⚠️ New research shows that #AIcoding tools can turn IDEs into privileged #InsiderThreats. 🛡️ That is a game changer for application security. Here’s what your #AppSec team needs to know — and what to do next👇 https://hubs.ly/Q0493TMB0 #IDEsaster #ApplicationSecurity
ReversingLabs
Computer and Network Security
Cambridge, Massachusetts 53,095 followers
ReversingLabs is the trusted name in file and software security. RL - Trust Delivered.
About us
ReversingLabs is the trusted name in file and software security. We provide the modern cybersecurity platform to verify and deliver safe binaries. Trusted by the Fortune 500 and leading cybersecurity vendors, the ReversingLabs Spectra Core powers the software supply chain and file security insights, tracking over 40 billion searchable files daily with the ability to deconstruct full software binaries in seconds to minutes. Only ReversingLabs provides that final exam to determine whether a single file or full software binary presents a risk to your organization and your customers. RL - Trust Delivered.
- Website
-
http://www.reversinglabs.com
External link for ReversingLabs
- Industry
- Computer and Network Security
- Company size
- 201-500 employees
- Headquarters
- Cambridge, Massachusetts
- Type
- Privately Held
- Founded
- 2009
- Specialties
- Cyber security, Reverse engineering, Cyber threats, APT, Malware, Threat intelligence, Malicious code, Static analysis, Threat detection, Computer forensics, Malware detection, Cyber forensics, File reputation, Predictive detection, Malware Lab, Application Security, Software Supply Chain Security, Container Security, DevSecOps, DevOps, InfoSec, and Information Security
Locations
-
Primary
Get directions
222 3rd St
unit 1101
Cambridge, Massachusetts 02142, US
Employees at ReversingLabs
Updates
-
🚨 RL Research Alert! Look out for the compromised versions 1.14.1 and 0.30.4 of axios npm package with almost 11 billion downloads. https://lnkd.in/dZS8pREx The compromise spread to PyPI and NuGet ecosystem through usage of JSII modules inside versions 0.0.194 of the jjrawlins-cdk-iam-policy-builder-helper packages. Packages depend on compromised versions of axios npm package. https://lnkd.in/dNiRturE https://lnkd.in/dQCuHHr5
-
A little look into our quarterly Lunch & Learn 🍽️ Twice a month, we come together for company lunches — and once a quarter, one of those lunches turns into something extra: a Lunch & Learn roundtable. It’s a chance to step away from the day-to-day, exchange ideas across teams, and have meaningful conversations about the things that help us build, collaborate, and grow. This quarter, we explored: 🐳 Development on Kubernetes 💬 The Manager’s Perspective: Why Feedback Matters 📈 How to Scale Teams and Keep Productivity 📝 From Customer Need to a Clear User Story ✅ Code Reviews: Best Practices What makes these sessions especially valuable is the range of perspectives in the room — different roles, different experiences, and plenty of thoughtful discussion. And of course, good lunch never hurts. 🙂 #LunchAndLearn #TeamCulture #KnowledgeSharing
-
-
⚠️ Rethink your data security pipeline 👇 🔍 To get real application-layer visibility, security teams need to decouple SIEM data from legacy workflows — and build pipelines that actually support modern software supply chain security. 📖 Learn more: https://hubs.ly/Q048LMJ70 #AppSec #SoftwareSupplyChainSecurity #Cybersecurity #ThreatDetection #SecurityOperations
-
ReversingLabs reposted this
This week: The TeamPCP campaign has expanded to the popular LiteLLM package used by AI devs. Plus: Malicious npm packages deploy a RAT via fake install logs.
-
ReversingLabs reposted this
Thank you Marshall University and #cybercon2026 for an incredible cybersecurity conference. From operationalizing defense and readiness to understanding the adversary through data; the talks were incredibly useful and it was a priveledge to contribute to the conversations. ReversingLabs #federal #cybersecurity #ai #ml #llm #ATO #malwareforensics #threathunting
-
-
🚨 RL Research Alert! Look out for compromised versions 4.87.1 and 4.87.2 of telnyx PyPI package with more than 3.75 million downloads. https://lnkd.in/d9GF3y_S It is the latest victim in the ongoing TeamPCP supply chain campaign. Previous victims include Trivy, Checkmarx and LiteLLM. Ultimate goal is exfiltration of cloud secrets like observed in previous attacks. Malicious code is added to telnyx/_client.py file. New C2 server is 83[.]142.209.203
-
That’s a wrap. It’s been great, #RSAC2026 ✅ 🙏 A huge thank you to RL’s incredible team for making it all happen, to RSAC for hosting — and to everyone who stopped by #RSAC Booth #4328. 🤝 We loved the conversations, connections — and shared insights about securing software. 👋 Until next year, stay SAFE. https://hubs.ly/Q048tDYY0 #SoftwareSupplyChainSecurity #ThreatIntelligence
-