ReversingLabs Blog

September 26, 2022

Gaps in the NVD increase U.S. cyber threat

Discrepancies in national vulnerability database reports show the U.S. lags behind China, possibly exposing U.S. firms to cyber attacks, Sophos finds.
September 23, 2022

The pandemic turned out to be a boon for public-private cybersecurity cooperation

The shift to remote work punched holes in government networks. But it also fostered a transformation in public-private cooperation, one NSA official noted at LabsCon. 
September 23, 2022

Threat analysis: Malicious npm package mimics Material Tailwind CSS tool

ReversingLabs has discovered a malicious npm package disguised as the software tool Material Tailwind. Here's an in-depth look at our discovery — and threat analysis. (Updated with MachO executable information.)
September 22, 2022

The Week in Cybersecurity: Is Lapsus$ back in action?

This week: The famous hacking group Lapsus$ appears to be back in action. Also: Russian cyber spies are targeting Ukraine by posing as internet providers. 
September 22, 2022

Rust finds its mojo: Move forward to memory-safe code

It’s confirmed: The Linux kernel will have Rust support soon. Linus Torvalds and Mark Russinovich say the time is now if you want to memory-safe code.
September 19, 2022

White House memo lays down the law on software supply chain security

The new memorandum calls on firms selling software to the federal government to attest to its conformity with NIST security standards. Here's what you need to know.
September 16, 2022

Iran-backed APT actors utilize CVEs to carry out cyber attacks on critical infrastructure

An advisory co-authored by the U.S., U.K., Canada and Australia warns of an Iran-backed APT group utilizing known vulnerabilities to carry out attacks. 
September 15, 2022

The Week in Cybersecurity: U.S. mandates federal agencies use secure third-party software tools

This week: A new OMB memo mandates federal use of secure third-party software tools. Plus: Twitter whistleblower Zatko details lacking security practices.

SUBSCRIBE

Sign up now to receive notifications for the ReversingLabs Blog

Request a DEMO

Request a live demo today for a walkthrough of how ReversingLabs detects and analyzes more hidden threats, built to evade security controls—and how we do it faster than anyone else.

REQUEST A DEMO