https://www.reversinglabs.com/blog/npm-security-shai-hulud
While 2FA and trusted publishing will help, you need tools that give visibility into how packages behave — not just who is publishing.
npm securitynewmeasuresstopnext
https://www.reversinglabs.com/blog/fake-recruiter-campaign-crypto-devs
Feb 12, 2026 - A new branch of a well-coordinated fake job recruitment campaign is targeting Javascript and Python developers via social channels.
fakerecruitercampaigntargetscrypto
https://www.reversinglabs.com/blog/faq-shai-hulud-explained
Here's what you need to know about the discovery of the first self-replicating npm worm, which compromised packages with cloud token-stealing malware.
faqshainpmwormattack
https://www.reversinglabs.com/news/the-energy-pipeline-sasa-zdjelar
In this conversation, Saša Zdjelar, Chief Trust Officer at Reversinglabs and former ExxonMobil executive, discusses his extensive experience in cybersecurity,...
software supply chainenergypipelinepodcastsecurity
https://www.reversinglabs.com/manifest-report
New research shows the shortcomings of manifests as a tool for generating SBOMs and their inability to represent the contents of a fully compiled binary.
manifestmisconceptionsgapsscabased
https://bsky.app/profile/reversinglabs.com
ReversingLabs is the trusted name in file and software security. RL - Trust Delivered.
reversinglabscombluesky
https://www.reversinglabs.com/news/cyberscoop-the-dual-reality-of-ai-augmented-development-innovation-and-risk
AI coding is a big security problem when most security teams are still relying on tools designed for a world where human-written code remains prevalent.
cyberscoopdualrealityaiaugmented
https://www.reversinglabs.com/blog/mitre-attck-v18-whats-in-it--and-why-it-matters
Learn what’s been added to the ATT&CK framework — and how you can best operationalize it to advance your organization’s threat detection and response.
mitreattampck
https://www.reversinglabs.com/blog/powershell-gallery-simplify-sscs-attacks
The automation tool's Install-Module command presents threat actors with one key link in the kill chain of a possible attack.
supply chain attackspowershellgalleryreversinglabs
https://www.reversinglabs.com/customers
Explore ReversingLabs' case studies to see how our advanced threat intelligence and software supply chain security solutions protect organizations...
case studiesreversinglabs
https://www.reversinglabs.com/blog/ai-vulnerability-reporting-fails
Google and others are inundating development teams with AI-powered reporting. Are AI-enabled fixes the answer?
vulnerability reportingaiossreversinglabs
https://www.reversinglabs.com/software-package-deconstruction-series
Join ReversingLabs as we deconstruct and analyze software packages using the most advanced software supply chain tools available.
softwarepackagedeconstructionseriesreversinglabs
https://www.reversinglabs.com/high-tech-cybersecurity
Protect High Tech organizations from ransomware, breaches, malware and threats with proactive cybersecurity solutions.
high techcybersecurityreversinglabs
https://www.reversinglabs.com/blog/shai-hulud-worm-npm
RL researchers detected the first self-replicating worm that compromised npm packages with cloud token-stealing malware. Here's what you need to know.
supply chain attackshainpmneed
https://www.reversinglabs.com/products/software-supply-chain-security-virtual-tour-safe
Software Supply Chain Security, Threat Intelligence, and Threat Analysis Solutions
virtual tourspectraassurereversinglabs
https://www.reversinglabs.com/blog/bootstrap-script-exposes-pypi-to-domain-takeover-attack
Proving the road to takeover is paved with setuptools alternatives, the script for a popular Python package for building and installing PyPI packages leaves...
bootstrapscriptexposespypidomain
https://www.reversinglabs.com/products/software-supply-chain-security
Spectra Assure for software supply chain security provides enterprise software developers with early and actionable feedback on risks like malware, tampering,...
software supply chainsecurityspectraassurereversinglabs
https://www.reversinglabs.com/blog/owasp-top-10-supply-chain-risk
The Open Worldwide Application Security Project’s widely used AppSec priority list is expanding to cover systemic risk to software security.
software supply chainowasptoptakesrisk
https://www.reversinglabs.com/conversinglabs
Check out ConversingLabs: a live and on-demand podcast series about threats, detection, and cyber defense.
podcastreversinglabs
https://www.reversinglabs.com/blog/ai-coding-velocity-risk
AI is producing code up to four times faster — but with 10 times more AppSec lapses. Here’s what you need to know.
airampingcodingvelocityrisk
https://www.reversinglabs.com/news/techradar-new-attacks-exploit-vscode-extensions-and-npm-packages
Developers targeted by malicious Microsoft VSCode extensions
npm packagestechradarnewattacksexploit
https://www.reversinglabs.com/blog/ai-security-tool-key-exposures
Risk Rubric provides assessments for LLM transparency, reliability, security and more. But it’s only one tool in a comprehensive security tool box.
ai securitynewtoollayskey
https://www.reversinglabs.com/products
Software Supply Chain Security, Threat Intelligence, and Threat Analysis Solutions
productsreversinglabs
https://www.reversinglabs.com/webinar/spectra-assure-for-software-supply-chain-security-product-demo
Get a look at what Spectra Assure can do to secure the software supply chain for both software producers and procurement teams.
product demospectraassurereversinglabs
https://www.reversinglabs.com/resources/the-buyers-guide-to-software-supply-chain-security
Modernize your AppSec for the new era of software supply chain security: A Guide for Software Producers & Buyers
software supply chainguidesecurityreversinglabs
https://www.reversinglabs.com/news/reversinglabs-ceo-provides-insights-into-dnc-hacks
Multi-layered payloads can yield clues to hacker identity and intentions when successfully unpacked and analyzed.
reversinglabsceoprovidesinsightsdnc
https://www.reversinglabs.com/blog/author/ericka-chickowski
Software Supply Chain Security, Threat Intelligence, and Threat Analysis Solutions
reversinglabs
https://www.reversinglabs.com/blog/yara-rules-macos-malware-hunting
With a constantly evolving OSX malware domain, it is important to write clear, specific, and accurate YARA rules. Here's how.
macos malwareevaluatingyararuleshunting
https://www.reversinglabs.com/blog/vet-powershell-modules-spectra-assure-community
PowerShell's broad use and open access make it an attractive target for supply chain attacks. Here's how Spectra Assure Community can help.
vetpowershellmodulesspectraassure