Threat Research It only takes one line of code to ruin your day Chris Hoff Much like SolarWinds before it, this incident shows we need to take a more critical look at the software we are using... Read More
Software Assurance A CISO’s guide to protecting against modern software threats Chris Hoff How to Rebuild Trust in the SDLC and 3rd Party Software Supply Chain Read More
Threat Research SunBurst: The next level of stealth Tomislav Peričin SolarWinds compromise exploited through sophistication and patience Read More
Threat Research Mining for malicious Ruby gems Tomislav Maljic Typosquatting barrage on RubyGems software repository users Read More
Software Supply Chain Security Why you need to prioritize development and software supply chain security ReversingLabs Enterprise software development graduated from the “waterfall” framework of development and operations Read More
Software Supply Chain Security How to detect software supply chain attacks ReversingLabs There are many reasons software supply chain attacks are attractive to cyber criminals Read More
Software Supply Chain Security How existing cybersecurity frameworks can curb software supply chain attacks ReversingLabs Implement processes and controls to disrupt attackers Read More
Threat Research The NPM package that walked away with all your passwords Tomislav Peričin Detecting malware in package manager repositories Read More
Software Assurance How detecting high-priority malware will accelerate quality app development and release ReversingLabs The malware risks to supply chain assets is intense and real; attacks have been seen in the wild at scale Read More
Software Supply Chain Security What are software supply chain attacks? How to protect your software lifecycle ReversingLabs Software supply chains are important new challenge to manage as businesses the world over undergo massive digital... Read More
Threat Research It only takes one line of code to ruin your day Chris Hoff Much like SolarWinds before it, this incident shows we need to take a more critical look at the software we are using... Read More
Software Assurance A CISO’s guide to protecting against modern software threats Chris Hoff How to Rebuild Trust in the SDLC and 3rd Party Software Supply Chain Read More
Threat Research SunBurst: The next level of stealth Tomislav Peričin SolarWinds compromise exploited through sophistication and patience Read More
Threat Research Mining for malicious Ruby gems Tomislav Maljic Typosquatting barrage on RubyGems software repository users Read More
Software Supply Chain Security Why you need to prioritize development and software supply chain security ReversingLabs Enterprise software development graduated from the “waterfall” framework of development and operations Read More
Software Supply Chain Security How to detect software supply chain attacks ReversingLabs There are many reasons software supply chain attacks are attractive to cyber criminals Read More
Software Supply Chain Security How existing cybersecurity frameworks can curb software supply chain attacks ReversingLabs Implement processes and controls to disrupt attackers Read More
Threat Research The NPM package that walked away with all your passwords Tomislav Peričin Detecting malware in package manager repositories Read More
Software Assurance How detecting high-priority malware will accelerate quality app development and release ReversingLabs The malware risks to supply chain assets is intense and real; attacks have been seen in the wild at scale Read More
Software Supply Chain Security What are software supply chain attacks? How to protect your software lifecycle ReversingLabs Software supply chains are important new challenge to manage as businesses the world over undergo massive digital... Read More