Tech Library is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.



We have a simple mission: To use our experience and expertise from the security world to provide state of the art solutions for organizations to protect all their digital assets.

Our Website:

Latest Content From ReversingLabs

Whitepaper: TitaniumCloud File Intelligence vs. VirusTotal

by ReversingLabsAug 09, 2019

Security teams have a choice! ReversingLabs offers unequalled file intelligence with more total and more current data along with complete query/post privacy and enterprise class support. ReversingLabs also offers an option VirusTotal cannot — a complete onsite malware analysis solution that combines the industry's authoritative file intelligence database with an on-premises malware analysis and threat hunting platform. If your security team is tired of struggling with the limitations of VirusTotal, it is time to take a look at ReversingLabs.

Whitepaper: The New Threat Intelligence — How Automated Static Analysis Finds the Destructive Objects Existing Solutions Miss

by ReversingLabsAug 09, 2019

Malware continues to increase in sophistication and routinely evades organizations' cyber defenses. It lurks inside networks, often for months, executing or waiting to execute attacks that can cause significant damage. Even though the industry has developed various technologies to bolster detection and response, the situation persists. The 2019 Verizon Data Breach Report results show that the discovery of successful attacks is still measured in months and containment in weeks, meaning average dwell time from compromise to containment remains intolerably high. Organizations must develop new strategies for combatting malware that evades their defenses.

Whitepaper: ReversingLabs Titanium Platform

by ReversingLabsAug 09, 2019

Organizations advancing their business through new digital strategies continue to take on brand, financial and information risks due to the growth of malware infected files and objects sourced from the web, cloud, mobile, and APIs. These advanced and destructive objects are armed to circumvent existing antivirus, EDR, email protection, sandbox and threat intelligence solutions leaving companies blind to threats lurking within their network. This is having an impact on the CISO's ability to achieve top security and business initiatives. Whether it's clearer security metrics focused on high risk threat vectors such as phishing, automating security and SOC operational processes to help fill the security skills gap, enabling the secure migration of apps to more modern architectures, or the acceleration of secure app development to compete in today's digital economy, malware infected objects are the primary issue in mitigating today's attacks.

Whitepaper: The Destructive Objects Playbook

by ReversingLabsAug 09, 2019

Cyberattacks continue to plague organizations worldwide. Many of the largest and most damaging attacks stem from malware-infected files that evade traditional security solutions.

This shows that attackers are at every gate, always trying to get their destructive objects through. It's a growing onslaught that, when successful, causes enormous disruption and damage.

Whitepaper: Strategies for Minimizing Phishing Attack Risks

by ReversingLabsAug 09, 2019

The Phishing Attack Situation

There's no way around it. Sending emails with attachments, downloading web files and using shared folders are a part of how we conduct business and that's not going to change.

To hackers, these online communication modes are like highways into your network and they drive on them every day. It's why these paths are by far the largest source of malware attacks in general, and most important, malware that successfully evades defenses and makes its way inside enterprise networks.

Whitepaper: Can Proactive Threat Hunting Save Your Business?

by ReversingLabsFeb 08, 2019

Despite legacy investments in cybersecurity, businesses remain highly vulnerable to cyber threats. This continues to happen in large part because infosec teams that were originally established to close the gap between off-the-shelf technology and the actual zero-day threats are not sufficiently resourced or properly structured to identify and quarantine unknown malicious content.

Fortunately, recent breakthroughs in cybersecurity technology now empower infosec staff at all skill levels to successfully discover and neutralize these attacks by combining traditional threat hunting approaches with technologies that deliver new advanced malware hunting capabilities.

Research Report: Three New DDE Obfuscation Methods

by ReversingLabsNov 11, 2018

On September 10, 2018, the ReversingLabs Research team, working with other cybersecurity experts from Cisco Talos, uncovered a new spam campaign. The attack is spreading the Adwind 3.0 remote access tool (RAT) targeting Windows,Linux and Mac OSX operating systems. Most of the targets in this campaign are in Turkey, according to data from Cisco's Umbrella cloud security platform. Further research revealed important details about the attack and the forged Microsoft Office documents that the attackers are using.

Whitepaper: Automated Static File Analysis

by ReversingLabsOct 16, 2018

Malware continues to increase in sophistication and routinely evades organizations' cyber defenses. It lurks inside networks, often for months, executing or waiting to execute attacks that can cause significant damage. The industry has developed numerous technologies to bolster detection, but the situation persists. To successfully operationalize these capabilities, new enabling technology is needed.

Whitepaper: How to Build an Effective Threat Hunting Program

by ReversingLabsOct 16, 2018

A common complaint among threat intelligence analysts is the near impossibility of searching global threat intelligence feeds to find the specific threat and vulnerability information that matters to their organization. This complaint is just the tip of the iceberg. The larger, underlying problem facing security teams is the general lack of visibility and context across all internal files and objects that enter and then move about, stay resident, and or leave their corporate environments.

This paper will discuss in detail a path to closing the visibility gap through a unique, new local threat intelligence infrastructure.