Robuta

https://www.reversinglabs.com/blog/npm-security-shai-hulud
While 2FA and trusted publishing will help, you need tools that give visibility into how packages behave — not just who is publishing.
npm securitynewmeasuresstopnext
https://www.reversinglabs.com/energy-utilities-cybersecurity
Enable energy and utility organizations to contend with disruptive cybersecurity threats like ransomware and supply chain vulnerabilities.
critical infrastructureenergyutilitycybersecurityprotect
https://www.reversinglabs.com/blog/fake-recruiter-campaign-crypto-devs
Feb 12, 2026 - A new branch of a well-coordinated fake job recruitment campaign is targeting Javascript and Python developers via social channels.
fakerecruitercampaigntargetscrypto
https://www.reversinglabs.com/blog/faq-shai-hulud-explained
Here's what you need to know about the discovery of the first self-replicating npm worm, which compromised packages with cloud token-stealing malware.
faqshainpmwormattack
https://www.reversinglabs.com/news/the-energy-pipeline-sasa-zdjelar
In this conversation, Saša Zdjelar, Chief Trust Officer at Reversinglabs and former ExxonMobil executive, discusses his extensive experience in cybersecurity,...
software supply chainenergypipelinepodcastsecurity
https://www.reversinglabs.com/manifest-report
New research shows the shortcomings of manifests as a tool for generating SBOMs and their inability to represent the contents of a fully compiled binary.
manifestmisconceptionsgapsscabased
https://www.reversinglabs.com/
Software Supply Chain Security, Threat Intelligence, and Threat Analysis Solutions
software supply chainthreat intelligencesecurityreversinglabs
https://www.reversinglabs.com/oem-partners
Build antimalware and threat intel into your solutions with ReversingLabs SDKs. Get the industry-leading TI and threat analysis.
security solutionstechnology partnersoemreversinglabs
https://bsky.app/profile/reversinglabs.com
ReversingLabs is the trusted name in file and software security. RL - Trust Delivered.
reversinglabscombluesky
https://www.reversinglabs.com/news/cyberscoop-the-dual-reality-of-ai-augmented-development-innovation-and-risk
AI coding is a big security problem when most security teams are still relying on tools designed for a world where human-written code remains prevalent.
cyberscoopdualrealityaiaugmented
https://www.reversinglabs.com/blog/mitre-attck-v18-whats-in-it--and-why-it-matters
Learn what’s been added to the ATT&CK framework — and how you can best operationalize it to advance your organization’s threat detection and response.
mitreattampck
https://www.reversinglabs.com/blog/powershell-gallery-simplify-sscs-attacks
The automation tool's Install-Module command presents threat actors with one key link in the kill chain of a possible attack.
supply chain attackspowershellgalleryreversinglabs
https://www.reversinglabs.com/customers
Explore ReversingLabs' case studies to see how our advanced threat intelligence and software supply chain security solutions protect organizations...
case studiesreversinglabs
https://www.reversinglabs.com/news/information-security-buzz-commercial-softwares-seven-deadly-sins
At ReversingLabs, we’ve identified seven critical risks that plague commercial software, or what we call Commercial Software’s Seven Deadly Sins.
seven deadly sinsinformation securitybuzzcommercialreversinglabs
https://www.reversinglabs.com/blog/ai-vulnerability-reporting-fails
Google and others are inundating development teams with AI-powered reporting. Are AI-enabled fixes the answer? 
vulnerability reportingaiossreversinglabs
https://www.reversinglabs.com/software-package-deconstruction-series
Join ReversingLabs as we deconstruct and analyze software packages using the most advanced software supply chain tools available.
softwarepackagedeconstructionseriesreversinglabs
https://www.reversinglabs.com/high-tech-cybersecurity
Protect High Tech organizations from ransomware, breaches, malware and threats with proactive cybersecurity solutions.
high techcybersecurityreversinglabs
https://www.reversinglabs.com/blog/shai-hulud-worm-npm
RL researchers detected the first self-replicating worm that compromised npm packages with cloud token-stealing malware. Here's what you need to know.
supply chain attackshainpmneed
https://www.reversinglabs.com/blog/ctem-advances-vulnerability-management
The Continuous Threat Exposure Management model represents an evolution from CVSS. Here’s what you need to know.
vulnerability managementgartnerctemadvancesreversinglabs
https://www.reversinglabs.com/healthcare-cybersecurity
Protect healthcare devices, patient data, and critical systems from ransomware, breaches, and cyber threats with proactive cybersecurity solutions.
healthcare cybersecuritypatient dataprotectdevicesamp
https://www.reversinglabs.com/products/software-supply-chain-security-virtual-tour-safe
Software Supply Chain Security, Threat Intelligence, and Threat Analysis Solutions
virtual tourspectraassurereversinglabs
https://www.reversinglabs.com/blog/bootstrap-script-exposes-pypi-to-domain-takeover-attack
Proving the road to takeover is paved with setuptools alternatives, the script for a popular Python package for building and installing PyPI packages leaves...
bootstrapscriptexposespypidomain
https://www.reversinglabs.com/products/software-supply-chain-security
Spectra Assure for software supply chain security provides enterprise software developers with early and actionable feedback on risks like malware, tampering,...
software supply chainsecurityspectraassurereversinglabs
https://www.reversinglabs.com/blog/owasp-top-10-supply-chain-risk
The Open Worldwide Application Security Project’s widely used AppSec priority list is expanding to cover systemic risk to software security.
software supply chainowasptoptakesrisk
https://www.reversinglabs.com/conversinglabs
Check out ConversingLabs: a live and on-demand podcast series about threats, detection, and cyber defense.
podcastreversinglabs
https://www.reversinglabs.com/blog/ai-coding-velocity-risk
AI is producing code up to four times faster — but with 10 times more AppSec lapses. Here’s what you need to know.
airampingcodingvelocityrisk
https://www.reversinglabs.com/public-sector-cybersecurity
Protect public sector organizations from ransomware, breaches, and cyber threats with proactive cybersecurity solutions.
public sectormission criticalcybersecurityprotectsystems
https://www.reversinglabs.com/gartner-market-guide-to-software-supply-chain-security
See what product and application security teams need to know to protect against software supply chain compromises.
software supply chainmarket guidesecurityreversinglabs
https://www.reversinglabs.com/resources/subscribe-to-our-newsletter
Subscribe to ReversingLabs’ weekly newsletter for curated security news, expert analysis, and actionable insights on software supply chain security,...
expert insightsreversinglabsweeklycybersecuritynewsletter
https://www.reversinglabs.com/news/techradar-new-attacks-exploit-vscode-extensions-and-npm-packages
Developers targeted by malicious Microsoft VSCode extensions
npm packagestechradarnewattacksexploit
https://www.reversinglabs.com/blog/ai-security-tool-key-exposures
Risk Rubric provides assessments for LLM transparency, reliability, security and more. But it’s only one tool in a comprehensive security tool box.
ai securitynewtoollayskey
https://www.reversinglabs.com/products
Software Supply Chain Security, Threat Intelligence, and Threat Analysis Solutions
productsreversinglabs
https://docs.secure.software/policies/threat-hunting/TH15502
reversinglabsspectraassuredocumentation
https://www.reversinglabs.com/webinar/spectra-assure-for-software-supply-chain-security-product-demo
Get a look at what Spectra Assure can do to secure the software supply chain for both software producers and procurement teams.
product demospectraassurereversinglabs
https://www.reversinglabs.com/resources/the-buyers-guide-to-software-supply-chain-security
Modernize your AppSec for the new era of software supply chain security: A Guide for Software Producers & Buyers
software supply chainguidesecurityreversinglabs
https://www.reversinglabs.com/news/reversinglabs-ceo-provides-insights-into-dnc-hacks
Multi-layered payloads can yield clues to hacker identity and intentions when successfully unpacked and analyzed.
reversinglabsceoprovidesinsightsdnc
https://www.reversinglabs.com/blog/software-quality-collapse-ai-accelerate
Development is in freefall toward software entropy and insecurity. Can spec-driven development help?
software qualitycollapseaiacceleratingdecline
https://www.reversinglabs.com/blog/author/ericka-chickowski
Software Supply Chain Security, Threat Intelligence, and Threat Analysis Solutions
reversinglabs
https://www.reversinglabs.com/blog/yara-rules-macos-malware-hunting
With a constantly evolving OSX malware domain, it is important to write clear, specific, and accurate YARA rules. Here's how.
macos malwareevaluatingyararuleshunting
https://www.reversinglabs.com/blog/vet-powershell-modules-spectra-assure-community
PowerShell's broad use and open access make it an attractive target for supply chain attacks. Here's how Spectra Assure Community can help.
vetpowershellmodulesspectraassure
https://www.reversinglabs.com/blog/vibe-coding-controls-critical
Vibe coding is not going away — and the threat is real. But are developer tools like VibeSec that shift controls left up to the job?
security controlsvibe codingcorecriticalreversinglabs