XZ Trojan highlights software supply chain risk posed by 'sock puppets'
There is no fool-proof method to identify phony developer accounts — but there are telltale signs. Threat researchers share three key indicators.
Read More
Get the best of RL Blog delivered to your in-box weekly to stay up to date on key trends, analysis and best practices across threat intelligence and software supply chain security.
Conversations About Threat Hunting and Software Supply Chain Security
Glassboard conversations with ReversingLabs Field CISO Matt Rose
Analyzing Risks To Your Software Supply Chain