:09:16.481Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/4-ways-hero-culture-is-killing-your-organizations-security-program</loc><lastmod>2025-07-31T14:38:04.550Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/lessons-in-threat-modeling-how-attack-trees-can-secure-your-software-design</loc><lastmod>2025-07-31T20:29:21.967Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/is-copilot-leaking-your-development-secrets-4-key-considerations</loc><lastmod>2025-07-31T22:43:28.442Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/all-sboms-are-not-created-equal</loc><lastmod>2025-07-31T15:05:34.367Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/level-up-your-yara-game</loc><lastmod>2025-12-01T21:52:44.754Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/nist-supply-chain-security-guidance-for-cicd-3-ways-to-pump-up-your-program</loc><lastmod>2025-07-31T20:57:58.858Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/tampering-with-signed-objects-without-breaking-the-integrity-seal</loc><lastmod>2025-08-06T03:26:27.051Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/the-3cx-supply-chain-hack-just-got-crazier-heres-what-you-need-to-know</loc><lastmod>2025-05-29T16:44:23.308Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/the-ai-executive-order-what-appsec-teams-need-to-know</loc><lastmod>2025-05-29T16:39:49.877Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/the-evolution-of-appsec-getting-off-the-hamster-wheel-remains-elusive</loc><lastmod>2025-08-06T20:22:37.205Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/the-evolution-of-appsec-5-key-changes-required-for-a-new-era</loc><lastmod>2025-05-29T16:25:15.081Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/nist-csf-20-whats-in-this-major-revision-and-why-its-much-improved</loc><lastmod>2025-07-31T20:49:52.661Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/the-gigabyte-firmware-backdoor-and-supply-chain-security-what-you-need-to-know</loc><lastmod>2025-05-29T16:17:01.593Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/the-hunt-for-ntcrypt-exposing-a-malicious-packer</loc><lastmod>2025-05-29T16:09:05.623Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/the-latest-update-to-the-reversinglabs-a1000-threat-analysis-and-hunting-solution</loc><lastmod>2025-05-29T15:31:17.987Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/5-reasons-you-should-consider-a-career-in-application-security</loc><lastmod>2025-07-31T14:48:25.594Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/the-lockbit-takedown-what-we-know</loc><lastmod>2025-05-29T15:21:45.415Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/the-npm-package-that-walked-away-with-all-your-passwords</loc><lastmod>2025-07-31T22:59:16.388Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/the-pdf-invoice-that-phished-you</loc><lastmod>2025-07-31T23:00:24.354Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/the-power-of-automated-static-analysis</loc><lastmod>2025-07-31T23:02:19.756Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/threat-analysis-malicious-npm-package-mimicks-material-tailwind-css-tool</loc><lastmod>2025-07-31T23:51:40.248Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/bad-actors-are-going-to-school-on-sandboxes</loc><lastmod>2025-07-31T15:34:58.099Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/sboms-and-medical-devices-an-essential-step-but-no-security-cureall</loc><lastmod>2025-07-31T22:35:29.387Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/bipclip-malicious-pypi-packages-target-crypto-wallet-recovery-passwords</loc><lastmod>2026-01-20T15:50:35.534Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/gartner-outlines-top-cybersecurity-trends-and-ai-is-no-1</loc><lastmod>2025-07-31T17:08:52.714Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/how-cisas-software-development-attestation-form-falls-short</loc><lastmod>2025-07-31T19:33:08.015Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/cut-software-bloat-and-improve-your-appsec-in-the-process</loc><lastmod>2025-07-31T14:51:51.802Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/memory-safe-languages-and-secure-by-design-key-insights-and-lessons-learned</loc><lastmod>2025-07-31T20:40:14.564Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/suspicious-nuget-package-grabs-data-from-industrial-systems</loc><lastmod>2025-07-31T22:53:12.616Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/software-supply-chain-security-by-the-numbers-30-key-stats-that-matter</loc><lastmod>2025-06-02T19:58:10.465Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/a-software-supply-chain-meltdown-what-we-know-about-xz-trojan</loc><lastmod>2025-07-31T14:57:53.072Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/sboms-are-having-a-moment-how-to-make-them-actionable</loc><lastmod>2025-07-31T23:55:52.673Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/malicious-helpers-vs-code-extensions-observed-stealing-sensitive-information</loc><lastmod>2025-07-31T20:32:35.296Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/gartner-market-guide-for-supply-chain-security-why-you-need-a-comprehensive-solution</loc><lastmod>2026-02-25T17:55:33.278Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/the-rise-of-malware-in-the-software-supply-chains-and-what-to-do-about-it</loc><lastmod>2025-07-31T23:03:22.968Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/the-road-to-securing-critical-iot-devices</loc><lastmod>2025-07-31T20:09:49.502Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/the-s2c2f-aims-to-map-out-risk-from-oss</loc><lastmod>2025-07-31T19:37:23.054Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/reversinglabs-hashing-algorithm</loc><lastmod>2025-09-02T20:32:57.694Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/the-sbom-is-evolving-4-key-trends-boost-software-supply-chain-security</loc><lastmod>2025-07-31T23:03:55.333Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/genai-and-low-code-what-could-go-wrong-for-appsec</loc><lastmod>2025-08-01T00:18:19.941Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/owasp-llm-ai-security-governance-checklist-13-action-items-for-your-team</loc><lastmod>2025-07-31T21:11:16.177Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/what-went-wrong-with-the-3cx-software-supply-chain-attack-and-how-it-could-have-been-prevented</loc><lastmod>2025-08-01T00:13:28.075Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/cyclonedx-16-upgraded-for-the-evolving-software-supply-chain-security-era</loc><lastmod>2025-07-31T21:07:31.502Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/nvd-woes-put-malware-first</loc><lastmod>2025-07-31T21:01:38.900Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/how-nist-csf-20-and-c-scrm-help-manage-software-supply-chain-risk</loc><lastmod>2025-07-31T19:38:47.474Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/ga-spectradetect-v50-advanced-threat-detection</loc><lastmod>2025-07-31T15:06:08.930Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/the-software-composition-analysis-tools-landscape-and-software-supply-chain-security</loc><lastmod>2026-03-31T22:05:27.403Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/introducing-the-unified-rl-spectra-suite</loc><lastmod>2025-07-31T20:09:06.867Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/the-state-of-application-security-with-chris-romeo</loc><lastmod>2025-07-31T23:05:01.732Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/the-state-of-cybersecurity-things-are-going-to-get-worse-before-they-get-better-krebs-tells-black-hat-2022</loc><lastmod>2025-07-31T23:06:38.943Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/the-state-of-open-source-software-security-changes-in-attack-methods-policy-and-more</loc><lastmod>2025-07-31T23:07:47.699Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/the-state-of-secrets-security-7-ways-to-to-better-manage-risk</loc><lastmod>2025-07-31T23:08:31.287Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/the-state-of-software-supply-chain-security-2024-key-takeaways</loc><lastmod>2025-07-31T20:25:35.403Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/the-supply-chain-security-guide-roadmap-for-a-post-solarwinds-world</loc><lastmod>2025-12-03T19:44:06.152Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/the-week-in-cybersecurity-chips-hit-by-retbleed-journalists-the-chosen-target-of-apts</loc><lastmod>2025-07-31T23:11:15.508Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/the-week-in-cybersecurity-cyber-espionage-operation</loc><lastmod>2025-07-31T23:12:06.125Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/the-week-in-cybersecurity-cybercrime-growth-outpaces-the-security-industry</loc><lastmod>2025-07-31T23:12:40.083Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/the-week-in-cybersecurity-french-hospital-hit-with-ransomware-attack</loc><lastmod>2025-07-31T23:13:21.156Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/detection-as-code-how-to-boost-your-threat-detection-efforts</loc><lastmod>2025-07-31T16:30:00.155Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/the-week-in-cybersecurity-knotweed-serves-up-subzero-malware-infests-google-play-store</loc><lastmod>2025-07-31T23:10:43.029Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/the-week-in-cybersecurity-lapsus-back-in-action</loc><lastmod>2025-07-31T23:32:38.418Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/the-week-in-cybersecurity-meet-manjusaka-the-chinese-sibling-of-silver-and-cobalt-strike</loc><lastmod>2025-07-31T23:14:00.297Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/the-week-in-cybersecurity-mfa-shortcomings-paved-the-way-for-cisco-breach</loc><lastmod>2025-07-31T23:14:31.704Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/the-week-in-cybersecurity-nato-creates-cyber-rapid-response</loc><lastmod>2025-07-31T23:15:08.198Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/the-week-in-cybersecurity-npm-removes-malicious-modules-microsoft-backtracks-on-macros</loc><lastmod>2025-07-31T23:15:40.815Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/the-week-in-cybersecurity-solarwinds-google-drive</loc><lastmod>2025-07-31T23:16:10.339Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/the-week-in-cybersecurity-us-gov-mandates-federal-secure-software-practices</loc><lastmod>2025-07-31T23:16:44.751Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/the-week-in-cybersecurity-vice-society-ransomware</loc><lastmod>2025-07-31T23:17:16.382Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/the-week-in-security-3cx-attack-caused-by-different-software-supply-chain-hack-malware-in-google-play</loc><lastmod>2025-07-31T23:17:44.765Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/the-week-in-security-ai-tools-could-be-increasing-social-engineering-attacks-genesis-market-seized</loc><lastmod>2025-07-31T23:41:04.927Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/the-week-in-security-apt-attacking-ukraine-in-cahoots-with-russians-impact-of-ai-generated-software</loc><lastmod>2025-07-31T23:45:49.905Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/the-week-in-security-attack-on-third-party-vendor-hurts-airlines</loc><lastmod>2025-07-31T23:43:34.823Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/the-week-in-security-blackcat-threatening-to-leak-reddits-data-more-attacks-on-npm-packages</loc><lastmod>2025-07-31T23:22:59.845Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/the-week-in-security-capita-aws-bucket-exposed-benefits-data-toyota-leaks</loc><lastmod>2025-07-31T23:23:27.649Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/the-week-in-security-chinese-hackers-breach-government-email-accounts-llms-poisoned</loc><lastmod>2025-07-31T23:23:59.620Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/the-week-in-security-cisa-alerts-on-open-source-tool-sboms-are-just-the-first-step</loc><lastmod>2025-08-01T00:09:07.117Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/the-week-in-security-cisa-director-tasked-with-open-source-software-security</loc><lastmod>2025-07-31T23:21:49.808Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/the-week-in-security-cisa-to-operationalize-c-scrm-guloader-malware-targets-e-commerce</loc><lastmod>2025-07-31T23:24:29.908Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/the-week-in-security-critical-infrastructure-stays-in-cybercriminals-sights</loc><lastmod>2025-07-31T23:20:52.126Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/the-week-in-security-disguised-russian-software-used-in-us-army-cdc-applications</loc><lastmod>2025-07-31T23:26:09.575Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/the-week-in-security-docker-hub-leaks-secrets-black-basta-ransomware-gangs-up-on-retailer</loc><lastmod>2025-07-31T23:30:54.296Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/the-week-in-security-dragonbridge-china</loc><lastmod>2025-07-31T23:37:43.068Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/the-week-in-security-former-uber-cso-found-guilty-of-covering-up-hack-supply-chain-attack-targets-media</loc><lastmod>2025-07-31T23:31:27.094Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/the-week-in-security-google-cloud-build-permissions-poisoned-wormgpt-ai</loc><lastmod>2025-07-31T23:32:04.878Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/the-week-in-security-goto-breach-worse-than-expected-no-fly-list-on-unsecured-servers</loc><lastmod>2025-07-31T23:19:40.052Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/the-week-in-security-government-server-exposed-military-emails-phishing-campaign-hits-npm</loc><lastmod>2025-07-31T23:44:57.948Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/the-week-in-security-hackers-attacked-the-same-south-korean-entity-twice-hard-coded-secrets-are-up</loc><lastmod>2025-07-31T23:33:43.960Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/the-week-in-security-hackers-target-crypto-and-stock-traders-another-malicious-npm-campaign</loc><lastmod>2025-07-31T23:46:56.136Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/the-week-in-security-malware-gives-remote-access-to-air-gapped-devices-cyber-attackers-target-italy</loc><lastmod>2025-07-31T23:34:46.818Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/the-week-in-security-lastpass-shares-concerning-details-about-breach-us-govt-suffers-major-incident</loc><lastmod>2025-07-31T23:33:08.980Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/the-week-in-security-north-korean-apt-lazarus-espionage-campaign-the-future-of-pypi</loc><lastmod>2025-07-31T23:34:16.166Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/the-week-in-security-north-korean-apt-targets-developers-barbie-cybercrime</loc><lastmod>2025-07-31T23:35:39.242Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/the-week-in-security-nuget-hit-with-typosquatting-campaign-fake-chatgpt-ext-hijacks-facebook-accounts</loc><lastmod>2025-07-31T23:36:14.144Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/the-week-in-security-okta-deals-with-stolen-source-code-new-malicious-pypi-package</loc><lastmod>2025-07-31T23:36:43.757Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/the-week-in-security-openssl-danger-downgraded-github-exposed</loc><lastmod>2025-07-31T23:37:11.601Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/the-week-in-security-possible-colonial-pipeline-20-ransomware-hurts-small-american-eateries</loc><lastmod>2025-07-31T23:18:54.813Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/the-week-in-security-ransomware-pytorch-supply-chain-attack</loc><lastmod>2025-07-31T23:39:00.540Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/the-week-in-security-russian-hackers-almost-attacked-us-gas-and-electric-more-malicious-pypi-packages</loc><lastmod>2025-07-31T23:40:31.890Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/the-week-in-security-russia-takes-aim-at-ukraine-with-sandworm-the-truth-about-russias-top-search-engine</loc><lastmod>2025-07-31T23:39:56.248Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/the-week-in-security-software-supply-chain-attack-mines-diamond-industry-npm-security-boosted</loc><lastmod>2025-07-31T23:41:38.411Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/the-week-in-security-software-supply-chain-attacks-on-pypi-ransomware-attacks-vessels</loc><lastmod>2025-07-31T23:38:24.765Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/the-week-in-security-solarwinds-orion-hack-set-off-alarms-for-months-before-discovery</loc><lastmod>2025-07-31T23:42:19.403Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/the-week-in-security-tsmc-third-party-breach-ransomware</loc><lastmod>2025-07-31T23:43:02.418Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/the-week-in-security-twitter-subpoena-leak-source-code-3cx-supply-chain-attack</loc><lastmod>2025-07-31T23:44:02.157Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/the-week-in-security-when-ai-attacks-chatgpt-lowers-the-bar-for-developing-malware</loc><lastmod>2025-08-06T20:44:18.658Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/the-week-in-security-wiper-malware-proliferates-in-2022-microsoft-certificates-abused</loc><lastmod>2025-07-31T23:47:37.292Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/theres-no-silver-bullet-for-software-supply-chain-security-expert-panel-says</loc><lastmod>2025-07-31T16:49:17.073Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/third-party-code-comes-with-some-baggage</loc><lastmod>2025-07-31T23:50:01.227Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/third-party-risk-management-comprehensive-supply-chain-security</loc><lastmod>2025-07-31T23:50:32.372Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/threat-analysis-follina-exploit-powers-live-off-the-land-attacks</loc><lastmod>2025-07-31T23:51:08.001Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/threat-modeling-and-supply-chain-security-supercharge-your-software-risk-strategy</loc><lastmod>2025-07-31T23:52:15.601Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/threat-research-round-up-lessons-learned-from-recent-open-source-software-supply-chain-attacks</loc><lastmod>2025-07-31T23:53:36.082Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/three-decades-later-ransomwares-first-act-still-resonates</loc><lastmod>2025-07-31T23:54:12.732Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/timeline-of-federal-guidance-on-software-supply-chain-security</loc><lastmod>2025-07-31T16:28:15.822Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/to-secure-your-cicd-pipelines-round-up-the-usual-suspects</loc><lastmod>2025-07-31T23:56:23.422Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/tools-gap-leaves-the-software-supply-chain-exposed-why-you-need-to-upgrade-your-application-security</loc><lastmod>2025-12-01T22:44:07.576Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/top-ways-to-get-more-value-from-your-edr</loc><lastmod>2025-07-31T23:57:59.864Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/trust-based-models-and-certificate-whitelisting</loc><lastmod>2025-08-06T03:22:31.590Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/understanding-the-software-industry-as-a-lemon-market</loc><lastmod>2025-07-31T20:26:45.244Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/trust-software-verify-holistic-approach</loc><lastmod>2025-07-31T16:38:49.356Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/twitter-security-sucks-staffs-pii-access-mudge-0</loc><lastmod>2025-08-01T00:27:06.298Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/unpacking-kwampirs-rat</loc><lastmod>2025-08-01T00:00:36.166Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/visit-reversinglabs-at-black-hat-2019</loc><lastmod>2025-08-01T00:04:27.765Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/visit-us-at-rsa-2020</loc><lastmod>2025-08-01T00:05:02.135Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/vmconnect-malicious-pypi-packages-imitate-popular-open-source-modules</loc><lastmod>2025-08-01T00:07:30.455Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/vmconnect-supply-chain-campaign-continues</loc><lastmod>2025-08-01T00:05:31.981Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/vs-code-ide-hack-how-supply-chain-attacks-can-proliferate-between-developer-ecosystems</loc><lastmod>2025-08-01T00:08:00.565Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/w4sp-continues-to-nest-in-pypi-same-supply-chain-attack-different-distribution-method</loc><lastmod>2025-08-01T00:08:30.801Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/week-in-security-3cx-north-korean-cisa-secure-by-design</loc><lastmod>2025-07-31T23:18:19.679Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/week-in-security-ai-hallucinations-risk</loc><lastmod>2025-07-31T23:20:13.552Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/week-in-security-barracudas-email-flaw-ai-existential</loc><lastmod>2025-07-31T23:21:19.571Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/week-in-security-yorotrooper</loc><lastmod>2025-07-31T23:48:07.237Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/what-are-supply-chain-attacks-how-to-protect-your-software-lifecycle</loc><lastmod>2025-08-01T00:09:42.317Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/what-happens-when-you-give-group-developers-some-hammers-paintbrushes-and-paint-magic-thats</loc><lastmod>2025-08-01T00:10:51.794Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/what-in-the-heck-is-the-difference-between-app-sec-and-software-supply-chain-security-its-all-in-the-hack</loc><lastmod>2025-08-01T00:17:24.207Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/what-sca-misses-the-monsters-in-your-software-supply-chain</loc><lastmod>2025-08-07T13:40:32.653Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/what-we-know-about-blackcat-and-the-mgm-hack</loc><lastmod>2025-07-31T15:36:16.491Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/whats-behind-sbom-skepticism-one-word-fear</loc><lastmod>2025-08-01T00:22:48.139Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/whats-hot-at-rsa-conference-2024-7-must-see-secops-talks</loc><lastmod>2025-08-01T00:15:57.102Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/whats-hot-at-rsa-conference-2023-must-see-malware-and-threat-hunting-talks</loc><lastmod>2025-08-01T00:15:21.039Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/whats-hot-at-rsac-heres-our-picks-for-the-big-show</loc><lastmod>2025-08-01T00:14:34.777Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/when-genai-met-threat-modeling-3-key-benefits-for-appsec</loc><lastmod>2025-08-01T00:20:16.674Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/when-malware-rats-on-their-owners</loc><lastmod>2025-12-01T21:51:03.085Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/when-python-bytecode-bites-back-who-checks-the-contents-of-compiled-python-files</loc><lastmod>2025-08-01T00:17:50.319Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/white-house-cyber-strategy-a-lovehate-story</loc><lastmod>2025-08-01T00:20:46.595Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/white-house-memo-lays-down-the-law-on-software-supply-chain-security</loc><lastmod>2025-08-01T00:21:15.884Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/why-app-sec-testing-alone-is-not-enough-to-secure-your-software-supply-chain</loc><lastmod>2025-07-31T14:35:23.515Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/why-application-security-prioritization-is-still-the-cisos-biggest-unsolved-problem</loc><lastmod>2025-07-31T15:08:13.736Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/why-you-need-to-prioritize-software-development-and-supply-chain-security</loc><lastmod>2025-08-01T00:27:38.188Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/why-build-a-local-threat-intelligence-infrastructure-with-automated-static-analysis</loc><lastmod>2025-12-01T22:50:02.339Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/why-ground-truth-is-key-the-case-for-sbom-benchmarks</loc><lastmod>2025-08-01T00:24:30.057Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/why-shift-left-is-now-a-dirty-word-in-some-security-circles</loc><lastmod>2025-08-01T00:21:44.534Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/why-software-supply-chain-security-is-now-a-requirement</loc><lastmod>2025-08-01T00:01:38.217Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/why-software-transparency-is-critical-understanding-supply-chain-security-in-a-software-driven-society</loc><lastmod>2025-12-10T15:02:24.016Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/why-your-appsec-teams-focus-should-shift-to-malware</loc><lastmod>2025-12-02T20:58:15.231Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/wiper-malware-targeting-ukraine-evidence-of-planning-and-haste</loc><lastmod>2025-08-01T00:28:43.882Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/with-twitter-source-code-in-the-wild-devsecops-doubts-surface</loc><lastmod>2025-08-01T00:30:10.824Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/wormgpt-highly-effective-business-email-compromise-made-easy-with-ai-hack</loc><lastmod>2025-08-01T00:30:40.993Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/writing-detailed-yara-rules-for-malware-detection</loc><lastmod>2025-07-31T20:01:38.816Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/xz-trojan-hack-highlights-software-supply-chain-risk-from-sock-puppets</loc><lastmod>2025-08-01T00:31:10.077Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/yara-rule-detecting-acepy</loc><lastmod>2025-07-31T16:53:40.670Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/yara-rule-detecting-blue-locker</loc><lastmod>2025-07-31T16:55:34.169Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/yara-rule-detecting-conti</loc><lastmod>2025-07-31T16:56:17.438Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/yara-rule-detecting-malware-wipers</loc><lastmod>2025-07-31T17:04:20.507Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/yara-rule-for-detecting-black-basta</loc><lastmod>2025-07-31T16:54:53.986Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/yara-rule-for-detecting-goodwill</loc><lastmod>2025-07-31T16:56:57.898Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/yara-rule-for-detecting-gwisinlocker</loc><lastmod>2025-07-31T17:02:39.830Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/yara-rule-for-detecting-lorenz</loc><lastmod>2025-07-31T17:03:44.996Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/yara-rule-for-detecting-nokoyawa</loc><lastmod>2025-07-31T17:07:21.799Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/whats-hot-at-rsac-2024-8-sscs-talks-you-dont-want-to-miss</loc><lastmod>2025-08-01T00:16:25.473Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/verizon-2024-dbir-software-supply-chain-risks-fuel-a-data-breach-epidemic</loc><lastmod>2025-08-01T00:02:15.523Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/why-genai-fails-at-full-soc-automation</loc><lastmod>2025-08-01T00:23:33.297Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/cicd-in-the-cloud-are-your-secrets-at-risk</loc><lastmod>2025-07-31T15:41:30.034Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/nsa-state-backed-attackers-are-not-after-your-data-theyre-targeting-ci</loc><lastmod>2025-07-31T21:00:19.498Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/what-you-missed-at-rsa-conference-2024-key-trends-and-takeaways</loc><lastmod>2025-08-01T00:13:58.812Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/cisas-new-vulnrichment-program-attempts-to-address-nvd-slowdown</loc><lastmod>2025-07-31T15:45:00.286Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/inherent-threats-and-what-they-mean-to-threat-modeling</loc><lastmod>2025-08-01T00:19:16.194Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/cisas-secure-by-design-pledge</loc><lastmod>2025-08-01T00:28:12.135Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/your-support-must-scale-dont-be-like-meta-dev-teams</loc><lastmod>2025-08-01T00:31:46.201Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/shareable-sboms-why-they-are-essential-for-software-security</loc><lastmod>2025-07-31T00:02:50.761Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/zero-trust-and-threat-modeling-is-it-time-for-appsec-to-get-on-board</loc><lastmod>2025-08-01T00:32:22.773Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/zetanile-open-source-software-trojans-from-north-korea</loc><lastmod>2025-07-31T22:31:42.012Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/the-state-of-appsec-are-we-getting-better-or-worse</loc><lastmod>2025-07-31T23:06:07.158Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/malicious-attack-method-on-hosted-ml-models-now-targets-pypi</loc><lastmod>2025-07-31T00:02:04.546Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/secops-by-the-numbers-stats-that-matter</loc><lastmod>2025-07-31T22:48:03.791Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/nsas-zero-trust-maturity-for-appsec-what-you-need-to-know</loc><lastmod>2025-07-31T21:00:55.540Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/zoom-joins-the-vulnerability-fray-will-it-move-the-needle-on-appsec</loc><lastmod>2025-12-02T20:59:51.015Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/9-best-practices-for-leveraging-threat-intelligence-in-your-security-operations</loc><lastmod>2025-07-31T14:54:29.547Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/python-downloader-highlights-noise-problem-in-open-source-threat-detection</loc><lastmod>2025-07-31T21:17:35.380Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/listen-up-10-cybersecurity-podcasts-you-can-learn-from</loc><lastmod>2025-07-31T20:32:01.939Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/how-to-assess-and-manage-commercial-software-risk</loc><lastmod>2025-07-31T19:52:10.449Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/verizon-dbir-2024-the-rise-in-software-supply-chain-attacks-explained</loc><lastmod>2025-08-01T00:03:18.138Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/why-malware-matters-most-6-ways-to-foil-malicious-software-threats-faster</loc><lastmod>2025-08-01T00:25:02.958Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/10-must-follow-cybersecurity-substacks</loc><lastmod>2025-08-06T03:17:41.567Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/how-to-secure-mergers-acquisitions-from-software-supply-chain-attacks</loc><lastmod>2025-07-31T19:56:33.046Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/the-power-of-complex-binary-analysis</loc><lastmod>2025-09-02T19:38:07.126Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/how-platform-engineering-can-deliver-on-the-promise-of-secure-by-design</loc><lastmod>2025-07-31T19:48:06.208Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/new-portal-helps-devs-spot-malicious-open-source-packages</loc><lastmod>2025-09-02T20:35:36.156Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/a-lurking-npm-package-makes-the-case-for-open-source-health-checks</loc><lastmod>2025-07-31T20:34:19.087Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/oasis-opens-software-supply-chain-standards-push-what-you-need-to-know</loc><lastmod>2025-07-31T21:02:20.142Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/the-pollyfillio-supply-chain-attack-lessons-learned</loc><lastmod>2025-07-31T23:00:59.118Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/new-gartner-report-introduces-three-pillars-to-strengthen-software-supply-chain-security</loc><lastmod>2025-09-02T19:35:43.373Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/introducing-saasbom-in-spectra-assure</loc><lastmod>2025-09-17T19:57:33.336Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/the-state-of-devsecops-why-upgrading-your-appsec-tooling-is-key</loc><lastmod>2025-07-31T23:07:12.673Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/malicious-nuget-campaign-uses-homoglyphs-and-il-weaving-to-fool-devs</loc><lastmod>2025-07-31T20:34:58.053Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/appsec-alert-fatigue-4-ways-to-reduce-the-risk-of-burnout</loc><lastmod>2025-07-31T15:09:11.126Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/how-spectra-assure-analyzes-reproducible-builds</loc><lastmod>2025-07-31T19:48:44.924Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/appsec-substacks-you-should-follow</loc><lastmod>2025-07-31T23:09:11.724Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/secure-by-default-a-painless-way-to-harden-your-appsec</loc><lastmod>2025-07-31T22:40:25.847Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/9-secops-talks-you-dont-want-to-miss-at-black-hat-2024</loc><lastmod>2025-07-31T14:55:11.719Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/oscr-report-95-of-organizations-face-severe-software-supply-chain-risk</loc><lastmod>2025-07-31T21:06:25.057Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/software-supply-chain-security-for-dummies-3-takeaways-for-your-team</loc><lastmod>2025-06-02T19:59:06.725Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/rl-black-hat-heres-what-you-can-expect</loc><lastmod>2025-07-31T21:28:42.340Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/8-key-steps-vm-security</loc><lastmod>2025-07-31T15:36:53.326Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/roguepuppet-software-supply-chain-exposure-lessons-learned</loc><lastmod>2025-07-31T22:28:47.259Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/8-supply-chain-security-talks-you-dont-want-to-miss-at-black-hat</loc><lastmod>2025-07-31T14:53:53.483Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/moden-supply-chain-threats-update-approach</loc><lastmod>2025-07-31T15:11:34.139Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/the-big-cybersecurity-themes-at-black-hat-2024-and-why-they-matter</loc><lastmod>2025-07-31T22:56:33.672Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/why-safe-why-now</loc><lastmod>2025-09-09T15:26:25.888Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/cyber-risk-landscape-peer-report-4-takeaways-for-your-security-team</loc><lastmod>2025-07-31T16:02:14.002Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/rl-spectra-advanced-file-analysis-and-malware-detection-suite-updates</loc><lastmod>2025-09-02T19:43:08.290Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/software-complexity-is-a-real-problem-and-your-appsec-must-factor-that-in</loc><lastmod>2025-07-31T22:49:16.052Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/secure-by-demand-key-takeaways-for-enterprise-software-buyers</loc><lastmod>2025-07-31T22:41:31.010Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/nist-adversarial-ml-guidance-how-rl-spectra-assure-can-secure-your-organization</loc><lastmod>2025-09-17T19:58:57.106Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/black-hat-experts-call-for-reboot-to-tackle-software-supply-chain-threats</loc><lastmod>2025-07-31T18:07:50.044Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/5-secops-automation-challenges-and-how-to-overcome-them</loc><lastmod>2025-07-31T14:49:00.670Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/cybersecuritys-workforce-talent-gap-woes-myth-or-reality</loc><lastmod>2025-07-31T16:04:13.420Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/think-log4j-is-a-wrap-think-again-rce-flaw-remains-threat-actors-favorite</loc><lastmod>2025-07-31T23:49:25.466Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/quantum-threat-pushes-nist-to-stand-up-software-supply-chain-protection</loc><lastmod>2025-08-01T00:29:40.154Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/are-traditional-cybersecurity-certifications-still-worth-your-time</loc><lastmod>2025-07-31T16:36:51.031Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/epss-vulnerabilities-shows-promise</loc><lastmod>2025-07-31T16:45:31.231Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/secure-by-demand-why-you-should-go-beyond-questionnaires-and-sboms</loc><lastmod>2025-12-02T19:04:54.770Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/supply-chain-security-demands-make-software-stack-visibility-essential</loc><lastmod>2025-08-06T03:13:28.996Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/coordinated-your-software-supply-chain-security-with-shareable-spectra-assure-safe-reports</loc><lastmod>2025-09-02T19:09:03.849Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/fake-recruiter-coding-tests-target-devs-with-malicious-python-packages</loc><lastmod>2025-07-31T16:49:52.759Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/whats-in-your-commercial-software</loc><lastmod>2025-08-01T00:16:55.021Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/the-sbom-has-a-long-history-but-its-whats-next-that-matters</loc><lastmod>2025-07-31T14:56:35.174Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/sbom-go-beyond-checkbox-software-security</loc><lastmod>2025-07-31T18:04:51.680Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/sbom-a-rama-4-key-takeaways-for-software-security-teams</loc><lastmod>2025-07-31T15:43:54.057Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/chaos-engineering-software-transparency</loc><lastmod>2025-07-31T20:44:21.877Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/opencti-integrations</loc><lastmod>2025-07-31T16:44:50.809Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/transparency-and-trust-solarwinds-ciso-on-securing-the-software-supply-chain</loc><lastmod>2025-09-02T19:35:21.115Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/software-quality-dilemma-risk</loc><lastmod>2025-07-31T01:07:44.318Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/sam-curry-when-hackers-get-hacked</loc><lastmod>2025-08-01T00:18:46.896Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/modernize-your-skills-top-cybersecurity-certifications-to-boost-your-career</loc><lastmod>2025-07-31T22:55:59.196Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/get-ahead-of-cisas-new-software-security-acquisition-requirements</loc><lastmod>2025-07-31T17:58:17.830Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/do-more-with-your-soar</loc><lastmod>2025-07-31T16:37:38.371Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/5-commercial-software-attacks-and-what-you-can-learn-from-them</loc><lastmod>2025-07-31T14:42:16.659Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/how-ai-tackles-key-challenges-facing-cisos-and-soc-teams</loc><lastmod>2025-07-31T14:59:14.866Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/threat-modeling-and-supply-chain-security-supercharge-your-software-risk-strategy</loc><lastmod>2025-05-16T22:04:04.382Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/strengthening-supply-chains-reversinglabs-now-integrates-with-servicenow</loc><lastmod>2026-03-02T22:12:12.844Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/reversinglabs-product-release-highlights-october-2024</loc><lastmod>2025-09-02T19:31:57.935Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/owasp-dependency-track-update-key-changes-and-limitations-on-software-risk-management</loc><lastmod>2025-07-31T21:10:26.834Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/keep-secrets-secret-5-essential-tips</loc><lastmod>2025-07-31T20:15:41.697Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/ciso-survival-guide-commercial-software-supply-chain-risk</loc><lastmod>2025-07-31T15:54:02.580Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/connected-car-cybersecurity-software-complexity-takes-to-the-road</loc><lastmod>2025-07-31T15:57:56.782Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/upgrade-nice-sscs-era</loc><lastmod>2025-07-31T20:59:05.888Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/spectra-assure-malware-detection-in-ml-and-llm-models</loc><lastmod>2025-07-31T16:29:21.739Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/windows-downgrade-attacks-open-fully-patched-systems-to-malware</loc><lastmod>2025-07-31T16:42:45.187Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/how-expanding-appsec-to-prodsec-supports-secure-by-design</loc><lastmod>2025-07-31T15:09:56.748Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/gauging-the-safety-level-of-your-software-with-spectra-assure</loc><lastmod>2025-07-31T17:56:57.835Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/backdoor-implant-discovered-on-pypi-posing-as-debugging-utility</loc><lastmod>2025-07-31T15:27:57.044Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/cisa-secure-software-deployment-guidance</loc><lastmod>2025-07-31T15:51:05.581Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/differential-analysis-raises-red-flags-over-lottiefiles-lottie-player</loc><lastmod>2025-08-18T21:04:48.723Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/owasp-top-10-for-llm-risk</loc><lastmod>2025-07-31T00:05:41.644Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/malicious-pypi-crypto-pay-package-aiocpa-implants-infostealer-code</loc><lastmod>2025-07-31T20:35:31.030Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/appsec-pros-shift-left-alone-not-enough</loc><lastmod>2025-08-01T00:26:01.606Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/software-liability-gets-real-5-steps</loc><lastmod>2025-07-31T22:49:48.363Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/spectra-assure-community-empowers-net-developers-to-vet-nuget-packages</loc><lastmod>2025-07-31T01:06:32.332Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/state-of-appsec-tools-level-up</loc><lastmod>2025-07-31T23:05:32.595Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/secure-your-aws-environments-go-beyond-traditional-tooling-in-2025</loc><lastmod>2025-07-31T22:46:52.292Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/malware-found-in-solana-npm-library-with-50m-downloads</loc><lastmod>2026-01-20T15:51:47.162Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/compromised-ultralytics-pypi-package-delivers-crypto-coinminer</loc><lastmod>2026-01-20T15:52:45.225Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/sec-takes-action-software-transparency</loc><lastmod>2025-07-31T22:36:53.098Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/automated-ai-fuzzing-targets-open-source-llm-vulnerabilities</loc><lastmod>2025-07-31T15:03:44.171Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/uk-cyber-chief-serious-gap</loc><lastmod>2025-08-01T00:00:07.435Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/a-new-playground-malicious-campaigns-proliferate-from-vscode-to-npm</loc><lastmod>2025-07-31T14:57:18.488Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/the-year-in-ransomware-security-lessons-to-help-you-stay-one-step-ahead</loc><lastmod>2025-07-31T23:48:48.608Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/cryptominers-growing-threat</loc><lastmod>2026-01-20T15:51:02.861Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/the-secs-8-k-cybersecurity-incident-disclosures-for-2024-timeline</loc><lastmod>2025-07-31T22:37:48.186Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/compliance-as-security-a-reality-check</loc><lastmod>2025-07-31T15:56:43.103Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/census-iii-study-spotlights-ongoing-open-source-security-challenges</loc><lastmod>2025-07-31T15:40:15.971Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/go-beyond-shift-left</loc><lastmod>2025-07-31T18:06:06.901Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/securing-generative-ai-5-action-items-to-protect-your-organization</loc><lastmod>2025-07-31T22:47:28.494Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/multi-scanning-antivirus-methodology</loc><lastmod>2025-09-02T20:36:57.940Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/bsimm15-sbom-ai-security-modern-tooling</loc><lastmod>2025-08-07T14:50:16.857Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/ai-double-edged-sword-update</loc><lastmod>2025-07-31T15:02:52.700Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/owasp-nhi-top-10-what-you-need-to-know-about-agentic-ai-risk</loc><lastmod>2025-07-31T21:09:14.418Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/the-state-of-container-security-4-essential-practices-to-manage-risk</loc><lastmod>2025-07-31T17:59:06.316Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/secure-by-design-and-secure-by-default-why-we-need-both-for-appsec</loc><lastmod>2025-07-31T22:42:11.538Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/sandboxes-rl-advance-malware-analysis</loc><lastmod>2025-09-02T19:44:07.693Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/mcp-powerful-ai-coding-risk</loc><lastmod>2025-07-31T20:38:57.188Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/rl-identifies-malware-ml-model-hosted-on-hugging-face</loc><lastmod>2025-08-07T20:40:29.799Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/glasswall-and-reversinglabs-enhancing-content-disarm-and-reconstruction-cdr-with-advanced-threat-intelligence</loc><lastmod>2025-09-23T21:50:39.305Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/cisa-ssg-appsec-best-practices</loc><lastmod>2025-07-31T15:42:37.360Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/boost-suspicious-file-triage</loc><lastmod>2025-07-31T22:52:38.791Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/what-developers-think-about-application-security-might-surprise-you</loc><lastmod>2025-08-01T00:10:16.505Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/securing-ai-systems-is-complicated</loc><lastmod>2025-07-31T22:39:05.468Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/software-security-fails</loc><lastmod>2025-07-31T14:53:14.203Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/spectra-assure-artifactory-integration-securing-software-development</loc><lastmod>2025-09-02T19:39:08.975Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/sca-is-no-longer-relevant</loc><lastmod>2025-07-31T22:36:12.505Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/going-beyond-vulnerabilities-reports-why</loc><lastmod>2025-07-31T18:05:32.000Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/silent-breaches-supply-chain-security-lessons-learned</loc><lastmod>2025-07-31T22:48:41.975Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/agentic-ai-software-development-how-to-manage-risk</loc><lastmod>2026-01-20T17:58:26.884Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/software-development-security-challenges-ai</loc><lastmod>2025-07-31T23:09:42.467Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/7-best-practices-for-securing-containers</loc><lastmod>2025-08-01T18:28:36.017Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/same-name-different-hack-pypi-package-targets-solana-developers</loc><lastmod>2025-07-31T22:33:16.318Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/cybersecurity-fog-of-war-data-science</loc><lastmod>2025-07-31T19:35:31.191Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/generative-ai-software-development-risk</loc><lastmod>2025-07-31T17:57:32.193Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/hidden-risks-commercial-software</loc><lastmod>2025-07-31T18:16:42.063Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/how-to-assess-vm-disk-image-security-at-speed-with-spectra-assure</loc><lastmod>2025-09-17T20:03:43.304Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/owasp-supply-chain-security-cheat-sheet</loc><lastmod>2025-07-31T21:08:44.191Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/epss-is-not-foolproof-shift-your-appsec-beyond-vulnerabilities</loc><lastmod>2025-07-31T16:46:17.811Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/the-changing-face-of-open-source-security</loc><lastmod>2025-07-31T20:27:20.378Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/ciso-survey-6-lessons-for-tpcrm</loc><lastmod>2025-07-31T15:52:45.404Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/crypto-gets-a-target-on-its-back</loc><lastmod>2025-07-31T15:59:34.727Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/malicious-npm-patch-delivers-reverse-shell</loc><lastmod>2025-07-31T20:37:27.746Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/weaponizing-ai-coding</loc><lastmod>2025-07-31T15:01:49.113Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/openssf-open-source-project-security-baseline</loc><lastmod>2025-07-31T21:04:38.739Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/cves-lose-relevance-get-proactive-and-think-beyond-vulnerabilities</loc><lastmod>2025-07-31T16:00:08.013Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/malicious-python-packages-target-popular-bitcoin-library</loc><lastmod>2026-01-20T15:52:11.265Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/the-race-to-secure-the-aiml-supply-chain-is-on-get-out-front</loc><lastmod>2025-07-31T23:02:51.488Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/vibe-coding-what-autonomous-code-means-for-appsec</loc><lastmod>2025-08-01T00:03:52.402Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/indirect-prompt-injections-target-llm-data</loc><lastmod>2025-07-31T20:05:01.291Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/atomic-and-exodus-crypto-wallets-targeted-in-malicious-npm-campaign</loc><lastmod>2025-07-31T15:12:20.869Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/quantum-comes-to-appsec</loc><lastmod>2025-07-31T21:18:49.920Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/the-cybersecurity-job-market-is-complicated-3-key-insights-to-help</loc><lastmod>2025-07-31T22:57:36.679Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/nist-adversarial-ml-guidance-6-action-items-for-your-security-team</loc><lastmod>2025-07-31T20:58:34.632Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/cve-changes-a-call-to-action-appsec</loc><lastmod>2025-07-31T15:40:55.072Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/verizon-2025-dbir-third-party-risk</loc><lastmod>2025-08-01T00:02:47.314Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/secure-ai-supply-chain-mlbom</loc><lastmod>2025-09-02T19:33:57.753Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/what-is-the-xbom</loc><lastmod>2025-09-02T19:34:40.150Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/saas-security-risk-xbom</loc><lastmod>2025-07-31T22:32:02.127Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/xbom-tools-software-security</loc><lastmod>2025-07-31T21:26:36.971Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/secrets-leaks-beyond-the-codebase</loc><lastmod>2025-07-31T22:38:29.858Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/mit-researchers-tame-ai-coding</loc><lastmod>2025-07-31T20:41:52.838Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/mobile-and-third-party-risk-how-legacy-testing-leaves-you-exposed</loc><lastmod>2025-07-31T20:43:16.158Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/events/q1-2026-threat-research-oss-attacks</loc><lastmod>2026-03-27T16:31:22.582Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/events/verify-packages-spectra-assure-community</loc><lastmod>2026-03-31T15:37:01.208Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/press-releases/reversinglabs-named-winner-of-the-global-infosec-awards-during-rsac-conference-2026</loc><lastmod>2026-03-23T15:18:05.671Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/webinar/how-to-make-sboms-actionable-with-purls</loc><lastmod>2026-03-17T20:12:42.821Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/events/rsac-2026-recap</loc><lastmod>2026-04-02T16:49:03.680Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/webinar/building-a-friction-free-release-cycle-with-reversinglabs-defectdojo</loc><lastmod>2026-03-11T20:05:44.878Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/webinar/why-binary-analysis-is-now-a-must-have-control</loc><lastmod>2026-03-06T04:37:07.760Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/events/making-sboms-actionable-with-purls</loc><lastmod>2026-03-12T13:27:58.045Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/webinar/threat-intel-101-contextual-dynamic-analysis</loc><lastmod>2026-02-25T18:16:05.495Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/rl-rsac-2026</loc><lastmod>2026-03-12T15:51:56.607Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/webinar/life-of-an-attack</loc><lastmod>2026-02-18T21:08:20.428Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/gartner-ciso-playbook</loc><lastmod>2026-03-11T20:01:56.533Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/servicenow-integration-for-secure-itsm</loc><lastmod>2026-02-20T18:59:22.985Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/events/binary-analysis-must-have-commercial-software-risk</loc><lastmod>2026-02-13T04:28:06.324Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/solutions/icap-server</loc><lastmod>2026-03-19T21:15:50.508Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/conversinglabs/predictions-for-software-supply-chain-security-in-2026</loc><lastmod>2026-02-12T13:13:02.394Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/events/building-a-friction-free-release-cycle-with-reversinglabs-defectdojo</loc><lastmod>2026-03-11T19:19:41.767Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/de/2026-software-lieferketten-sicherheitsberichtvielen-dank</loc><lastmod>2026-02-09T20:47:07.440Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/de/sscs-bericht</loc><lastmod>2026-02-04T17:41:20.996Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/gartner-ciso-playbook-thank-you</loc><lastmod>2026-02-05T18:42:42.712Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/solutions/secure-software-onboarding</loc><lastmod>2026-03-16T19:39:57.633Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/webinar/threat-research-round-up-q4-2025</loc><lastmod>2026-01-23T15:45:59.351Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/webinar/inside-the-2026-software-supply-chain-security-report</loc><lastmod>2026-02-11T20:30:54.054Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/sscs-report/methodology</loc><lastmod>2026-01-27T15:27:58.830Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/events/life-of-an-attack</loc><lastmod>2026-01-22T03:30:11.361Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/press-releases/reversinglabs-2026-software-supply-chain-security-report-identifies-73-increase-in-malicious-open-source-packages</loc><lastmod>2026-03-19T00:22:56.972Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/2026-software-supply-chain-security-report-thank-you</loc><lastmod>2026-01-27T15:25:05.429Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/sscs-report</loc><lastmod>2026-02-11T17:14:34.383Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/news/security-boulevard-the-latest-shai-hulud-malware-is-faster-and-more-dangerous</loc><lastmod>2025-12-29T18:28:15.761Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/news/bleeping-computer-malicious-vscode-marketplace-extensions-hid-trojan-in-fake-png-file</loc><lastmod>2025-12-29T18:29:24.677Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/news/forbes-microsoft-worm-attack-warning--act-rapidly-and-change-passwords-now</loc><lastmod>2025-12-29T18:31:38.542Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/webinar/the-2025-supply-chain-breach-roundup</loc><lastmod>2025-12-23T16:40:33.767Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/webinar/your-new-security-playbook-for-ai-driven-software-risk</loc><lastmod>2026-02-04T13:31:18.781Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/webinar/building-high-fidelity-threat-intel-feeds-for-agentic-ai</loc><lastmod>2026-02-05T16:53:32.149Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/webinar/modern-tprm-strategies-for-securely-onboarding-vendor-software</loc><lastmod>2025-12-05T22:17:59.600Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/contact-our-partnerships-team</loc><lastmod>2025-12-30T19:08:01.737Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/events/build-high-fidelity-threat-feeds-for-agentic-ai</loc><lastmod>2025-12-13T04:00:30.099Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/reversinglabs-powers-analyst1-with-industry-leading-malware-intelligence</loc><lastmod>2025-12-30T19:16:28.423Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/webinar/its-time-for-zero-trust-for-software-supply-chain-security-on-demand</loc><lastmod>2025-11-19T20:59:13.397Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/webinar/empowering-maintainers-to-thrive-not-just-survive</loc><lastmod>2026-01-22T03:08:12.526Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/conversinglabs/can-frameworks-stop-supply-chain-attacks</loc><lastmod>2025-12-04T13:00:31.027Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/webinar/operationalizing-mitre-attck</loc><lastmod>2025-11-19T20:52:39.108Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/press-releases/reversinglabs-appoints-matt-gyde-as-chief-revenue-officer</loc><lastmod>2025-11-12T14:00:12.401Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/events/faster-ato-accelerating-secure-software-approval</loc><lastmod>2026-03-06T15:23:40.563Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/webinar/advancing-malware-analysis-threat-hunting</loc><lastmod>2025-10-31T18:49:37.312Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/webinar/anatomy-of-a-software-supply-chain-attack</loc><lastmod>2025-10-31T18:37:55.711Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/events/operationalizing-mitre-attck-smarter-malware-detection-with-mitre</loc><lastmod>2025-11-10T17:10:24.534Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/conversinglabs/the-state-of-vulnerability-management</loc><lastmod>2025-11-05T13:00:12.746Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/webinar/compliance-and-regs-for-devs</loc><lastmod>2025-10-31T17:34:32.393Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/webinar/threat-research-roundup-q3-2025</loc><lastmod>2025-10-22T18:40:59.202Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/management-team/matt-gyde</loc><lastmod>2026-03-09T22:30:40.483Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/events/rl-wlc-nordic-live-event</loc><lastmod>2025-11-06T21:34:25.524Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/events/advancing-malware-analysis-threat-hunting</loc><lastmod>2025-10-24T15:34:04.420Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/events/anatomy-of-a-software-supply-chain-attack</loc><lastmod>2025-10-22T16:30:57.496Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/webinar/what-makes-a-cyber-incident-material</loc><lastmod>2025-10-07T17:02:20.771Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/webinar/demo-spectra-assure-for-enterprise-software-buyers</loc><lastmod>2025-10-22T18:23:55.729Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/webinar/breaking-free-from-virustotal-lock-in</loc><lastmod>2025-10-15T15:35:55.644Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/trade-show-booth-visit-lp</loc><lastmod>2025-12-30T19:11:09.986Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/conversinglabs/who-will-maintain-open-sources-future</loc><lastmod>2025-12-01T19:38:22.355Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/reversinglabs-vs-virustotal</loc><lastmod>2026-03-12T19:56:33.815Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/spectra-analyze-free-trial</loc><lastmod>2025-12-30T19:17:34.170Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/webinar/sbom-power-hour-on-demand</loc><lastmod>2025-10-09T20:11:52.296Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/webinar/the-vibe-is-off-on-demand</loc><lastmod>2025-10-09T20:13:47.918Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/events/breaking-free-from-vt-lock-in</loc><lastmod>2026-03-27T18:22:31.083Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/events/demo-spectra-assure-for-software-producers</loc><lastmod>2026-03-27T18:52:25.808Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/webinar/dont-buy-a-breach-on-demand</loc><lastmod>2025-10-09T20:14:36.162Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/rl-nyc-roadshow</loc><lastmod>2025-12-30T19:08:58.234Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/news/the-energy-pipeline-sasa-zdjelar</loc><lastmod>2025-09-08T14:47:06.252Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/resources/subscribe-to-our-newsletter</loc><lastmod>2026-03-03T20:53:29.244Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/press-releases/reversinglabs-spectra-assure-earns-awardable-designations-from-the-us-department-of-defense-and-chief-digital-and-artificial-intelligence-office</loc><lastmod>2025-09-03T13:34:30.953Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/events/the-vibe-is-off</loc><lastmod>2025-09-17T16:38:00.198Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/webinar/beyond-virustotal</loc><lastmod>2025-09-19T15:08:44.086Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/events/dont-buy-a-breach</loc><lastmod>2025-09-12T19:47:40.771Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/eventresources</loc><lastmod>2026-03-17T16:24:44.310Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/webinar/code-to-identity-trust</loc><lastmod>2025-08-25T20:15:52.703Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/webinar/hacker-summer-camp-2025-debrief-on-demand</loc><lastmod>2025-11-04T18:14:21.885Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/rl-toronto-roadshow</loc><lastmod>2025-12-30T19:10:46.397Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/oem-partners</loc><lastmod>2026-01-13T15:40:54.894Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/webinar/augment-your-sandbox-with-automated-static-analysis</loc><lastmod>2025-08-25T22:05:39.022Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/webinar/applying-yara-to-uncover-hidden-phishing-threats-months-after-the-attack</loc><lastmod>2025-08-25T22:05:05.600Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/conversinglabs/security-badging-open-source-projects</loc><lastmod>2025-09-04T13:47:45.139Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/events/sbom-power-hour</loc><lastmod>2025-09-17T19:52:21.400Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/events/beyond-virustotal</loc><lastmod>2025-08-27T20:52:27.466Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/news/cybercrime-magazine-hot-150-cybersecurity-companies-to-watch-in-2021</loc><lastmod>2025-08-05T17:32:47.532Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/learning-with-reversinglabs-deminar-videos</loc><lastmod>2025-08-05T15:30:32.018Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/resources/reversinglabs-enrichment-for-anomali-threatstream</loc><lastmod>2025-08-25T22:03:01.978Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/company/careers</loc><lastmod>2026-03-11T14:16:26.636Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/events/hacker-summer-camp-2025-debrief</loc><lastmod>2025-08-25T22:02:41.347Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/webinar/2025-dbir-third-party-breach-risk</loc><lastmod>2025-08-05T16:06:51.678Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/press-releases/reversinglabs-receives-darpa-contract-develop-file-disinfection-framework</loc><lastmod>2025-08-13T15:30:49.441Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/webinar/how-to-mine-for-malicious-ruby-gems</loc><lastmod>2025-08-25T22:02:01.035Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/events/managing-third-party-software-risk</loc><lastmod>2025-08-26T16:35:42.315Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/advisory-board</loc><lastmod>2025-12-30T19:11:55.583Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/webinar/how-to-identify-hidden-destructive-objects-in-your-environment</loc><lastmod>2025-08-25T21:57:42.269Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/webinar/explainable-threat-intelligence-moving-beyond-black-box-convictions</loc><lastmod>2025-08-25T21:57:17.732Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/learning-with-reversinglabs-expert-tomislav-pericin</loc><lastmod>2025-07-31T22:57:05.337Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/webinar/dissection-101-step-by-step-static-analysis</loc><lastmod>2025-08-25T21:56:57.778Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/learning-with-reversinglabs-expert-robert-perica</loc><lastmod>2025-07-31T22:55:09.464Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/resources/taking-threat-intelligence-programs-to-the-next-level</loc><lastmod>2025-08-25T21:56:27.733Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/lessons-learned-from-the-attack-on-solarwinds</loc><lastmod>2025-08-25T21:56:02.383Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/solarwinds-breach</loc><lastmod>2025-12-30T19:09:49.042Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/sc-product-reviews-threat-and-intelligence-analysis-tools</loc><lastmod>2025-12-30T19:13:50.019Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/reversinglabs-sees-timely-security-insights-as-critical-to-modern-defenses</loc><lastmod>2025-12-30T19:08:36.698Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/reversing-2020-session-videos</loc><lastmod>2025-07-31T15:06:48.659Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/meet-with-reversinglabs</loc><lastmod>2025-12-30T19:16:48.006Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/free-threat-connect-feed-trial</loc><lastmod>2025-07-31T22:47:03.820Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/webinar/elevate-your-threat-hunting-program</loc><lastmod>2025-07-30T19:53:23.397Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/events/code-to-identity-trust</loc><lastmod>2025-08-25T21:54:32.155Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/get-a-free-risk-analysis-report</loc><lastmod>2025-08-25T21:54:15.509Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/how-to-get-indicators-from-local-and-explainable-threat-intelligence</loc><lastmod>2025-12-30T19:15:10.719Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/partner-shi</loc><lastmod>2025-09-04T13:45:26.243Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/webinar/3-ways-detecting-software-tampering-differs-from-finding-software-vulnerabilities</loc><lastmod>2025-08-25T21:51:47.232Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/reseller-partners</loc><lastmod>2025-08-06T03:24:16.763Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/alliances/synopsys</loc><lastmod>2025-07-28T20:47:12.933Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/events/open-source-summit-europe</loc><lastmod>2025-09-02T16:39:19.366Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/events/commonwealth-of-virginia-information-security-is-conference</loc><lastmod>2025-08-01T15:15:20.965Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/events/bsides-las-vegas</loc><lastmod>2025-08-01T17:10:19.084Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/webinar/how-to-use-file-reputation-services</loc><lastmod>2025-09-04T13:39:58.278Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/resources/building-a-better-malware-lab</loc><lastmod>2025-08-25T21:48:19.177Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/news/dark-reading-hackers-post-dozens-of-malicious-copycat-repos-to-github</loc><lastmod>2025-08-05T14:42:20.496Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/resources/mario-vuksan-local-threat-intelligence-interview-at-black-hat</loc><lastmod>2025-07-25T22:09:46.702Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/resources/reversinglabs-explainable-threat-intelligence-overview</loc><lastmod>2025-07-25T22:33:19.601Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/resources/reversinglabs-history</loc><lastmod>2025-07-23T23:44:18.382Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/resources/tom-field-interviews-mario-vuksan-at-rsa-2019</loc><lastmod>2025-07-25T22:19:25.120Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/resources/ismg-interview-with-mario-vuksan-beyond-black-box-results</loc><lastmod>2025-07-23T23:35:59.262Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/resources/escape-the-malware-blob-with-explainable-machine-learning</loc><lastmod>2025-07-23T23:46:59.660Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/resources/secureworld-texas-third-party-risk-panel</loc><lastmod>2025-07-23T23:58:10.445Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/resources/what-you-need-to-know-nists-secure-software-development-framework</loc><lastmod>2025-07-24T00:06:19.637Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/resources/building-a-path-to-excellence-in-software-supply-chain-security</loc><lastmod>2025-10-07T22:41:10.057Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/resources/how-adriascan-safeguards-customers-and-fuels-innovation-with-rl</loc><lastmod>2025-07-24T00:13:24.356Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/resources/software-supply-chain-security-why-now</loc><lastmod>2025-07-24T00:15:06.333Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/the-state-of-software-supply-chain-security-report</loc><lastmod>2025-12-30T19:18:04.692Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/resources/the-new-threat-intelligence-on-data-breach-today</loc><lastmod>2025-07-22T23:26:58.731Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/resources/cyberwires-research-saturday-podcast-on-supply-chain-malware</loc><lastmod>2025-07-28T23:48:15.259Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/resources/itsp-magazine-podcast-with-mario-vuksan</loc><lastmod>2025-08-06T03:12:48.214Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/events/bsides-albuquerque-2025</loc><lastmod>2025-07-25T15:57:30.691Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/webinar/hunting-for-nation-state-attacks</loc><lastmod>2025-08-25T21:46:45.454Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/webinar/protecting-your-assets-with-your-head-in-the-cloud</loc><lastmod>2025-08-25T21:46:11.601Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/learning-with-reversinglabs-expert-chuck-mcwhirter</loc><lastmod>2025-07-31T22:50:41.559Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/reversinglabs-powers-mitre-attck-framework-with-titanium-platform-launch</loc><lastmod>2025-07-21T23:33:34.652Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/reversinglabs-integration-with-splunk</loc><lastmod>2025-10-01T19:14:43.487Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/conversinglabs/the-threat-of-package-hallucinations-conversinglabs-podcast</loc><lastmod>2025-08-05T21:28:39.697Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/conversinglabs/aviation-has-a-software-problem-conversinglabs-podcast</loc><lastmod>2025-08-05T21:27:59.043Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/management-team/tomislav-pericin</loc><lastmod>2025-07-28T19:42:54.365Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/management-team/scott-lambert</loc><lastmod>2025-07-28T19:46:20.794Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/management-team/sasa-zdjelar</loc><lastmod>2025-07-28T19:49:07.835Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/ron-kormanek</loc><lastmod>2026-03-09T22:31:33.811Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/michael-parker</loc><lastmod>2026-03-09T22:32:38.550Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/management-team/kathleen-deshields</loc><lastmod>2025-07-28T19:45:36.566Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/management-team/igor-lasic</loc><lastmod>2025-07-28T19:46:52.968Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/management-team/erik-thoen</loc><lastmod>2026-02-12T19:28:17.377Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/management-team/angiras-koorapaty</loc><lastmod>2025-07-28T19:44:39.209Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/management-team/mario-vuksan</loc><lastmod>2025-07-28T19:42:08.531Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/board-of-directors/mario-vuksan</loc><lastmod>2025-07-28T19:53:27.645Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/board-of-directors/hugh-thompson</loc><lastmod>2025-07-28T19:51:25.526Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/board-of-directors/greg-clark</loc><lastmod>2025-07-28T19:50:23.627Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/board-of-directors/doug-levin</loc><lastmod>2025-07-28T19:54:03.280Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/advisors/thomas-aidan-curran</loc><lastmod>2025-07-28T19:55:51.869Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/advisors/peter-doggart</loc><lastmod>2025-07-28T19:58:14.779Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/advisors/jeff-seul</loc><lastmod>2025-07-28T19:57:53.283Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/learning-with-reversinglabs-videos-how-to</loc><lastmod>2025-08-05T15:34:39.510Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/learning-with-reversinglabs-videos-whiteboard</loc><lastmod>2025-08-05T15:45:38.624Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/learning-with-reversinglabs-videos-definition</loc><lastmod>2025-08-05T15:35:43.726Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/webinar/a-case-for-the-malware-lab</loc><lastmod>2025-08-25T21:45:23.741Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/webinar/ai-meets-sscs</loc><lastmod>2025-07-30T14:50:10.021Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/resources/better-soc-soar-efficiency-with-better-threat-intelligence</loc><lastmod>2025-08-25T21:44:37.397Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/webinar/how-to-hunt-for-ransomware-variants-in-your-malware-lab</loc><lastmod>2025-08-25T21:44:09.530Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/learning-with-reversinglabs</loc><lastmod>2025-08-05T15:31:26.841Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/resources/the-challenge-of-soc-triage</loc><lastmod>2025-07-22T23:21:32.432Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/resources/their-story-reversinglabs-a-conversation-with-mario-vuksan-and-tyson-whitten</loc><lastmod>2025-07-31T16:38:42.500Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/resources/unsung-heroes-of-cybersecurity-podcast</loc><lastmod>2025-08-14T15:21:55.364Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/resources/a-podcast-with-reversinglabs-angiras-koorapaty</loc><lastmod>2025-07-28T23:43:14.338Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/resources/securityguytv-interviews-reversinglabs-ceo-mario-vuksan</loc><lastmod>2025-07-17T23:03:54.992Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/resources/cyber-defense-radio-hot-seat-interview-with-mario-vuksan</loc><lastmod>2025-07-28T23:47:28.986Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/resources/malware-labs-the-key-to-the-next-generation-of-threat-hunting-mario-vuksan</loc><lastmod>2025-09-04T13:54:25.429Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/resources/cyber-defense-tv-reversinglabs-launches-secure-software</loc><lastmod>2025-07-17T22:51:33.141Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/resources/the-last-watchdog-the-coming-impact-of-sbom-software-bill-of-materials</loc><lastmod>2025-07-25T17:25:47.992Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/customers/city-government-file-analysis</loc><lastmod>2026-03-11T15:33:39.653Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/contact-us-request-received</loc><lastmod>2025-12-30T19:13:14.105Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/resources/ismg-interview-with-reversinglabs-exposing-software-supply-chain-risks</loc><lastmod>2025-08-06T03:05:19.386Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/resources/four-myths-of-software-risk-secure-what-you-build</loc><lastmod>2025-08-06T03:07:07.591Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/resources/four-myths-about-the-safety-of-third-party-software</loc><lastmod>2025-08-25T21:42:47.077Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/resources/top-considerations-when-evaluating-sboms</loc><lastmod>2025-12-30T19:35:07.420Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/resources/infographic-flying-blind-software-firms-struggle-to-detect-supply-chain-hacks</loc><lastmod>2025-12-30T19:31:55.718Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/resources/infographic-reversinglabs-nvd-analysis-2022-a-call-to-action-on-software-supply-chain-security</loc><lastmod>2025-12-30T19:34:44.415Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/resources/software-supply-chain-and-the-soc-end-to-end-security-is-key</loc><lastmod>2025-12-30T19:34:21.061Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/resources/infographic-secrets-exposed-leaks-are-becoming-an-epidemic</loc><lastmod>2025-12-30T19:33:29.285Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/resources/infographic-companies-scramble-to-cover-software-supply-chain-security-gaps</loc><lastmod>2025-12-30T19:33:52.073Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/resources/infographic-software-supply-chain-security-risk-report</loc><lastmod>2025-12-30T19:31:20.301Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/resources/software-supply-chain-soc-end-to-end-security-key</loc><lastmod>2025-08-25T21:42:26.457Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/sscs-report-2023</loc><lastmod>2025-08-25T21:42:07.516Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/sscs-report-2024</loc><lastmod>2025-08-25T21:41:40.584Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/resources/infographic-the-state-of-software-supply-chain-security-2024</loc><lastmod>2025-08-06T02:40:31.571Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/webinar/how-to-analyze-the-kwampirs-rat</loc><lastmod>2025-08-25T21:41:16.235Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/open-source-yara-rules</loc><lastmod>2025-10-01T21:01:44.553Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/board-of-directors/alberto-yepez</loc><lastmod>2025-07-28T19:52:54.266Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/compare-reversinglabs</loc><lastmod>2026-02-05T20:12:30.348Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/webinar/webinar-line-up</loc><lastmod>2026-03-27T16:45:34.405Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/detect-prioritize-manage-exposed-secrets-in-software</loc><lastmod>2025-07-31T22:23:11.909Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/deminars/how-your-soc-team-can-detect-the-new-quantum-builder-malware-threat</loc><lastmod>2025-08-25T21:38:46.180Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/deminars/how-to-keep-your-secrets-secret-on-demand</loc><lastmod>2025-08-25T21:37:43.827Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/deminars/how-to-combat-the-iconburst-software-supply-chain-attack</loc><lastmod>2025-08-25T21:37:22.591Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/deminars/handling-the-threat-securing-open-source-software</loc><lastmod>2025-08-25T21:36:55.540Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/deminars/detecting-malware-packages-pypi-and-open-source-threats</loc><lastmod>2025-08-25T21:36:08.433Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/webinar/threat-modeling-for-developers</loc><lastmod>2025-07-24T21:39:20.845Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/webinar/unmasking-a-vs-code-supply-chain-attack</loc><lastmod>2025-08-06T14:39:52.696Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/webinar/how-to-get-vendors-to-fix-their-code</loc><lastmod>2025-07-30T14:34:56.034Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/events/2025-dbir-third-party-breach-risk</loc><lastmod>2025-07-30T16:32:57.467Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/webinar/icap-deep-cloud-malware-detection-revolution</loc><lastmod>2026-03-11T15:44:51.534Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/webinar/threat-research-roundup-q2-2025</loc><lastmod>2025-08-01T03:51:04.402Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/webinar/manifest-misconceptions-closing-the-gaps-in-sca-based-sboms</loc><lastmod>2025-08-25T21:33:19.921Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/webinar/operationalize-network-enrichment-with-rl-apis</loc><lastmod>2025-08-25T21:32:49.269Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/webinar/securing-oss-sscs-navigating-dora-cra</loc><lastmod>2025-07-22T22:07:48.361Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/webinar/the-devs-guide-to-productivity</loc><lastmod>2025-08-28T15:22:29.759Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/webinar/yara-rules-201</loc><lastmod>2025-10-06T17:54:32.199Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/webinar/beyond-the-sbom-welcome-cyclonedx-xbom</loc><lastmod>2025-10-06T17:57:21.259Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/webinar/getting-started-with-advanced-search</loc><lastmod>2025-08-25T21:30:35.854Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/advisors/goran-medic</loc><lastmod>2025-07-17T22:08:22.450Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/webinar/alphabetsoup-the-devs-guide-to-security-acronymns</loc><lastmod>2025-08-06T19:00:03.757Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/webinar/threat-research-roundup-q1-2025</loc><lastmod>2025-07-23T18:26:15.197Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/webinar/the-devs-guide-to-sscs</loc><lastmod>2025-07-23T18:33:20.788Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/resources/a-step-by-step-walk-through-of-the-reversinglabs-software-assurance-service</loc><lastmod>2025-08-21T18:49:07.639Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/resources/building-sustainable-security-architectures-through-apis</loc><lastmod>2025-08-21T18:48:02.690Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/resources/addressing-sophisticated-supply-chain-attacks-head-on-with-no-source-code-required</loc><lastmod>2025-08-21T18:47:06.532Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/webinar/securing-your-virtual-machines</loc><lastmod>2025-08-21T18:44:33.075Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/webinar/the-year-in-software-supply-chain-threats</loc><lastmod>2025-08-21T18:44:01.266Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/resources/seven-common-mistakes-to-avoid-when-choosing-a-file-reputation-service</loc><lastmod>2025-08-21T18:43:44.241Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/resources/how-to-build-an-effective-threat-hunting-program</loc><lastmod>2025-08-21T18:43:21.185Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/resources/how-to-mitigate-software-supply-chain-risk</loc><lastmod>2025-08-21T18:42:59.265Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/resources/how-automation-and-orchestration-bridge-the-it-security-skills-gap</loc><lastmod>2025-08-21T18:41:44.135Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/resources/flying-blind-software-firms-struggle-to-detect-supply-chain-hacks</loc><lastmod>2025-08-21T18:40:08.377Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/resources/reversinglabs-nvd-analysis-2022-a-call-to-action-on-software-supply-chain-security</loc><lastmod>2025-08-21T17:50:36.731Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/anomali</loc><lastmod>2025-12-30T19:07:34.207Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/resources/how-to-map-your-cybersecurity-defenses-to-nist</loc><lastmod>2025-08-21T17:48:13.664Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/resources/the-monsters-in-your-software-supply-chain</loc><lastmod>2025-08-21T17:47:40.444Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/resources/the-new-threat-intelligence-transcript-from-tom-field-interviews-mario-vuksan-at-rsa-2019</loc><lastmod>2025-08-21T17:46:48.900Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/resources/strategies-for-minimizing-phishing-attack-risks</loc><lastmod>2025-08-21T17:45:14.163Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/webinar/securing-jfrog-artifactory-find-risky-software-in-your-repos</loc><lastmod>2025-10-06T18:13:11.665Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/resources/a-day-in-the-life</loc><lastmod>2025-08-21T17:43:44.678Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/resources/third-party-software-derisking-mergers-acquisitions</loc><lastmod>2025-08-21T17:39:28.011Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/resources/why-traditional-appsec-testing-fails-on-supply-chain-security</loc><lastmod>2025-08-21T17:37:51.744Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/news/axios-exclusive-open-source-tools-fire-up-supply-chain-attacks</loc><lastmod>2025-08-05T15:02:33.707Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/news/devopscom-reversinglabs-applies-ai-to-better-secure-application-binaries</loc><lastmod>2025-08-05T15:02:07.016Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/news/help-net-security-nist-csf-20-released-to-help-all-organizations-not-just-those-in-critical-infrastructure</loc><lastmod>2025-08-05T15:01:48.543Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/news/the-new-stack-python-users-bipclip-is-after-your-bitcoin-wallet-via-pypi</loc><lastmod>2025-08-05T15:00:33.861Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/news/techradar-watch-out-these-malicious-pypl-packages-could-drain-your-wallet-and-theyve-already-been-downloaded-thousands-of-times</loc><lastmod>2025-08-05T15:01:25.022Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/news/the-hacker-news-watch-out-these-pypi-python-packages-can-drain-your-crypto-wallets</loc><lastmod>2025-08-05T14:58:38.452Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/news/securityweek-suspicious-nuget-package-harvesting-information-from-industrial-systems</loc><lastmod>2025-08-05T14:58:21.266Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/news/the-hacker-news-sketchy-nuget-package-likely-linked-to-industrial-espionage-targets-developers</loc><lastmod>2025-08-05T14:57:57.736Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/news/securityweek-vulnerabilitiescve-and-nvd-a-weak-and-fractured-source-of-vulnerability-truth</loc><lastmod>2025-08-05T14:57:39.008Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/webinar/file-analysis-cdr-forging-a-formidable-defense</loc><lastmod>2025-08-06T19:35:22.744Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/news/security-week-should-cybersecurity-leadership-finally-be-professionalized</loc><lastmod>2025-10-14T13:26:52.023Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/news/cso-third-party-software-supply-chain-threats-continue-to-plague-cisos</loc><lastmod>2025-08-05T14:55:49.618Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/webinar/hugging-face-ml-malware-nullifai</loc><lastmod>2025-08-21T17:35:27.186Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/news/sc-magazine-the-state-of-appsec-in-2024-expanded-use-expanded-attack-surface</loc><lastmod>2025-08-05T14:55:34.192Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/webinar/why-wirespeed-chose-reversinglabs</loc><lastmod>2025-08-06T20:15:23.342Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/webinar/threat-research-roundup-q4-2024</loc><lastmod>2025-08-21T17:34:12.621Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/webinar/software-supply-chain-security-for-dummies</loc><lastmod>2025-08-06T19:54:36.619Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/news/techstrong-tv-open-source-software-tracking-with-reversinglabs-tomislav-pericin</loc><lastmod>2025-08-05T14:55:08.559Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/news/sc-magazine-ongoing-nuget-supply-chain-attack-involves-dozens-new-malicious-packages</loc><lastmod>2025-08-05T14:54:49.177Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/news/cyberwire-daily-podcast-ssm-on-prem-flaw-is-a-10-10-disaster</loc><lastmod>2025-08-05T14:54:29.347Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/news/securityinfowatch-can-you-trust-commercial-software-tackling-third-party-software-risk</loc><lastmod>2025-08-05T14:54:13.250Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/news/the-last-watchdog-my-take-black-hat-usa-2024s-big-takeaway-genai-factors-into-the-quest-for-digital-resiliency</loc><lastmod>2025-08-05T14:53:52.502Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/news/the-last-watchdog-black-hat-fireside-chat-why-grasping-the-context-of-code-is-a-recipe-for-keepingsoftware-secure</loc><lastmod>2025-08-05T14:53:32.077Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/news/cyber-ranch-what-is-in-your-commercial-software-with-sasa-zdjelar</loc><lastmod>2025-08-05T14:52:20.610Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/resources/sc-product-reviews-threat-and-intelligence-analysis-tools</loc><lastmod>2025-07-28T23:53:19.990Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/news/dark-reading-evolving-npm-package-campaign-targets-roblox-devs-for-years</loc><lastmod>2025-08-05T14:52:07.562Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/news/hacker-news-developers-beware-lazarus-group-uses-fake-coding-tests-to-spread-malware</loc><lastmod>2025-08-05T14:51:35.089Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/resources/reversing-labs-sees-timely-security-insights-as-critical-to-modern-defenses</loc><lastmod>2025-09-04T13:54:50.685Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/news/bleeping-computer-fake-password-manager-coding-test-used-to-hack-python-developers</loc><lastmod>2025-08-05T14:51:51.236Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/news/cso-fake-recruitment-campaign-targets-developers-using-trojanized-python-packages</loc><lastmod>2025-08-05T14:51:03.870Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/news/lazarus-group-lazarus-group-targets-developers-in-fresh-vmconnect-campaign</loc><lastmod>2025-08-05T14:51:20.672Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/news/ciso-series-cybersecurity-news-lazarus-spoofs-capitalone-mastercard-buys-recordedfuture-wordpress-imposes-2fa</loc><lastmod>2025-08-05T14:50:49.628Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/news/it-brew-suspected-north-korean-group-appears-to-still-be-hoaxing-devs-into-downloading-malware</loc><lastmod>2025-08-05T14:50:32.899Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/webinar/ai-in-the-ssc</loc><lastmod>2025-08-21T17:17:02.965Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/webinar/exposing-sscs-weaknesses-with-idc-katie-norton</loc><lastmod>2025-08-21T17:13:34.970Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/webinar/yara-rules-101</loc><lastmod>2025-08-11T17:01:57.278Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/webinar/the-mlephant-in-the-room</loc><lastmod>2025-08-21T17:12:38.337Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/webinar/spectra-assure-demo-october-2024</loc><lastmod>2025-08-21T15:41:49.299Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/resources/learn-why-idc-believes-reversinglabs-innovative-explainable-threat-intelligence</loc><lastmod>2025-08-21T15:41:10.219Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/webinar/supercharge-threat-modeling-with-sscs</loc><lastmod>2026-04-01T19:44:56.826Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/webinar/the-survival-guide-to-managing-third-party-software-risk</loc><lastmod>2025-08-20T21:06:30.851Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/webinar/threat-research-roundup-q3-2024</loc><lastmod>2025-08-20T21:05:31.458Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/webinar/the-5-misconceptions-of-sscs</loc><lastmod>2025-08-20T21:04:22.316Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/webinar/do-more-with-your-soar</loc><lastmod>2025-08-20T21:03:42.851Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/webinar/software-supply-chain-security-101</loc><lastmod>2025-08-20T21:03:16.906Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/news/sc-media-why-sboms-are-not-enough-to-manage-modern-software-risks</loc><lastmod>2025-08-05T14:50:10.285Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/news/securityinfowatch-the-procurement-challenge-breaks-open-the-black-box-that-is-commercial-software</loc><lastmod>2025-08-05T14:49:50.454Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/news/safe-mode-reversinglabs-saa-zdjelar-on-the-black-box-of-commercial-software</loc><lastmod>2025-08-06T03:06:25.479Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/news/dark-reading-going-beyond-secure-by-demand</loc><lastmod>2025-08-05T14:49:06.951Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/news/infosecurity-magazine-malicious-pypi-package-exposes-crypto-wallets-to-infostealer-code</loc><lastmod>2025-08-05T14:47:44.298Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/news/the-hacker-news-supply-chain-compromise-of-ultralytics-ai-library-results-in-trojanized-versions</loc><lastmod>2025-08-05T14:47:21.436Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/news/hackread-ultralytics-ai-library-with-60m-downloads-compromised-for-cryptomining</loc><lastmod>2025-08-05T14:46:37.708Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/webinar/black-hat-2024-recap</loc><lastmod>2025-08-20T21:02:59.691Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/news/the-last-watchdog-lessons-learned-from-the-headline-grabbing-cybersecurity-incidents-of-2024</loc><lastmod>2025-08-05T14:45:24.845Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/news/bleeping-computer-malicious-microsoft-vscode-extensions-target-devs-crypto-community</loc><lastmod>2025-08-05T14:40:06.190Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/news/forbes-warning-crypto-investors-this-malicious-code-could-empty-your-wallet</loc><lastmod>2025-08-05T14:39:51.425Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/news/cyberscoop-the-dual-reality-of-ai-augmented-development-innovation-and-risk</loc><lastmod>2025-08-05T14:36:18.794Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/news/information-security-buzz-commercial-softwares-seven-deadly-sins</loc><lastmod>2025-08-05T14:37:04.190Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/news/techradar-new-attacks-exploit-vscode-extensions-and-npm-packages</loc><lastmod>2025-07-31T22:21:52.810Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/forms/reportlp-supplychain-detect-hacks</loc><lastmod>2025-08-20T20:55:43.352Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/forms/whitepaperlp-nist-standards</loc><lastmod>2025-08-20T20:55:13.390Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/webinar/insights-from-the-gartner-leaders-guide-to-software-supply-chain-security</loc><lastmod>2025-10-07T15:59:53.544Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/webinar/insights-from-owasp-future-proofing-sboms-with-cyclonedx</loc><lastmod>2025-08-20T20:52:44.973Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/webinar/threat-research-roundup-q2-2024</loc><lastmod>2025-08-20T20:52:25.953Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/webinar/quarterly-product-review-roadmap-q2-2024</loc><lastmod>2025-08-06T19:45:18.356Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/webinar/standing-up-a-software-supply-chain-security-program</loc><lastmod>2025-08-20T20:50:15.660Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/webinar/ep-2-assess-third-party-software-risk-without-the-need-for-source-code</loc><lastmod>2025-10-07T23:39:13.197Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/webinar/managing-your-commercial-software-risks</loc><lastmod>2025-08-20T20:47:13.150Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/webinar/find-the-safest-dependencies-for-your-app-with-spectra-assure-community</loc><lastmod>2025-08-20T20:42:54.317Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/webinar/dr-jessica-barker-on-the-human-elements-driving-cyber-attacks</loc><lastmod>2025-08-20T20:42:25.769Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/webinar/outpacing-virustotal-redefining-trusted-threat-analysis-intelligence</loc><lastmod>2025-08-20T20:40:48.472Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/webinar/rsac-2024-recap</loc><lastmod>2025-08-20T20:39:33.634Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/webinar/definitive-timeline-federal-guidance-on-software-supply-chain-security</loc><lastmod>2025-08-06T03:02:55.880Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/webinar/spectra-assure-solution-showcase-featuring-differential-analysis</loc><lastmod>2025-08-20T20:39:02.869Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/webinar/breaking-down-nist-csf-20</loc><lastmod>2025-08-20T20:38:08.515Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/impressum</loc><lastmod>2025-08-07T19:56:05.757Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/solutions/secure-file-collaboration</loc><lastmod>2025-08-05T17:50:08.163Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/third-party-software-supply-chain-risk-alliance</loc><lastmod>2025-08-20T20:37:38.245Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/technology/supported-formats</loc><lastmod>2025-07-18T13:21:57.049Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/technology/reversinglabs-hash-algorithm</loc><lastmod>2025-07-18T13:21:07.497Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/technology/complex-binary-analysis</loc><lastmod>2026-01-28T15:04:38.962Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/resources/latest-methods-for-using-high-fidelity-cti-to-head-off-ransomware-attacks</loc><lastmod>2025-08-20T20:37:04.739Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/resources/virtual-threat-brief-quantum-ransomware</loc><lastmod>2025-08-20T20:35:27.927Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/solutions/reversinglabs-threat-intelligence-for-microsoft-sentinel</loc><lastmod>2025-07-18T13:05:01.574Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/webinar/quarterly-product-review-roadmap-q1-2024</loc><lastmod>2025-08-06T19:42:25.207Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/webinar/q1-threat-research-round-up-malicious-dependencies-fly-under-the-radar</loc><lastmod>2025-08-20T20:34:10.267Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/webinar/e-discovery-under-threat-strengthening-malware-defenses-in-legal-firms</loc><lastmod>2025-08-20T20:29:29.870Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/webinar/know-when-your-software-is-malware-spectra-assure</loc><lastmod>2025-08-20T20:28:05.633Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/webinar/enhancing-software-supply-chain-security-with-nist-csf-20</loc><lastmod>2025-08-20T20:27:26.045Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/webinar/the-cyber-cfo-ciso-accountability-in-the-new-era-of-sscs</loc><lastmod>2025-08-06T20:00:15.129Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/webinar/quarterly-product-review-roadmap-q4-2023</loc><lastmod>2025-08-20T20:24:05.284Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/webinar/takeaways-from-gartner-software-supply-chain-report</loc><lastmod>2025-08-06T19:59:30.666Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/webinar/delivering-threat-analysis-beyond-virustotals-reach</loc><lastmod>2025-08-20T20:22:58.697Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/webinar/dec-threat-research-roundup</loc><lastmod>2025-08-20T20:22:45.474Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/webinar/defend-your-software-supply-chain</loc><lastmod>2025-08-20T20:22:32.061Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/webinar/sans-software-supply-chain-security-hunting-hidden-threats</loc><lastmod>2025-10-06T18:04:07.110Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/webinar/exposing-the-dark-side-of-code-with-file-scanning-and-analysis</loc><lastmod>2025-08-20T20:21:50.426Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/webinar/secure-by-design</loc><lastmod>2025-08-20T20:21:01.830Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/resources/software-supply-chain-security-for-dummies</loc><lastmod>2025-10-14T11:28:55.567Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/manifest-report</loc><lastmod>2025-09-16T17:17:25.405Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/cookie-policy</loc><lastmod>2025-11-21T15:10:53.295Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/conversinglabs/securing-medical-devices-with-sboms</loc><lastmod>2025-07-05T13:13:51.276Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/conversinglabs/conversinglabs-season-3-episode-2</loc><lastmod>2025-08-05T15:45:18.182Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/conversinglabs/conversinglabs-season-3-episode-4</loc><lastmod>2025-07-05T13:02:44.815Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/conversinglabs/conversinglabs-season-3-episode-3</loc><lastmod>2025-07-18T12:40:11.740Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/conversinglabs/devin-byrd-kandji</loc><lastmod>2025-07-05T12:46:54.477Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/conversinglabs/conversinglabs-season-3-episode-5</loc><lastmod>2025-08-05T15:45:22.677Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/conversinglabs/the-state-of-software-supply-chain-security-2024</loc><lastmod>2025-08-05T15:45:29.420Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/conversinglabs/malware-software-supply-chain-security</loc><lastmod>2025-07-05T12:25:44.162Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/conversinglabs/robert_martin_mitre_software_supply_chain_system_of_trust</loc><lastmod>2025-08-05T15:45:42.031Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/news/cso-14-lessons-cisos-learned-in-2022</loc><lastmod>2025-08-05T15:03:27.480Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/reversingglass/epss-30-cvss-why-prioritizing-software-risk-is-key</loc><lastmod>2025-07-04T20:34:51.873Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/reversingglass/why-the-time-is-now-for-software-supply-chain-security</loc><lastmod>2025-08-01T04:30:47.626Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/reversingglass/what-is-software-supply-chain-security-scanning</loc><lastmod>2025-08-01T04:31:50.244Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/reversingglass/software-supply-chain-security-use-cases</loc><lastmod>2025-08-01T04:33:04.624Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/reversingglass/application-hacks-vs-software-supply-chain-hacks</loc><lastmod>2025-07-04T20:01:16.007Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/reversingglass/get-smart-with-your-software-supply-chain-security</loc><lastmod>2025-07-04T19:46:12.163Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/reversingglass/trust-in-software-must-be-complete</loc><lastmod>2025-07-04T19:45:52.737Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/reversingglass/why-cisa-secure-by-design-is-just-a-starting-point</loc><lastmod>2025-08-01T04:31:08.976Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/reversingglass/cisa-secure-by-design-is-hard</loc><lastmod>2025-08-01T04:34:40.511Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/reversingglass/tampering</loc><lastmod>2025-07-04T19:16:07.660Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/reversingglass/rl-at-infosecurity-europe-2023</loc><lastmod>2025-07-04T19:15:53.858Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/reversingglass/a-brief-history-of-app-sec-why-software-supply-chain-security-is-now</loc><lastmod>2025-07-04T18:58:55.295Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/reversingglass/videoseriesintro</loc><lastmod>2025-07-04T19:01:28.277Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/reversingglass/what-are-secrets</loc><lastmod>2025-08-01T04:32:09.582Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/reversingglass/sca-is-good-software-supply-chain-security-is-better</loc><lastmod>2025-08-01T04:33:25.552Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/reversingglass/happy-birthday-reversingglass</loc><lastmod>2025-08-01T04:34:01.099Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/reversingglass/reproducible-builds-sscs</loc><lastmod>2025-07-04T18:12:10.281Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/reversingglass/typosquatting</loc><lastmod>2025-08-01T04:32:43.725Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/reversingglass/black-hat-2023</loc><lastmod>2025-07-04T17:58:15.585Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/reversingglass/why-holistic-software-supply-chain-security-requires-binary-analysis</loc><lastmod>2025-07-04T17:46:50.057Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/reversingglass/software-supply-chain-security-vulnerabilities-and-malware</loc><lastmod>2025-07-04T17:32:06.359Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/reversingglass/the-state-of-sscs-2024-report</loc><lastmod>2025-07-04T17:20:56.563Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/reversingglass/who-is-reversinglabs</loc><lastmod>2025-08-01T04:31:28.383Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/reversingglass/what-is-an-sbom</loc><lastmod>2025-07-04T16:51:36.561Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/reversingglass/c-scrm-much-needed-definition-for-software-supply-chain-policy-processes</loc><lastmod>2025-08-01T04:34:56.402Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/reversingglass/executive-order-on-ai-what-security-teams-need-to-know</loc><lastmod>2025-07-04T16:37:38.542Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/reversingglass/dna-of-an-app-why-app-sec-testing-fail</loc><lastmod>2025-08-01T04:34:20.357Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/reversingglass/rsa2023</loc><lastmod>2025-07-04T16:11:19.198Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/reversingglass/the-dna-of-software-supply-chain-security</loc><lastmod>2025-07-04T16:00:10.761Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/reversingglass/ai-and-software-supply-chain-security</loc><lastmod>2025-07-04T15:50:13.813Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/reversingglass/beyond-the-sbom-next-steps-essential-secure-software</loc><lastmod>2025-07-04T15:38:07.137Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/reversingglass/development-secrets</loc><lastmod>2025-07-04T15:27:50.957Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/reversingglass/esf-calls-for-software-package-final-exams</loc><lastmod>2025-07-04T15:06:26.662Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/reversingglass/circleci-hack-software-supply-chain-risks</loc><lastmod>2025-07-04T14:55:44.923Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/reversingglass/full-coverage-supply-chain-security-explained</loc><lastmod>2025-07-04T14:37:55.881Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/reversingglass/behaviors-diffs-better-together-for-sscs</loc><lastmod>2025-07-04T14:28:23.590Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/reversingglass/software-supply-chain-risks-in-art-and-life</loc><lastmod>2025-07-04T14:16:37.981Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/reversingglass/must-see-at-black-hat</loc><lastmod>2025-08-01T04:33:42.598Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/reversingglass/software-supply-chain-attacks-how-vs-what</loc><lastmod>2025-07-04T13:54:51.734Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/reversingglass/eo-14028-securing-the-software-supply-chain-sbom</loc><lastmod>2025-07-04T00:00:38.888Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/webinar/rl-software-supply-chain-security-demo</loc><lastmod>2025-08-20T20:19:19.234Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/reversingglass/software-supply-chain-security-shift-up</loc><lastmod>2025-07-03T23:50:52.806Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/reversingglass/sboms-and-threat-modeling</loc><lastmod>2025-07-03T23:23:38.085Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/reversingglass/shift-up-your-sbom</loc><lastmod>2025-07-03T23:17:19.537Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/reversingglass/how-to-define-software-supply-chain-security</loc><lastmod>2025-07-03T23:27:30.346Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/reversingglass/trust-software-supply-chain-security</loc><lastmod>2025-07-03T23:51:53.279Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/reversingglass/how-software-supply-chains-go-wrong</loc><lastmod>2025-07-03T23:53:21.045Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/webinar/yara-for-the-holidays</loc><lastmod>2025-08-20T20:19:02.256Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/webinar/threat-modeling-and-software-supply-chain-security</loc><lastmod>2025-08-20T20:18:44.497Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/webinar/static-vs-binary-analysis</loc><lastmod>2025-08-20T20:17:35.327Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/software-package-deconstruction-series/3cx</loc><lastmod>2025-07-24T20:59:52.225Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/software-package-deconstruction-series/tabby-and-notepad</loc><lastmod>2025-07-24T20:59:30.812Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/software-package-deconstruction-series/ups-ship-manager-file-rot-detection</loc><lastmod>2025-07-24T20:59:00.262Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/software-package-deconstruction-series/crypto-wallet-deconstruction</loc><lastmod>2025-07-24T20:58:26.828Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/software-package-deconstruction-series/deconstructing-docker-desktop</loc><lastmod>2025-07-24T20:57:44.281Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/software-package-deconstruction-series/deconstructing-supply-chain-analysis-creating-a-baseline</loc><lastmod>2025-07-24T20:57:29.754Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/reversingglass/sca-is-good-software-supply-chain-security-is-better</loc><lastmod>2025-07-03T19:27:21.988Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/software-package-deconstruction-series/supply-chain-analysis-fine-tuning-your-baseline-code-signing-certificates</loc><lastmod>2025-07-24T20:57:14.621Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/software-package-deconstruction-series/deconstructing-onedrive-dropbox</loc><lastmod>2025-07-24T20:56:59.094Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/software-package-deconstruction-series/uncover-software-vendor-risk</loc><lastmod>2025-07-24T20:56:21.859Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/software-package-deconstruction-series/reducing-false-positives-in-soc</loc><lastmod>2025-07-24T20:56:44.175Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/software-package-deconstruction-series/vpn-deconstruction</loc><lastmod>2025-07-24T20:55:56.318Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/webinar/reversinglabs-quarterly-product-roadmap-review-q3</loc><lastmod>2025-08-20T20:17:08.010Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/webinar/threat-research-roundup-pypi-npm-attacks</loc><lastmod>2025-08-20T20:16:19.875Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/webinar/devsecops-a-new-hope-for-software-supply-chain-security</loc><lastmod>2025-08-20T20:15:57.451Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/webinar/black-hat-2023-now-what</loc><lastmod>2025-08-20T20:15:35.494Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/forrester-report-software-composition-analysis-landscape-q1-2023-content</loc><lastmod>2025-09-04T13:46:59.208Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/the-evolution-of-application-security</loc><lastmod>2025-07-28T20:44:57.360Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/webinar/does-your-organization-understand-its-software-supply-chain-risk</loc><lastmod>2025-08-20T20:14:23.657Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/webinar/hacker-summer-camp-watch-now</loc><lastmod>2025-07-31T16:40:40.316Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/webinar/eliminating-threats-lurking-in-open-source-software</loc><lastmod>2025-08-20T20:13:53.173Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/resources/ai-is-the-supply-chain</loc><lastmod>2025-08-20T20:13:34.412Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/news/help-net-security-software-supply-chain-attacks-are-getting-easier</loc><lastmod>2025-08-05T15:02:19.669Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/news/network-computering-how-low-can-you-go-the-barrier-to-successful-supply-chain-attacks-is-dropping</loc><lastmod>2025-08-05T14:53:09.163Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/news/reversinglabs-unleashes-first-partner-program</loc><lastmod>2025-08-06T03:12:26.461Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/events/black-hat-usa-2025</loc><lastmod>2025-08-05T21:49:19.793Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/webinar/reversinglabs-quarterly-product-roadmap-review-q2</loc><lastmod>2025-08-01T04:01:08.280Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/webinar/revealing-the-biggest-concerns-about-software-supply-chain-security</loc><lastmod>2025-08-20T20:11:32.393Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/webinar/why-app-sec-tools-fail-at-software-supply-chain-security</loc><lastmod>2025-08-20T20:10:51.033Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/webinar/deconstructing-3cx-red-flags-misses-and-failures-to-address-the-software-supply-chain-threat</loc><lastmod>2025-08-20T20:09:17.869Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/webinar/secrets-revealed-circlecis-breach-and-lessons-learned-on-demand</loc><lastmod>2025-07-31T16:40:12.879Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/webinar/fireside-chat-with-derek-fisher</loc><lastmod>2025-08-20T19:58:26.591Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/webinar/the-state-of-software-supply-chain-2024</loc><lastmod>2025-08-20T19:57:42.810Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/webinar/the-ghost-in-your-soc-how-software-supply-chain-attacks-threaten-financial-institutions</loc><lastmod>2025-08-20T19:57:19.355Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/webinar/prime-suspect-malicious-injections-into-software-supply-chains</loc><lastmod>2025-08-20T19:56:43.945Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/webinar/the-hole-in-your-soc-software-supply-chain-risks</loc><lastmod>2025-08-20T19:56:24.349Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/webinar/peaky-blinders-combat-ransomware-gangs-with-hifi-ido</loc><lastmod>2025-08-20T19:55:28.185Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/webinar/how-nobelium-exposed-the-software-release-process-for-future-attacks</loc><lastmod>2025-08-20T19:54:51.876Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/webinar/reviewing-the-revil-ransomware-timeline-to-secure-the-future</loc><lastmod>2025-08-20T19:54:03.140Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/news/the-new-yorker-after-the-solarwinds-hack-we-have-no-idea-what-cyber-dangers-we-face</loc><lastmod>2025-08-05T15:04:01.349Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/news/reversinglabs-joins-cyber-threat-alliance</loc><lastmod>2025-07-01T20:07:47.481Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/reversinglabs-one-20-cybersecurity-vendors-getting-venture-capital-love</loc><lastmod>2025-12-30T19:10:15.912Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/news/bob-anderson-reversinglabs-major-accounts-director-presenting-benefits-reversinglabs</loc><lastmod>2025-07-31T22:40:36.564Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/news/igor-lasic-vice-president-technology-reversinglabs-presents-two-major-attacks-2017</loc><lastmod>2025-07-01T19:44:17.390Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/news/reversinglabs-and-interface-masters-partnership</loc><lastmod>2025-07-01T19:34:58.144Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/news/reversinglabs-and-interface-masters-partnership</loc><lastmod>2025-07-01T19:23:34.408Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/news/reversinglab-products-added-to-carahsoft-gsa-schedule</loc><lastmod>2025-07-01T19:15:05.276Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/news/polito-inc-integrates-reversinglabs-titaniumcloud-offers-customers-access-worlds-most</loc><lastmod>2025-07-01T19:05:59.313Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/news/reversinglabs-ceo-mario-vuksan-rsa-conference-usa-2017</loc><lastmod>2025-07-01T18:51:16.932Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/news/static-binary-analysis-a-final-exam</loc><lastmod>2025-07-10T17:49:27.753Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/news/reversinglabs-receives-jpmorgan-chase-hall-of-innovation-award</loc><lastmod>2025-08-05T17:37:53.425Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/news/mario-vuksan-ceo-reversinglabs-speaking-jailbreak-brewing-company-security-summit</loc><lastmod>2025-07-01T18:10:34.571Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/news/reversinglabs-partner-politoinc-now-enhancing-digital-forensics-reversinglabs-plugins</loc><lastmod>2025-07-01T18:04:19.194Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/news/reversinglabs-proud-sponsor-and-participate-phantoms-inaugural-conference-phantom-soc</loc><lastmod>2025-07-01T17:58:32.910Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/news/reversing-labs-and-triumfant-form-strategic-integration-advanced-malware-detection-and</loc><lastmod>2025-07-01T17:40:59.405Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/news/join-reversinglabs-black-hat-usa-2017</loc><lastmod>2025-07-01T16:36:42.674Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/news/ziften-partners-reversinglabs-bolster-endpoint-detection-and-response</loc><lastmod>2025-07-01T16:28:46.355Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/news/reversinglabs-ceo-provides-insights-into-dnc-hacks</loc><lastmod>2025-08-13T13:58:04.520Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/news/reversinglabs-titanium-platform-nominated-for-2019-mass-tech-leadership-awards</loc><lastmod>2025-08-05T15:05:38.309Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/news/eweek-cisco-talos-and-reversinglabs-warn-adwind-remote-access-trojan-rat-has-added</loc><lastmod>2025-08-01T04:40:59.570Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/news/marios-session-rsa-2016-highlights</loc><lastmod>2025-07-01T16:01:48.340Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/news/cyber-triage-and-reversinglabs-integrate-to-surface-undetected-malware</loc><lastmod>2025-12-01T21:48:45.612Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/news/our-new-offices</loc><lastmod>2025-07-01T15:47:14.904Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/news/reversinglabs-partnership-featured-recorded-future-blog-hunt-malware-and-improve</loc><lastmod>2025-07-01T15:36:44.901Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/news/william-patrick-opet-managing-director-cybersecurity-technology-controls-jpmorgan</loc><lastmod>2025-07-01T15:26:49.814Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/news/reversinglabs-chosen-kick-phantoms-new-webinar-series</loc><lastmod>2025-07-01T15:21:57.041Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/news/reversinglabs-and-splunk-deliver-new-webinar-to-ismg-readers</loc><lastmod>2025-08-05T15:05:53.436Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/news/mist-morning</loc><lastmod>2025-07-01T15:09:23.707Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/news/reversinglabs-turbo-talks-black-hat-usa-2017</loc><lastmod>2025-07-01T15:03:15.711Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/news/reversinglabs-ceo-participate-panel-cloudsecurity2012</loc><lastmod>2025-07-01T14:51:45.368Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/news/mario-vuksan-ceo-reversinglabs-speak-jackware-panel-sinet-innovation-summit-2017</loc><lastmod>2025-07-01T14:43:49.076Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/news/reversinglabs-special-sponsor-at-fs-isac-annual-summit-2019</loc><lastmod>2025-08-05T15:06:31.310Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/news/reversinglabs-joins-ready-ibm-security-intelligence-alliance-program</loc><lastmod>2025-07-01T14:22:54.376Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/news/reversinglabs-joins-carbon-black-integration-network-cbin</loc><lastmod>2025-07-01T14:11:53.803Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/news/mario-vuksan-rsa-conference-usa-2016</loc><lastmod>2025-07-01T13:57:23.851Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/news/mario-vuksan-ceo-reversinglabs-speak-ibm-cyber-breakfast-event</loc><lastmod>2025-07-01T13:49:15.298Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/news/get-know-reversinglabs-fs-isac-emea-amsterdam</loc><lastmod>2025-07-01T13:40:13.373Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/news/ask-developer-monday</loc><lastmod>2025-07-01T13:31:45.657Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/reversinglabs-exhibits-dodiis-2018-our-government-partner-carahsoft</loc><lastmod>2025-12-30T19:11:37.490Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/news/reversinglabs-sponsors-sinet-london</loc><lastmod>2025-06-30T20:37:38.623Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/news/reversinglabs-selected-sinet-16-innovator-present-2012-sinet-showcase</loc><lastmod>2025-06-30T20:38:14.626Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/reversinglabs-embarking-significant-expansion-core-technologies-2017</loc><lastmod>2025-12-30T19:09:23.093Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/news/reversinglabs-inducted-jpmorgan-chase-hall-innovation</loc><lastmod>2025-08-05T15:07:59.084Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/news/cryptowall-version-4-threat</loc><lastmod>2025-08-01T04:23:49.219Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/mpack-revisited</loc><lastmod>2025-12-30T19:14:12.743Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/news/airlock-reversinglabs-make-cybersecurity-easier-and-more-effective-australia</loc><lastmod>2025-07-24T19:11:19.239Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/news/reversinglabs-key-contributor-hewlett-packard-enterprise-hpe-security-research-cyber</loc><lastmod>2025-06-30T19:16:42.407Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/news/reversinglabs-closes-25-million-series-round-led-trident-capital-cybersecurity-and</loc><lastmod>2025-06-30T18:56:02.116Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/customers/wirespeed</loc><lastmod>2025-10-30T15:50:25.458Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/customers/municipality</loc><lastmod>2025-10-30T15:53:59.706Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/customers/investment-firm-yara-rules</loc><lastmod>2025-10-30T15:51:28.764Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/customers/global-bank-third-party-software-risk</loc><lastmod>2025-10-30T15:52:56.530Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/customers/canadian-municipality-software-risk-management</loc><lastmod>2025-10-30T15:49:27.789Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/software-package-deconstruction-series/video-conferencing-software-deconstruction</loc><lastmod>2025-07-24T20:55:28.096Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/news/cyberwire-daily-crypto-client-or-cyber-trap</loc><lastmod>2025-08-05T14:44:37.825Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/news/cyberscoop-hugging-face-platform-continues-to-be-plagued-by-vulnerable-pickles</loc><lastmod>2025-08-05T14:44:21.800Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/news/infosecurity-malicious-ai-models-on-hugging-face-exploit-novel-attack-technique</loc><lastmod>2025-08-06T03:15:55.479Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/news/cso-online-attackers-hide-malicious-code-in-hugging-face-ai-model-pickle-files</loc><lastmod>2025-08-05T14:43:54.770Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/news/dark-reading-open-source-ai-models-perfect-storm-for-malicious-code-vulnerabilities</loc><lastmod>2025-08-05T14:43:39.201Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/news/helpnetsecurity-malicious-ml-models-found-on-hugging-face-hub</loc><lastmod>2025-08-05T14:43:24.802Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/news/sc-media-ai-has-become-the-supply-chain</loc><lastmod>2025-08-06T03:03:54.757Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/news/25-hot-risk-operations-and-threat-intelligence-platforms-at-rsa-2020</loc><lastmod>2025-08-05T15:04:19.916Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/customers/ai-file-analysis</loc><lastmod>2025-07-25T18:47:12.229Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/customers/ai-data-service-provider</loc><lastmod>2025-10-08T00:54:43.689Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/contact/sales</loc><lastmod>2025-07-31T17:24:35.889Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/customers/adriascan</loc><lastmod>2025-11-04T18:29:58.990Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/news/supply-chain-brain-digicert-and-reversinglabs-agree-to-partnership</loc><lastmod>2025-08-05T15:03:01.083Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/resources/secureworld-panel-ransomware-myths-pitfalls-and-new-insights</loc><lastmod>2025-07-23T23:49:26.911Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/alliances</loc><lastmod>2026-01-16T18:12:30.288Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/value-added-partners</loc><lastmod>2026-01-13T15:38:50.235Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/marketplaces</loc><lastmod>2026-01-13T15:40:24.734Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/secure-third-party-software-acquisition-government</loc><lastmod>2025-08-20T19:53:26.271Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/public-sector-cybersecurity</loc><lastmod>2026-01-16T20:26:42.095Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/webinar/2025-gartner-market-guide-sscs</loc><lastmod>2026-01-22T17:46:31.796Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/webinar/2024-verizon-dbir-supply-chain-risk</loc><lastmod>2025-08-20T19:51:53.428Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/customers/crogl</loc><lastmod>2025-12-01T19:33:01.765Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/customers/solarwinds</loc><lastmod>2026-03-02T22:24:01.566Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/high-tech-cybersecurity</loc><lastmod>2026-01-16T20:23:37.388Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/webinar/dont-get-walled-in-by-your-sandbox</loc><lastmod>2025-08-20T19:51:02.561Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/webinar/the-powerful-alternative-to-virustotal</loc><lastmod>2026-02-12T19:05:34.991Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/customers/biotech-lab-software</loc><lastmod>2026-02-03T23:16:15.165Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/healthcare-cybersecurity</loc><lastmod>2026-01-16T20:22:32.079Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/spectra-assure-vs-pentesting-cost-savings-calculator</loc><lastmod>2026-02-10T20:54:15.162Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/customers/bank-combats-email-malware</loc><lastmod>2025-10-30T15:54:24.262Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/customers/global-bank-risk-visibility</loc><lastmod>2026-02-04T17:06:01.464Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/financial-services-cybersecurity</loc><lastmod>2026-01-16T20:21:36.558Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/webinar/eu-regulatory-compliance-and-sscs</loc><lastmod>2025-08-20T19:49:49.653Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/resources/ciso-tprm-guide</loc><lastmod>2025-08-20T19:49:11.845Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/resources/addressing-third-party-software-risk</loc><lastmod>2025-07-31T16:38:53.602Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/resources/manage-your-commercial-software-risk</loc><lastmod>2025-08-20T19:48:46.973Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/webinar/six-critical-risks-to-identify-in-your-software-supply-chain</loc><lastmod>2025-08-20T19:47:52.530Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/energy-utilities-cybersecurity</loc><lastmod>2026-01-16T20:20:22.192Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/webinar/integrating-software-supply-chain-security-into-security-operations</loc><lastmod>2025-08-20T19:47:28.714Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/webinar/conquer-software-based-threats-in-the-cicd-pipeline</loc><lastmod>2025-12-01T21:55:39.146Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/reversinglabs-integration-with-microsoft-dev-ops</loc><lastmod>2025-10-01T20:33:59.057Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/reversinglabs-integration-with-jfrog-artifactory</loc><lastmod>2026-01-16T18:13:23.951Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/servicenow-integration-for-sbom-secops</loc><lastmod>2026-02-19T17:20:43.321Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/reversinglabs-integration-with-glasswall</loc><lastmod>2025-11-20T14:03:39.369Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/reversinglabs-integration-with-python</loc><lastmod>2025-10-01T20:25:19.734Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/reversinglabs-integration-with-opencti-by-filigran</loc><lastmod>2025-10-01T20:26:36.355Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/reversinglabs-integration-with-microsoft-sentinel</loc><lastmod>2025-10-01T20:27:41.858Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/products/spectra-core</loc><lastmod>2026-02-11T19:48:02.382Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/resources/the-buyers-guide-to-software-supply-chain-security</loc><lastmod>2025-08-20T19:46:42.003Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/webinar/spectra-assure-for-software-supply-chain-security-product-demo</loc><lastmod>2025-08-20T19:45:44.579Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/software-supply-chain-security-free-trial</loc><lastmod>2025-08-20T16:57:36.209Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/products/software-supply-chain-security</loc><lastmod>2026-01-16T18:18:05.164Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/webinar/3-questions-you-should-be-asking-about-every-suspicious-file</loc><lastmod>2025-10-06T17:56:27.114Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/integrations</loc><lastmod>2026-02-20T19:10:27.506Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/resources/optimizing-suspicious-file-triage</loc><lastmod>2025-08-20T16:44:00.392Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/solutions/malware-analysis</loc><lastmod>2025-11-22T01:39:52.678Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/integration-partners/threatconnect</loc><lastmod>2025-07-26T00:20:29.125Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/reversinglabs-integration-with-palo-alto-cortex-xsoar</loc><lastmod>2025-07-23T21:49:17.110Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/solutions/ransomware-feed</loc><lastmod>2025-10-06T15:32:48.397Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/crosspoint-capital-leads-investment-in-software-security-pioneer-reversinglabs</loc><lastmod>2025-11-04T18:34:46.358Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/company/leadership</loc><lastmod>2026-02-12T19:30:12.381Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/solutions/cyber-threat-intelligence</loc><lastmod>2025-11-22T01:36:41.716Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/products/reversinglabs-spectra-detect</loc><lastmod>2026-03-11T15:08:47.000Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/products/spectra-intelligence</loc><lastmod>2026-03-11T15:25:10.898Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/become-a-partner</loc><lastmod>2026-01-13T15:33:50.194Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/solutions/scalable-file-analysis</loc><lastmod>2025-11-22T01:44:59.036Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/demo</loc><lastmod>2025-08-20T16:41:33.305Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/products/spectra-analyze</loc><lastmod>2025-12-08T21:07:18.110Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/webinar/supercharge-your-soc-with-advanced-malware-analysis</loc><lastmod>2025-08-20T16:39:51.598Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/solutions/advanced-malware-analysis</loc><lastmod>2025-10-06T15:26:36.133Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/solutions/secure-file-collaboration</loc><lastmod>2025-06-26T19:49:02.001Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/resources/modern-malware-analysis</loc><lastmod>2025-08-20T16:39:11.050Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/resources/how-to-evaluate-threat-intelligence-feeds</loc><lastmod>2025-10-14T11:30:04.639Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/solutions/email-threat-scanning</loc><lastmod>2025-07-31T16:27:44.678Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/webinar/sboms-are-having-a-moment</loc><lastmod>2025-08-20T16:40:10.729Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/webinar/dont-stop-at-the-sbom</loc><lastmod>2025-08-20T16:40:19.834Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/products/software-supply-chain-security-virtual-tour-safe</loc><lastmod>2026-03-03T14:34:15.963Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/resources/go-beyond-the-sbom</loc><lastmod>2025-08-20T16:36:20.362Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/solutions/software-bill-of-materials-sbom</loc><lastmod>2026-02-04T16:30:08.112Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/webinar/unraveling-xz-a-software-supply-chain-under-siege</loc><lastmod>2025-08-20T16:35:59.847Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/solutions/open-source-software-security</loc><lastmod>2026-01-16T20:15:16.156Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/resources/closing-the-software-supply-chain-security-gap</loc><lastmod>2025-08-20T16:35:22.863Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/gartner-market-guide-to-software-supply-chain-security</loc><lastmod>2026-02-04T17:52:36.054Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/company/about-us</loc><lastmod>2026-03-23T15:07:00.958Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/sscs-report-2025</loc><lastmod>2026-01-27T15:22:26.729Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/black-hat-2013-showcases-home-security-bootkits-cellular-opsec-failures</loc><lastmod>2025-12-30T19:15:33.664Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/solutions/secure-virtual-machine-images</loc><lastmod>2026-01-16T20:13:43.023Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/solutions/secure-software-release-processes</loc><lastmod>2026-02-04T16:29:15.513Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/demo-videos/all</loc><lastmod>2025-07-31T17:24:58.367Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/customers/insurance-file-analysis</loc><lastmod>2025-10-30T15:48:53.937Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/conversinglabs/uncovering-stolen-algorithms-in-commercial-products</loc><lastmod>2025-08-05T15:44:37.988Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/conversinglabs/the-state-of-open-source-software-security</loc><lastmod>2025-08-06T22:02:30.295Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/conversinglabs/the-state-of-appsec</loc><lastmod>2025-08-05T15:44:24.342Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/conversinglabs/the-lockbit-takedown-what-we-know</loc><lastmod>2025-08-06T21:54:30.453Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/conversinglabs/the-future-of-bug-bounties</loc><lastmod>2025-08-05T15:44:04.729Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/conversinglabs/the-evolution-of-threat-intel</loc><lastmod>2025-08-06T21:46:51.005Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/conversinglabs/the-art-of-security-chaos-engineering-conversinglabs-by-reversinglabs</loc><lastmod>2025-08-05T15:43:53.193Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/conversinglabs/steve_lipner_safecode_software_supply_chain_security</loc><lastmod>2025-08-05T15:43:46.682Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/conversinglabs/smash-and-grab-astralocker-breach</loc><lastmod>2025-08-05T15:43:39.219Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/conversinglabs/red-teaming-the-indian-government</loc><lastmod>2025-08-05T15:43:33.143Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/conversinglabs/past-present-future-of-sboms</loc><lastmod>2025-08-06T21:50:15.412Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/conversinglabs/not-all-developers-can-be-security-jedis</loc><lastmod>2025-08-05T15:43:21.688Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/conversinglabs/modern-risks-to-the-internet-of-things-and-software-supply-chains-conversinglabs</loc><lastmod>2025-08-05T15:43:14.666Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/conversinglabs/leveraging-yara</loc><lastmod>2025-08-05T15:43:07.379Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/conversinglabs/lessons-learned-from-ci-cd-compromises</loc><lastmod>2025-08-05T15:43:00.121Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/conversinglabs/lemons-liability-what-it-means-for-software-applications-conversinglabs-by-reversinglabs</loc><lastmod>2025-08-05T15:42:54.268Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/conversinglabs/is-cybersecurity-ready-for-the-solarwinds-prosecution</loc><lastmod>2025-08-06T21:51:23.153Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/conversinglabs/iconburst-the-newest-software-supply-chain-attack</loc><lastmod>2025-08-05T15:42:39.725Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/conversinglabs/hunting-follina</loc><lastmod>2025-08-05T15:42:31.846Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/conversinglabs/episode-05</loc><lastmod>2025-08-01T02:52:05.987Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/conversinglabs/episode-04</loc><lastmod>2025-08-01T02:53:14.025Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/conversinglabs/episode-03</loc><lastmod>2025-08-01T02:54:08.081Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/conversinglabs/episode-02</loc><lastmod>2025-08-01T02:55:19.737Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/conversinglabs/episode-01</loc><lastmod>2025-08-01T02:56:34.042Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/conversinglabs/dont-sleep-on-sboms</loc><lastmod>2025-07-18T12:43:49.115Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/conversinglabs/cybersecuritys-double-edged-sword</loc><lastmod>2025-08-06T21:45:26.677Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/conversinglabs/creating-the-standard-for-supply-chain-risk</loc><lastmod>2025-08-05T15:31:32.570Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/conversinglabs/conversinglabs-season-4-episode-1</loc><lastmod>2025-07-18T12:41:07.081Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/conversinglabs/contextualizing-the-national-cybersecurity-strategy</loc><lastmod>2025-08-05T15:45:07.024Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/conversinglabs/chinese-apt-group-exploits-soho-routers</loc><lastmod>2025-08-06T21:53:01.670Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/conversinglabs/cafe-rsaconference-sbom-corman</loc><lastmod>2025-08-05T15:44:57.466Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/conversinglabs/how-do-you-trust-open-source-software</loc><lastmod>2025-08-05T15:42:25.343Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/conversinglabs/hackers-hacking-hackers</loc><lastmod>2025-08-06T21:48:31.286Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/conversinglabs/going-back-to-basics-to-thwart-attacks</loc><lastmod>2025-08-05T21:40:47.886Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/press-releases/uefi-rootkit-detection-framework-black-hat-2013</loc><lastmod>2025-08-13T15:31:01.207Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/press-releases/threatconnect-inc-integrates-reversinglabs-ramps-its-technology-partner-program-q1</loc><lastmod>2025-08-13T15:42:10.851Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/press-releases/threat-intelligence-appliance</loc><lastmod>2025-08-13T15:31:21.617Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/press-releases/synopsys-and-reversinglabs-sign-agreement-to-enhance-software-supply-chain-risk-management</loc><lastmod>2025-08-13T15:43:17.427Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/press-releases/survey-software-supply-chain-risk-software-tampering</loc><lastmod>2025-08-13T15:31:32.063Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/press-releases/software-supply-chain-attacks-regulation-and-litigation-increase-as-barriers-to-entry-drop</loc><lastmod>2025-08-13T15:29:51.475Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/press-releases/rl-named-a-winner-for-top-software-supply-chain-security-solution-as-part-of-2024-top-infosec-innovator-awards</loc><lastmod>2025-08-13T15:40:52.555Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/press-releases/reversinglabs-wins-trust-award-for-the-best-threat-intelligence-technology-at-sc-awards-2021</loc><lastmod>2025-08-13T15:43:48.788Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/press-releases/reversinglabs-wins-threat-intelligence-platform-of-the-year-in-2020-cybersecurity-breakthrough-awards</loc><lastmod>2025-08-13T15:41:24.362Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/press-releases/reversinglabs-wins-multiple-globee-awards-in-the-2021-cyber-security-global-excellence-awards</loc><lastmod>2025-08-13T15:44:12.135Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/press-releases/reversinglabs-welcomes-industry-leader-doug-levin-its-board-directors</loc><lastmod>2025-08-13T15:44:47.299Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/press-releases/reversinglabs-us-inc-receives-2020-best-of-cambridge-award</loc><lastmod>2025-08-13T15:42:54.901Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/press-releases/reversinglabs-unveils-100-open-source-yara-rules-for-threat-hunters-at-inaugural-reversing-2020-summit</loc><lastmod>2025-08-13T15:43:03.854Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/press-releases/reversinglabs-titanium-platform-finds-destructive-objects-existing-security-investments-miss</loc><lastmod>2025-08-13T15:41:16.488Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/press-releases/reversinglabs-titanium-platform-delivers-roi-of-397-percent-according-to-independent-research-firm-analysis</loc><lastmod>2025-08-13T15:44:55.020Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/press-releases/reversinglabs-supply-next-generation-vgrep-service-virus-bulletin</loc><lastmod>2025-08-13T15:32:03.270Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/press-releases/reversinglabs-spectra-assure-wins-software-supply-chain-security-award-in-the-20th-annual-globee-awards-for-cybersecurity</loc><lastmod>2025-08-13T15:43:10.932Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/press-releases/reversinglabs-selected-as-sc-media-2021-trust-award-finalist</loc><lastmod>2025-08-13T15:46:31.562Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/press-releases/reversinglabs-selected-as-a-2025-sc-awards-finalist</loc><lastmod>2025-08-13T15:45:29.569Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/press-releases/reversinglabs-selected-as-a-2024-sc-awards-finalist</loc><lastmod>2025-08-13T15:46:05.652Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/press-releases/reversinglabs-rl-partner-program-accelerates-partner-engagement-growth-and-expansion</loc><lastmod>2025-12-01T21:21:14.644Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/press-releases/reversinglabs-releases-first-threat-intelligence-platform-with-explainable-machine-learning</loc><lastmod>2025-08-13T15:40:59.735Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/press-releases/reversinglabs-recognized-in-five-gartner-hype-cycle-reports</loc><lastmod>2025-08-13T15:32:14.077Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/press-releases/reversinglabs-recognized-in-first-gartner-hype-cycle-for-platform-engineering</loc><lastmod>2025-08-13T15:42:37.254Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/press-releases/reversinglabs-recognized-by-cb-insights-as-a-2019-cyber-defender</loc><lastmod>2025-08-13T15:46:42.083Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/press-releases/reversinglabs-receives-perfect-score-and-best-buy-recommendation-in-sc-labs-threat-and-intelligence-analysis-tools-group-product-review</loc><lastmod>2025-08-13T15:45:58.632Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/press-releases/reversinglabs-receives-2023-global-infosec-award-for-best-software-supply-chain-security-solution-at-rsac-2023</loc><lastmod>2025-08-13T15:05:27.880Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/press-releases/reversinglabs-previews-next-generation-advanced-malware-hunting-black-hat</loc><lastmod>2025-12-02T19:28:01.083Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/press-releases/reversinglabs-partners-with-anomali-to-deliver-integrated-local-malware-intelligence-enrichment-apis-and-feeds-to-anomali-threatstream</loc><lastmod>2025-06-16T15:27:08.222Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/press-releases/reversinglabs-new-malware-lab-solution-enables-next-generation-of-threat-hunting</loc><lastmod>2025-08-13T15:32:36.490Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/press-releases/reversinglabs-names-paul-ciesielski-as-chief-revenue-officer</loc><lastmod>2025-08-13T15:32:44.909Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/press-releases/reversinglabs-names-kathleen-deshields-senior-vice-president-of-human-resources</loc><lastmod>2025-08-13T15:46:53.440Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/press-releases/reversinglabs-names-erik-thoen-vp-of-product-management-to-advance-development-of-compelling-threat-intelligence-solutions</loc><lastmod>2025-08-13T15:33:13.513Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/press-releases/reversinglabs-named-winner-of-the-coveted-infosec-awards-during-rsa-conference-2020</loc><lastmod>2025-08-13T15:44:04.878Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/press-releases/reversinglabs-named-winner-of-the-coveted-global-infosec-awards-during-rsa-conference-2021</loc><lastmod>2025-08-13T15:41:39.945Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/press-releases/reversinglabs-named-winner-in-the-16th-annual-info-security-pgs-2020-global-excellence-awards</loc><lastmod>2025-08-13T15:40:45.486Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/press-releases/reversinglabs-named-winner-in-black-unicorn-awards-for-2021</loc><lastmod>2025-08-13T15:46:23.202Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/press-releases/reversinglabs-named-winner-in-black-unicorn-awards-for-2020</loc><lastmod>2025-08-13T15:46:15.165Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/press-releases/reversinglabs-named-in-2025-gartner-market-guide-for-software-supply-chain-security</loc><lastmod>2025-08-13T15:40:29.998Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/press-releases/reversinglabs-named-hot-company-for-software-supply-chain-security</loc><lastmod>2025-12-01T22:47:53.176Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/press-releases/reversinglabs-named-finalist-in-black-unicorn-awards-for-2019</loc><lastmod>2025-08-13T15:33:24.293Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/glossary/ai-security-posture-management-ai-spm</loc><lastmod>2026-03-25T22:13:24.180Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/glossary/icap</loc><lastmod>2026-03-25T20:46:42.829Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/glossary/yara-rule</loc><lastmod>2026-01-12T16:00:33.432Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/glossary/third-party-cyber-risk-management-tpcrm</loc><lastmod>2025-08-08T17:31:58.597Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/glossary/software-security-hygiene</loc><lastmod>2025-08-08T17:32:35.021Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/glossary/recursive-unpacking</loc><lastmod>2025-07-24T22:39:53.223Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/glossary/provenance-validation</loc><lastmod>2025-07-24T22:36:57.331Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/glossary/post-compilation-scanning</loc><lastmod>2025-07-24T22:34:14.665Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/glossary/cicd-malware-detection</loc><lastmod>2025-07-24T22:30:19.086Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/glossary/fedramp-software-supply-chain-rules</loc><lastmod>2025-07-24T22:26:42.870Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/glossary/code-trustworthiness</loc><lastmod>2025-08-08T17:33:19.853Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/glossary/code-signing-validation</loc><lastmod>2025-07-24T22:18:40.275Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/glossary/cisa-software-supply-chain-guidelines</loc><lastmod>2025-07-24T22:12:29.000Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/glossary/cicd-tampering</loc><lastmod>2025-07-24T22:03:08.239Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/glossary/build-system-telemetry</loc><lastmod>2025-07-24T22:48:51.375Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/glossary/build-system-hardening</loc><lastmod>2025-07-24T22:48:08.040Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/glossary/build-pipeline-security</loc><lastmod>2025-07-24T22:47:31.838Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/glossary/automated-software-analysis</loc><lastmod>2025-07-25T19:20:46.016Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/glossary/reverse-engineering</loc><lastmod>2026-03-18T21:35:23.366Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/glossary/remote-access-trojan-rat</loc><lastmod>2025-08-04T18:51:39.541Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/glossary/rootkit</loc><lastmod>2025-08-04T18:52:01.745Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/glossary/ransomware</loc><lastmod>2025-08-04T18:51:17.800Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/glossary/runtime-software-verification</loc><lastmod>2025-07-25T22:35:44.992Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/glossary/artifact-poisoning</loc><lastmod>2025-07-25T22:36:59.851Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/glossary/phishing</loc><lastmod>2025-08-04T18:50:51.050Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/glossary/payload</loc><lastmod>2025-12-02T19:47:22.617Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/glossary/patch-management</loc><lastmod>2025-07-25T22:39:02.576Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/glossary/saas-bom</loc><lastmod>2025-07-25T22:42:53.358Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/glossary/secrets</loc><lastmod>2025-08-04T18:52:53.261Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/glossary/open-software-supply-chain-attack-reference-oscr</loc><lastmod>2025-08-04T18:48:56.472Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/glossary/secure-build-environments</loc><lastmod>2025-07-25T22:48:46.365Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/glossary/npm</loc><lastmod>2025-07-25T22:49:21.946Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/glossary/secure-software-development-framework-ssdf</loc><lastmod>2025-08-04T18:53:14.307Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/glossary/malware-analysis</loc><lastmod>2025-08-04T18:48:41.464Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/glossary/malware</loc><lastmod>2025-08-04T18:48:27.135Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/glossary/keylogger</loc><lastmod>2025-08-04T18:48:18.831Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/glossary/interactive-application-security-testing-iast</loc><lastmod>2025-08-04T18:48:09.066Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/glossary/security-automation</loc><lastmod>2025-07-25T22:54:11.447Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/glossary/security-operations-center-soc</loc><lastmod>2025-08-04T18:53:36.179Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/glossary/insider-threat</loc><lastmod>2025-08-04T18:47:49.168Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/glossary/smishing-attack</loc><lastmod>2025-08-04T18:53:52.635Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/glossary/indicator-of-compromise-ioc</loc><lastmod>2025-08-04T18:46:47.988Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/glossary/software-artifact-behavioral-analysis</loc><lastmod>2025-07-25T22:57:58.268Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/glossary/software-assurance</loc><lastmod>2025-07-25T22:58:40.664Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/glossary/incident-response-plan</loc><lastmod>2025-07-25T22:59:19.344Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/glossary/dynamic-application-security-testing-dast</loc><lastmod>2025-08-04T18:46:11.698Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/glossary/dll-sideloading</loc><lastmod>2026-03-18T21:43:05.720Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/glossary/digital-forensics-and-incident-response</loc><lastmod>2025-08-04T18:46:02.604Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/glossary/devsecops</loc><lastmod>2025-08-04T18:45:53.696Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/glossary/safe-report</loc><lastmod>2026-03-12T16:28:27.651Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/glossary/software-bill-of-materials-sbom</loc><lastmod>2026-03-18T19:40:52.723Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/glossary/dependency-management</loc><lastmod>2025-07-25T23:06:43.555Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/glossary/software-build-artifacts</loc><lastmod>2025-07-25T23:10:16.644Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/glossary/software-component-verification-standard-scvs</loc><lastmod>2025-08-04T18:55:56.052Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/glossary/cybersecurity-supply-chain-risk-management-c-scrm</loc><lastmod>2025-08-04T18:45:05.485Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/glossary/software-composition-analysis</loc><lastmod>2026-03-31T22:04:04.595Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/glossary/software-deployment-security</loc><lastmod>2025-07-25T23:12:52.606Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/glossary/software-development-life-cycle-sdlc</loc><lastmod>2025-08-04T18:56:17.740Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/glossary/cyber-risk-mitigation</loc><lastmod>2025-08-04T18:44:49.947Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/glossary/software-supply-chain-security</loc><lastmod>2026-03-18T19:30:57.234Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/glossary/software-tampering</loc><lastmod>2025-07-25T23:15:30.160Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/glossary/software-vulnerabilities</loc><lastmod>2025-07-25T23:15:52.556Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/glossary/spyware</loc><lastmod>2025-08-04T18:57:14.392Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/glossary/cyber-risk-assessment</loc><lastmod>2025-07-25T23:20:42.232Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/glossary/sql-injection</loc><lastmod>2025-08-04T18:52:31.081Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/glossary/static-analysis</loc><lastmod>2025-08-04T18:57:34.037Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/glossary/static-application-security-testing-sast</loc><lastmod>2026-03-31T21:51:28.475Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/glossary/supply-chain-integrity-attacks</loc><lastmod>2025-08-04T18:57:58.964Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/glossary/supply-chain-levels-for-software-artifacts-slsa</loc><lastmod>2025-08-04T18:58:15.916Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/glossary/continuous-monitoring</loc><lastmod>2025-07-25T23:21:05.654Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/glossary/third-party-software-validation</loc><lastmod>2025-07-25T23:22:19.297Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/glossary/container</loc><lastmod>2025-08-04T18:44:14.339Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/glossary/threat-actor</loc><lastmod>2025-08-04T19:02:17.788Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/glossary/complex-binary-analysis</loc><lastmod>2025-08-04T18:40:36.380Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/glossary/threat-hunting</loc><lastmod>2026-01-20T17:53:34.690Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/glossary/threat-intelligence</loc><lastmod>2025-07-25T23:26:07.059Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/glossary/threat-modeling</loc><lastmod>2025-07-25T23:27:32.563Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/glossary/trojan</loc><lastmod>2025-07-25T23:28:43.512Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/glossary/common-vulnerability-scoring-system-cvss</loc><lastmod>2025-08-04T18:43:46.096Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/glossary/typosquatting</loc><lastmod>2025-07-25T23:29:12.145Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/glossary/common-vulnerabilities-and-exposures-cve</loc><lastmod>2025-08-04T18:43:35.936Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/glossary/code-signing</loc><lastmod>2025-07-25T23:31:54.314Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/glossary/code-scanning</loc><lastmod>2025-07-25T23:33:24.619Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/glossary/code-obfuscation</loc><lastmod>2026-03-18T21:44:21.677Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/glossary/xbom</loc><lastmod>2026-03-18T21:38:37.766Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/glossary/cbom</loc><lastmod>2025-08-08T17:34:34.987Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/glossary/attack-vector</loc><lastmod>2025-08-04T18:40:15.227Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/glossary/zero-day-attack</loc><lastmod>2026-03-18T19:39:42.694Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/glossary/attack-surface</loc><lastmod>2025-08-04T18:40:01.413Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/glossary/artifact-repository</loc><lastmod>2025-07-25T23:39:26.837Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/glossary/application-security-posture-management</loc><lastmod>2025-07-25T23:40:07.128Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/glossary/application-security-testing-ast</loc><lastmod>2025-08-04T18:36:44.946Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/author/toni-dujmovi</loc><lastmod>2026-04-01T14:09:15.425Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/author/igor-lasic</loc><lastmod>2026-03-27T18:35:20.813Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/author/zaria-vuksan</loc><lastmod>2026-03-17T16:57:01.423Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/author/josh-morin</loc><lastmod>2026-03-16T20:30:02.266Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/author/jim-wojno</loc><lastmod>2025-11-21T17:10:46.395Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/author/vladimir-pezo</loc><lastmod>2025-11-03T16:23:54.575Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/author/dia-brar</loc><lastmod>2025-10-20T19:38:22.603Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/author/kadi-mckean</loc><lastmod>2025-10-10T20:15:47.313Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/author/patrick-enderby</loc><lastmod>2025-10-10T20:16:40.963Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/author/katarina-blai</loc><lastmod>2025-10-10T20:16:57.506Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/author/hrvoje-samardzic</loc><lastmod>2025-10-10T20:17:09.284Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/author/edward-amoroso</loc><lastmod>2025-10-10T20:17:29.598Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/author/tomislav-maljic</loc><lastmod>2025-10-10T20:17:40.671Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/author/josip-mili</loc><lastmod>2025-10-10T20:17:46.350Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/author/mislav-boros</loc><lastmod>2025-10-10T20:17:52.029Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/author/solutions-specialist</loc><lastmod>2025-10-10T20:17:58.645Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/author/david-neuman</loc><lastmod>2025-10-10T20:18:04.177Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/author/robert-simmons</loc><lastmod>2025-10-10T20:18:11.364Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/author/mislav-sever</loc><lastmod>2025-10-10T20:18:17.762Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/author/christopher-r-wilder</loc><lastmod>2025-10-10T20:18:24.352Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/author/michael-mehlberg</loc><lastmod>2025-10-10T20:18:31.207Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/author/aaron-hoffmann</loc><lastmod>2025-10-10T20:18:38.985Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/author/john-masserini</loc><lastmod>2025-10-10T20:18:45.962Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/author/ali-khan</loc><lastmod>2025-10-10T20:18:52.399Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/author/ben-rice</loc><lastmod>2025-10-10T20:19:00.204Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/author/mislav-jurini</loc><lastmod>2025-10-10T20:19:08.275Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/author/chip-epps</loc><lastmod>2025-12-02T18:23:29.318Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/author/chris-hoff</loc><lastmod>2025-06-02T13:06:35.147Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/author/chris-romeo</loc><lastmod>2025-05-31T02:24:48.598Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/author/hugh-pyle</loc><lastmod>2025-05-30T20:09:35.690Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/author/marijan-ralasic</loc><lastmod>2025-06-07T01:01:15.534Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/author/petar-kirhmajer</loc><lastmod>2025-07-14T21:20:36.672Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/author/marshall-payne</loc><lastmod>2025-05-27T19:54:07.575Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/author/ashlee-benge</loc><lastmod>2025-10-02T20:07:01.041Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/author/borna-zeba</loc><lastmod>2025-05-26T16:39:37.851Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/author/matt-rose</loc><lastmod>2025-06-02T22:27:47.977Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/author/chris-hughes</loc><lastmod>2025-05-26T14:59:40.505Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/author/laura-dabelic</loc><lastmod>2025-05-26T13:32:03.930Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/author/richi-jennings</loc><lastmod>2025-06-02T21:26:44.204Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/author/joseph-edwards</loc><lastmod>2025-05-23T21:27:51.653Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/author/tomislav-periin</loc><lastmod>2025-06-06T22:18:38.930Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/author/samantha-schawe</loc><lastmod>2025-05-21T17:23:30.631Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/author/kate-tenerowicz</loc><lastmod>2025-05-20T21:39:57.895Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/author/joshua-knox</loc><lastmod>2025-05-20T21:29:37.929Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/author/saa-zdjelar</loc><lastmod>2025-05-20T20:06:48.036Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/author/dan-petrillo</loc><lastmod>2025-05-20T15:42:21.765Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/author/michael-parker</loc><lastmod>2025-05-19T16:25:59.583Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/author/charlie-jones</loc><lastmod>2025-05-19T15:25:40.873Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/author/joe-coletta</loc><lastmod>2025-05-16T18:12:29.024Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/author/jasmine-noel</loc><lastmod>2025-07-09T18:24:50.579Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/author/patrick-knight</loc><lastmod>2025-05-15T19:37:06.269Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/author/amy-pace</loc><lastmod>2025-05-14T14:40:32.733Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/author/stuart-phillips</loc><lastmod>2025-05-13T21:21:33.009Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/author/doug-levin</loc><lastmod>2025-06-06T22:31:36.970Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/author/karlo-zanki</loc><lastmod>2025-06-06T21:56:29.981Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/author/dave-ferguson</loc><lastmod>2026-03-12T13:48:38.152Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/author/paul-roberts</loc><lastmod>2025-06-06T21:04:25.439Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/author/todd-r-weiss</loc><lastmod>2025-07-10T21:29:11.568Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/author/lucija-valentic</loc><lastmod>2025-05-13T16:55:07.931Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/author/robert-l-mitchell</loc><lastmod>2025-05-13T16:18:46.582Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/author/dhaval-shah</loc><lastmod>2025-05-13T16:18:49.955Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/author/carolynn-van-arsdale</loc><lastmod>2025-06-12T23:34:42.906Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/author/ericka-chickowski</loc><lastmod>2025-06-12T23:35:20.313Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/author/jaikumar-vijayan</loc><lastmod>2025-05-31T01:17:04.504Z</lastmod></url>
<url><loc>https://www.reversinglabs.com/blog/author/john-p-mello-jr</loc><lastmod>2025-06-12T23:35:00.109Z</lastmod></url>
</urlset>