ReversingLabs Blog

July 25, 2022

New Features for the A1000, version 6.4

Better threat hunting and investigations with flexibility in status classifications, reliable dynamic and network analysis, smoother workflows/maintenance.
July 21, 2022

The Week in Cybersecurity: SolarWinds attackers tap Google Drive, malware spreads via Play Store apps

The Week in Cybersecurity highlights: An APT group is using Dropbox and Google Drive to cover up attacks, and malware is spreading via Play Store apps.
July 21, 2022

Three decades later, ransomware's first act still resonates

Ransomware has taken the world by storm, with big payouts — and disruption of critical infrastructure. Here’s a look at the key factors driving the rise.
July 19, 2022

CISA: Log4j threat will linger for years—so be prepared

A survey of the post-Log4j landscape found few successful hacks linked to it. The bad news? Log4Shell will linger for years — so you need to prepare.
July 15, 2022

The Week in Cybersecurity: Chips hit by 'Retbleed', journalists the chosen target of APTs

This week: a new attack known as ‘Retbleed’ impacts microprocessors, journalists are becoming desirable targets for cybercriminals, and more.
July 14, 2022

Rethink your SOC to defend against software supply chain attacks

Software supply chain attacks are on the rise, and a severe threat. Enterprises aiming to reduce risk need to rethink their SOC. Here's how to get started.
July 8, 2022

The Week in Cybersecurity: NPM removes malicious modules, Microsoft backtracks on macros

This week: fallout from another supply chain attack involving malicious NPM modules. Also: Microsoft backtracks on a pledge to disable Office macros. 

SUBSCRIBE

Sign up now to receive notifications for the ReversingLabs Blog

Request a DEMO

Request a live demo today for a walkthrough of how ReversingLabs detects and analyzes more hidden threats, built to evade security controls—and how we do it faster than anyone else.

REQUEST A DEMO