- 225
- 190 291
ReversingLabs
United States
เข้าร่วมเมื่อ 26 ก.ย. 2008
ReversingLabs is the trusted name in file and software security. We provide the modern cybersecurity platform to verify and deliver safe binaries. Trusted by the Fortune 500 and leading cybersecurity vendors, the ReversingLabs Spectra Core powers the software supply chain and file security insights, tracking over 40 billion searchable files daily with the ability to deconstruct full software binaries in seconds to minutes. Only ReversingLabs provides that final exam to determine whether a single file or full software binary presents a risk to your organization and your customers.
RL - Trust Delivered.
Subscribe to our channel and start #LearningWithReversingLabs!
RL - Trust Delivered.
Subscribe to our channel and start #LearningWithReversingLabs!
The Fastest MDR Meets the Fastest Threat Intelligence: Why Wirespeed Chose ReversingLabs
As the fastest MDR in the world, Wirespeed CEO Tim MalcomVetter needed to ensure he had the proper tooling to best support his customers.
In this webinar, Tim will discuss his in-depth analysis of various file reputation technologies and their critical role in cybersecurity.
Learn why Wirespeed chose ReversingLabs Spectra Intelligence over other vendors so they could respond to and contain security threats in seconds.
Key Discussion Points
✓ Understanding File Reputation: What it is and how it helps detect security threats.
✓ Wirespeed's Journey: Insights from Wirespeed's six-week deep dive into file reputation solutions.
✓ Vendor Comparisons: An unbiased look at the competitors like VirusTotal, MetaDefender, and more.
✓ Why ReversingLabs?: Key reasons Wirespeed selected ReversingLabs Spectra Intelligence.
About RL:
ReversingLabs is the trusted name in file and software security, to verify and deliver safe binaries. With the largest Threat Repository in the industry with over 40 billion searchable files, the Fortune 500 trusts their software supply chain security and malware analysis with ReversingLabs. Learn more: www.reversinglabs.com/
RL - Trust Delivered.
Be sure to subscribe to RL and follow us on social media →
reversinglabs
www.linkedin.com/company/reversinglabs
reversinglabs
reversinglabs
In this webinar, Tim will discuss his in-depth analysis of various file reputation technologies and their critical role in cybersecurity.
Learn why Wirespeed chose ReversingLabs Spectra Intelligence over other vendors so they could respond to and contain security threats in seconds.
Key Discussion Points
✓ Understanding File Reputation: What it is and how it helps detect security threats.
✓ Wirespeed's Journey: Insights from Wirespeed's six-week deep dive into file reputation solutions.
✓ Vendor Comparisons: An unbiased look at the competitors like VirusTotal, MetaDefender, and more.
✓ Why ReversingLabs?: Key reasons Wirespeed selected ReversingLabs Spectra Intelligence.
About RL:
ReversingLabs is the trusted name in file and software security, to verify and deliver safe binaries. With the largest Threat Repository in the industry with over 40 billion searchable files, the Fortune 500 trusts their software supply chain security and malware analysis with ReversingLabs. Learn more: www.reversinglabs.com/
RL - Trust Delivered.
Be sure to subscribe to RL and follow us on social media →
reversinglabs
www.linkedin.com/company/reversinglabs
reversinglabs
reversinglabs
มุมมอง: 11
วีดีโอ
Ghosts in the Network: Uncovering APTs Without Clear Indicators of Compromise
มุมมอง 11921 ชั่วโมงที่ผ่านมา
This session, originally presented as part of the SANs Fall CyberFest Virtual Summit, will explore the technical intricacies of detecting targeted malware in APTs and proven methods and mitigation strategies to combat these threats. About RL: ReversingLabs is the trusted name in file and software security, to verify and deliver safe binaries. With the largest Threat Repository in the industry w...
Threat Research Round-Up | Q4 2024
มุมมอง 1114 วันที่ผ่านมา
As we enter 2025, cyber threats to the software supply chain continue to evolve, exploiting popular platforms and tools to infiltrate systems and disrupt workflows. In this Q4 threat research roundup, threat research experts from ReversingLabs dissect the most significant findings of Q4 2024, including: ✓ Malicious PyPI packages, such as aiocpa that pose as legitimate applications for months, b...
Supercharge Threat Modeling with Software Supply Chain Security
มุมมอง 714 วันที่ผ่านมา
The better the data, the better the threat modeling. That’s where modern software supply chain security (SSCS) comes in. With deep insights delivered by complex binary analysis, your team can leverage data that goes well beyond traditional application security testing (AST) tools and software composition analysis (SCA) to foil your next compromise. Chris Romeo, co-founder and CEO of the threat ...
The CISO Survival Guide to Managing Third-Party Software Risk
มุมมอง 714 วันที่ผ่านมา
Modern businesses run on a tapestry of commercial off-the-shelf (COTS) software provided by third-party vendors. Despite mature practices for securing internally-developed software, third-party software risk management (TPSRM) remains a nebulous function that lacks proper ownership and scalable methods. In this session, we’ll dive into the people, process and technology needed to build a scalab...
The 5 Misconceptions of Software Supply Chain Security
มุมมอง 314 วันที่ผ่านมา
Software supply chain security (SSCS) is an increasingly complex endeavor. Threat actors bypass the defenses of the most well equipped organizations by taking advantage of the fact that they’re rapidly consuming more software from more vendors than ever before. At the same time, software producers unknowingly publish unsafe software, as the combination of propriety, commercial, and open source ...
Don’t Get Walled In By Your Sandbox
มุมมอง 514 วันที่ผ่านมา
See how RL can expand coverage, improve MTTx, & reduce costs. ReversingLabs provides a next-generation, advanced malware analysis solution that combines the power of binary-level static and dynamic analysis. Our proprietary, high-speed recursive binary analysis engine and optimized dynamic analysis capabilities offer superior file coverage and size handling compared to traditional sandboxes. An...
The MLephant in the Room: Malware Detection in ML & LLM Models
มุมมอง 2114 วันที่ผ่านมา
As the demand for AI capabilities grows, LLMs and other ML models are increasingly included in the software that we develop and consume. Of particular note are Pickle files, which represent 83.5% of all ML models. Their popularity has attracted the eye of threat actors and has become a new attack vector of choice. To help businesses stay ahead of the threat, ReversingLabs has developed the abil...
YARA Rules 101: Learn to Write & Use High-Quality Rules for Threat Hunting & Detection
มุมมอง 5814 วันที่ผ่านมา
ReversingLabs has not only been perfecting a suite of threat intelligence, detection and analysis products for 15 years - our experts have also been identifying key threats in the wild and creating open-source YARA rules to spot them which are then added to GitHub. Only rules that meet the strictest of criteria are considered for RL’s GitHub for anyone in the community to use. In this webinar, ...
Static Analysis vs Static Binary Analysis
มุมมอง 914 วันที่ผ่านมา
The Future of Complex Code Deconstruction In the modern enterprise, the tools used to evaluate complex software packages, identifying risks and threats, are more critical than ever. In this webinar, we will discuss the evolution of static analysis to binary analysis, highlighting this technology’s significance in threat analysis of complex software packages. This webinar aims to provide an unde...
Secure By Design: Why Trust Matters for Software Risk Management
มุมมอง 814 วันที่ผ่านมา
Secure by Design is the biggest single thrust in the federal government's efforts to change the game on software risk, with the clear goal of shifting liability to software producers for supply chain security. But there's a big problem: Even if best practices are used, the application security tools gap, as noted in the ReversingLabs Software Supply Chain Risk Report, is leaving organizations e...
Lessons from SEC’s Crackdown on Software Transparency
มุมมอง 7หลายเดือนก่อน
The SEC recently filed suit against four companies affected by the attack on SolarWinds. David Hirsch, a former SEC Enforcement Officer, Saša Zdjelar, former senior executive at ExxonMobil and Salesforce and now Chief Trust Officer for ReversingLabs, and moderator Paul Roberts, sat down for a discussion about the lessons from these actions on public companies, and what it means for everyone els...
AdriaScan: Ensuring Software Security for Hotels with Spectra Assure | Customer Testimonial
มุมมอง 68หลายเดือนก่อน
“We analyze our builds with Spectra Assure to check for any potential risk. It serves as a critical checkpoint or build exam before we ship our product to customers,” said Boris Antonić, CEO and Co-Founder of AdriaScan. Discover how AdriaScan, a global leader in hotel software solutions, leverages Spectra Assure™ to secure their software supply chain, providing secure software to their customer...
AI in the Software Supply Chain: Balancing Innovation & Security in the Age of AI
มุมมอง 8หลายเดือนก่อน
Generative AI, LLMs, and open source machine learning models provide a competitive edge for development teams and enterprises at large. Gartner has predicted that by 2025, 70% of enterprises will have operationalized AI architectures. However, with this adoption comes novel threat vectors within the software supply chain, affecting both software producers and enterprise software buyers. Our gue...
Don't Get Walled In By Your Sandbox: See how RL can expand coverage, improve MTTx, & reduce costs.
มุมมอง 5หลายเดือนก่อน
ReversingLabs provides a next-generation, advanced malware analysis solution that combines the power of binary-level static and dynamic analysis. Our proprietary, high-speed recursive binary analysis engine and optimized dynamic analysis capabilities offer superior file coverage and size handling compared to traditional sandboxes. And, our AI-driven, multi-factor threat classification delivers ...
Exposing Software Supply Chain Weaknesses: Featuring Guest Speaker IDC
มุมมอง 12หลายเดือนก่อน
Exposing Software Supply Chain Weaknesses: Featuring Guest Speaker IDC
Crogl: Securing Their Build Pipeline with Spectra Assure | Customer Testimonial
มุมมอง 176หลายเดือนก่อน
Crogl: Securing Their Build Pipeline with Spectra Assure | Customer Testimonial
A Day in the Life: RL's Engineering Team
มุมมอง 98หลายเดือนก่อน
A Day in the Life: RL's Engineering Team
Researcher Alon Leviev on Windows Downgrade Attacks
มุมมอง 932 หลายเดือนก่อน
Researcher Alon Leviev on Windows Downgrade Attacks
Spectra Assure for Enterprise Software Buyers
มุมมอง 1003 หลายเดือนก่อน
Spectra Assure for Enterprise Software Buyers
Software Supply Chain Security 101: Technical Tactics of Supply Chain Compromises
มุมมอง 493 หลายเดือนก่อน
Software Supply Chain Security 101: Technical Tactics of Supply Chain Compromises
Do more with your SOAR: Enhancing your SOC with RL Threat Intelligence Enrichment
มุมมอง 183 หลายเดือนก่อน
Do more with your SOAR: Enhancing your SOC with RL Threat Intelligence Enrichment
SolarWinds: A Path to Excellence in Software Supply Chain Security
มุมมอง 78K4 หลายเดือนก่อน
SolarWinds: A Path to Excellence in Software Supply Chain Security
Software Supply Chain Security for Dummies: Practical Tips to Improve Software Security Posture
มุมมอง 784 หลายเดือนก่อน
Software Supply Chain Security for Dummies: Practical Tips to Improve Software Security Posture
ConversingLabs Podcast: The Past, Present & Future of SBOMs w/ Beau Woods
มุมมอง 84 หลายเดือนก่อน
ConversingLabs Podcast: The Past, Present & Future of SBOMs w/ Beau Woods
Don't Stop at the SBOM: How to Take Your Software Supply Chain Security to the Next Level
มุมมอง 1525 หลายเดือนก่อน
Don't Stop at the SBOM: How to Take Your Software Supply Chain Security to the Next Level
Prevent a SBOM F-Bomb: Streamlining Compliance in Your Software Supply Chain
มุมมอง 295 หลายเดือนก่อน
Prevent a SBOM F-Bomb: Streamlining Compliance in Your Software Supply Chain
RL Book Club: Patrick Wardle, live at #blackhat
มุมมอง 5415 หลายเดือนก่อน
RL Book Club: Patrick Wardle, live at #blackhat
Thanks for the analysis! Just a quick off-topic question: I have a SafePal wallet with USDT, and I have the seed phrase. (alarm fetch churn bridge exercise tape speak race clerk couch crater letter). Could you explain how to move them to Binance?
promo sm
Thank you
Love the quick sound bytes! Great work here Matt.
What's the best way of choosing which mustache style to grow? Eeny Meeny Miney Mo.
Promo sm 🌟
Wait this has nothing to do with Analyze Phish...
Great analysis, and exposing the elephants in the room - nothing profound, innovative, and enforcement.
👀 *Promosm*
Good question relating to how to create Yara rules, unfortunately,. the answer did not really provide a direct answer. Perhaps it would help many cyber security on hunting by creating another episode that talks about Yara specifically.
Your sound is bad
ᑭᖇOᗰOᔕᗰ 😍
Can you help me how to trace the phishing site owner or who created the site.
How is the mic so bad but the camera so good
Tomislav, can you do a file analysis using Yara. Thanks man.
what is that tool name and from where can i get that ?
Are you referring to the A1000 platform.?
@@phillyshotyeh
Nice
Super Clearly explained.
Someone told me "Yara rules can also be used to convert a big data set in the form of clusters in machine learning " and it has a different use at different platforms. Is it true?
YARA is incredibly flexible so you probably could. Outside of security, it's been used for parsing scientific data and as a homegrown DLP solution.
I love this Guy explanation method ... Very cool man...
i agree
I love his way of explanation...
It's ok But If u do some real/practical exercise then it's very very easy to understand. This method/approach is also good But Practical knowledge is much more better than theory. Thanks for the video...
*Thanks to @eazyhack19 on telegram he got me 6btc*
Who created the music for this?!
Hi Nick! The author of the music we used for this video is SonicCube.
@@ReversingLabs thanks for replying! Sweet, a new artist for me to explore!
Perfect!
greetings :)
I'm proud to be a ReversingLabs family member! :)
We're proud to have you on our team, Franjo!
Zakon :D