April 05, 2019

How SOC Analysts and Threat Hunters Can Expose Hidden Malware Undetected by EDRs

We just published a new EDR solution brief that specifically talks to each of the requirements above in detail. More on that at the end of this blog. First, let’s spend time talking about what security operations centers need to operate more effectively and how ReversingLabs addresses those needs.
March 27, 2019

Forging the ShadowHammer

Operation ShadowHammer is a new and highly targeted supply chain attack discovered by Kaspersky Lab. The attack leveraged ASUS Live Update software to distribute malicious code
January 14, 2019

Customer Use Case: Combatting Undetected Malware with Tanium and ReversingLabs

We’ve seen some exciting customer results from our partnership with Tanium. This blog focuses on the results and lessons learned from a proof of concept (PoC) completed with one of these customers.
December 13, 2018

Machine Learning: A Belt and Suspenders Approach

A belt and suspenders strategy won't win you any fashion awards, but it can save you from embarrassingly being caught with your pants down in a successful cyber-attack. However, unlike wearing two devices to hold up your pants, cybersecurity professionals can combine overlapping technologies to provide significant synergies that exceed the sum of their parts. That makes a belt and suspenders approach a sound strategy for cybersecurity.
November 29, 2018

Notes from the Field: Extending Carbon Black Visibility to Undetected Malware

Endpoint threat detection integrated with deep malware identification and analysis creates and complete malware detection and response solution
November 01, 2018

Join ReversingLabs at Alamo Ace in San Antonio, Texas, to See the Latest in Advanced Malware Hunting

Alamo Ace attendees will view product demonstrations that showcase ReversingLabs’ authoritative file intelligence solution TitaniumCloud and our next generation A1000 malware hunting solution