Channel Avatar

ReversingLabs @[email protected]

1.4K subscribers - no pronouns :c

ReversingLabs is the trusted name in file and software secur


46:45
6 Reasons to Upgrade from OPSWAT to ReversingLabs
48:50
From Poisoned Pickles to Bad Patches: Unpacking Q1’s Software Supply Chain Threats
50:31
The Developer's Guide to Software Supply Chain Security
01:01:23
EU Regulatory Compliance & SSCS: Navigating the impact of CRA, NIS2, & DORA
59:01
The Year In Software Supply Chain Threats: Insights from RL's Annual 2025 Report
37:54
Securing Your Virtual Machines: The Fastest & Easiest Way to Identify Risk in VMs
02:56
Software Supply Chain Security – Why Now?
03:08
The Critical Need to Address Third-Party Software Risk
50:21
Securing JFrog Artifactory: Find Risky Software in Your Repos
51:13
6 Critical Risks to Identify in Your Software Supply Chain
58:19
The Powerful Alternative to VirusTotal: Why Security Teams Rely on RL
01:03:03
File Analysis & CDR: Forging A Formidable Defense
01:47
nullifAI - Malware Discovered on ML Models Hosted on Hugging Face
54:33
The Fastest MDR Meets the Fastest Threat Intelligence: Why Wirespeed Chose ReversingLabs
31:08
Ghosts in the Network: Uncovering APTs Without Clear Indicators of Compromise
52:59
Threat Research Round-Up | Q4 2024
58:02
Supercharge Threat Modeling with Software Supply Chain Security
36:27
The CISO Survival Guide to Managing Third-Party Software Risk
54:23
The 5 Misconceptions of Software Supply Chain Security
54:19
Don’t Get Walled In By Your Sandbox
36:03
The MLephant in the Room: Malware Detection in ML & LLM Models
48:46
YARA Rules 101: Learn to Write & Use High-Quality Rules for Threat Hunting & Detection
45:19
Static Analysis vs Static Binary Analysis
01:00:54
Secure By Design: Why Trust Matters for Software Risk Management
01:01:14
Lessons from SEC’s Crackdown on Software Transparency
02:43
AdriaScan: Ensuring Software Security for Hotels with Spectra Assure | Customer Testimonial
54:05
AI in the Software Supply Chain: Balancing Innovation & Security in the Age of AI
54:19
Don't Get Walled In By Your Sandbox: See how RL can expand coverage, improve MTTx, & reduce costs.
56:46
Exposing Software Supply Chain Weaknesses: Featuring Guest Speaker IDC
03:20
Crogl: Securing Their Build Pipeline with Spectra Assure | Customer Testimonial
07:07
A Day in the Life: RL's GTM Team
04:41
A Day in the Life: RL's Engineering Team
16:23
Researcher Alon Leviev on Windows Downgrade Attacks
02:03
Spectra Assure for Enterprise Software Buyers
54:09
Software Supply Chain Security 101: Technical Tactics of Supply Chain Compromises
55:46
Do more with your SOAR: Enhancing your SOC with RL Threat Intelligence Enrichment
58:39
Threat Research Round-Up Q3 2024
06:06
SolarWinds: A Path to Excellence in Software Supply Chain Security
01:03:30
Software Supply Chain Security for Dummies: Practical Tips to Improve Software Security Posture
33:59
ConversingLabs Podcast: The Past, Present & Future of SBOMs w/ Beau Woods
58:14
Don't Stop at the SBOM: How to Take Your Software Supply Chain Security to the Next Level
01:14:51
Prevent a SBOM F-Bomb: Streamlining Compliance in Your Software Supply Chain
13:53
RL Book Club: Patrick Wardle, live at #blackhat
57:37
Black Hat 2024 Recap
50:24
Elevate Your Software Supply Chain Security with the latest Gartner® Guidance
34:03
DEMO: Spectra Assure for Software Supply Chain Security
22:28
Find the Safest Dependencies for Your App with Spectra Assure Community
47:55
Insights from OWASP: Future-Proofing SBOMs with CycloneDX
55:37
RL Threat Research Round-Up Q2 2024
54:16
Quarterly Product Review & Roadmap Q2 2024
59:36
From Dev to Deploy: Standing Up A Software Supply Chain Security Program
08:12
Polyfill.io Supply Chain Attack: Explained
39:24
Assess Third-Party Software Risks Sans Source Code
48:59
Managing Commercial Software Risk
01:15:43
Enhancing Software Supply Chain Security with NIST CSF 2.0 | An IT GRC Webinar
57:45
2024 DBIR & Software Supply Chain Risk: A Conversation with Verizon
56:28
The Lessons of Layer 8: Dr. Jessica Barker on The Human Elements Driving Cyber Attacks
52:44
Outpacing VirusTotal: Redefining Trusted Threat Analysis & Intel
58:56
RSAC 2024: Top Leaders Share Top Trends & Takeaways
50:54
Verify Secure Software Releases with Differential Analysis