<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=1076912843267184&amp;ev=PageView&amp;noscript=1">

RL Blog

Latest

Hunting for Ransomware

Hunting for Ransomware

Many ransomware families have changed their tactics and victim-targeting in recent years. Rather than indiscriminate attacks against anyone they’re able to infect, they have moved to a process called “big game hunting”.
Read More
3 Ways High-Priority Malware Detection Can Fill SOC Gaps

3 Ways High-Priority Malware Detection Can Fill SOC Gaps

Given today’s threat landscape, operating an enterprise Security Operations Center (SOC) presents a high-stakes challenges. With modern IT infrastructures comprised of a labyrinth of assets, endpoints, and third-party dependencies, threat actors continue to succeed in infiltrating vulnerable systems with inherently sophisticated, difficult-to-detect malware.
Read More

    Special Reports

    Latest Blog Posts

    Chinese APT Group Exploits SOHO Routers Chinese APT Group Exploits SOHO Routers

    Conversations About Threat Hunting and Software Supply Chain Security

    Reproducible Builds: Graduate Your Software Supply Chain Security Reproducible Builds: Graduate Your Software Supply Chain Security

    Glassboard conversations with ReversingLabs Field CISO Matt Rose

    Software Package Deconstruction: Video Conferencing Software Software Package Deconstruction: Video Conferencing Software

    Analyzing Risks To Your Software Supply Chain