ReversingLabs Blog

August 9, 2019

How Detecting High Priority Malware will Accelerate Quality App Development and Release

When it comes to malware's persistent threat to your business, we typically discuss risk in context to failed compliance with regulations, or we talk about data loss, or we focus on fears around business continuity. But internal application quality and the software supply chain are often left out of the conversation — likely because the risk remains somewhat ambiguous.
August 7, 2019

What Are Supply Chain Attacks? How to Protect Your Software Lifecycle

Traditional supply chain attacks impact the production of physical goods. Your supply chain might include partners delivering raw materials, component parts used in manufacturing, as well as distribution of finished goods.Disruption of that supply chain could result in production shutdowns, aging inventory, degraded partner relations, and financial loss.
August 6, 2019

The PDF invoice that phished you

Phishing attacks are deception attempts that try to trick a person into clicking a link that leads to a credential-stealing page or a malicious application download. Relying on social engineering tactics, they have the potential to grant attackers unauthorized access to infrastructure, services, or information.
August 5, 2019

Catching lateral movement in internal emails

Email-based attacks are the most prominent threat vector that organizations see today. Like any other form of communication, emails get exploited to become carriers for a wide variety of attacks.
July 30, 2019

Ransomware in exotic email attachments

In the software arena, winning the mind share means becoming widespread to the point of being considered a de facto standard. And when it comes to the ways in which information is shared, this means being the object format everyone gravitates to. While aspirational for many software vendors, such success is impossible to predict, difficult to achieve, and challenging to maintain.
July 26, 2019

Automated Static Analysis vs. Dynamic Analysis - Better Together?

Dynamic File Analysis is undoubtedly a vital tool for cyber defense, but its utility as malware analysis technology continues to increase in sophistication.