Threats

RL SSCSR Feature Image

Report: Epidemic of Flaws in Commercial and Open Source Code

ReversingLabs’ 2025 Software Supply Chain Security Report finds that security flaws in commercial and open source code are epidemic as hackers target supply chains including those for cryptocurrency and AI in a play for access to sensitive data and IT assets.

A Subaru being remotely unlocked following a hack of the owner's STARLINK account. (Image courtesy of Sam Curry)

More Of The Shame: Software Flaw Exposes Millions of Subarus, Rivers of Driver Data

A now-patched flaw in Subaru’s STARLINK connected vehicle service exposed location information and driver data for millions of vehicles with nothing more than the vehicle’s license plate number – the latest jaw dropping smart vehicle security flaw discovered by the researcher Sam Curry.

Image man holding shield with checkmark.

Security Validation: A Deep Dive with Cymulate’s David Kellerman

In this Spotlight episode, host Paul Roberts speaks with David Kellerman, the Field CTO at Cymulate, about the growing demand for security validation technology, like Cymulate’s, as organizations struggle to assess the utility and effectiveness of their security investments.

China hacking

Pacific Rim: Sophos’ 6 Year Battle To Beat Back China State Hackers

Host Paul Roberts interviews Sophos CISO Ross McKerchar about the company’s recent report, Pacific Rim, detailing its multi-year battle to beat back a sophisticated Chinese hacking campaign.

A cyber investigator

Report Finds Lack of Talent, Tools Frustrates Cyber Investigations

Firms face challenges in combating sophisticated cyber attacks due to a shortage of skilled workers and complex, costly investigative tools. A report by Command Zero highlights the acute need for cybersecurity talent, especially for cloud platforms. Organizations struggle with tool integration and lack standardized processes, complicating cyber investigations. Command Zero recommends adopting unified platforms and enhancing automation.