Discover Security Events in Operations
Receive industry alerts, sponsorship, speaking opportunities, ticket discounts and a lot more!
All security events are automatically streamed into this table on a daily basis.
17 hours from now
The software supply chain is under fire, and let’s be honest, most security tools feel like a chore. The team behind RL's Spectra Assure believes securing your code shouldn't be a "bait and switch" — or a vanity project. We’re throwing a virtual bash to unveil the new tiers of RL software supply chain security tool Spectra Assure — and a massive upgrade to RL's Spectra Assure Community.
Join RL chief software architect Tomislav Pericin and director of product management Dave Ferguson as RL moves beyond "malware of the week" — and show you how we’re giving industrial-grade analysis back to the "little guy".
Whether you're a maintainer protecting your project from hijacking, or an AppSec pro managing complex dependencies, this is your invitation to see how RL has turned deep binary analysis into a first-class citizen for the developer workflow.
What RL is unboxing:
Community level-up: Actionable, real-time insights for 7M+ packages a day—fully customizable and paywall-free.
Binary truth: Why scanning the final compiled package is the only "final check" that matters.
AI vs. AI: How RL is staying ahead of AI-assisted malware authors.
The notification center: How to get alerts before a leaked secret turns into a "stop everything" incident.
Sustainable value: Why Spectra Assure Community's "free forever" tier is a mission, not a hobby
Attendees will receive an attendance certificate to be used towards CPE credits.
1 day from now
AI models and their supporting platforms are becoming a critical attack surface, with threats often embedded directly within model files and artifacts. This webinar explores how malicious code can be hidden in serialized model formats and how attackers exploit these vectors to establish backdoors or exfiltrate data. The session focuses on detecting threats within AI models before they are deployed or distributed.
Attendees will learn how advanced analysis techniques can identify unsafe function calls and hidden malicious behavior without executing code. The discussion also covers protecting model hosting platforms from real world attacks, including prompt injection and malicious inputs across different formats. The webinar provides practical guidance for securing AI development pipelines and ensuring the integrity of models in production environments.
1 week from now
Cyber recovery plans often appear solid until tested during a real incident, when gaps such as failed recoveries, compromised backups, or re-encrypted systems can cause significant operational and financial impact. Ensuring recovery processes work under pressure is critical to maintaining resilience and minimizing downtime.
The event explores approaches to strengthen cyber recovery through isolated testing environments, integrated Active Directory recovery, and streamlined validation and compliance workflows. It also addresses the human side of resilience, highlighting the importance of managing stress and burnout among IT and security teams. Attendees will gain both technical and practical perspectives on improving recovery readiness while supporting team wellbeing.
4 days ago
Manual security approaches are no longer sufficient to address evolving threats and dynamic environments. Combining offensive security techniques with automation and artificial intelligence enables continuous scanning systems that can adapt and respond in real time.
The content focuses on building an adaptive security model that learns from ongoing activity, improves detection, and evolves with emerging risks. It highlights how integrating AI with automated processes can strengthen vulnerability identification and response while reducing manual effort. Attendees will gain a clearer understanding of how continuous, intelligent scanning can enhance security posture and keep pace with modern attack techniques.
4 days ago
Open source ecosystems are under sustained attack, and the tactics are getting more targeted, stealthy, and developer-focused.
In this Threat Research Round-Up, ReversingLabs Threat Researchers break down real-world campaigns uncovered in Q1 2026, including npm packages delivering remote access trojans, malicious VS Code extensions stealing secrets, and NuGet-based attacks targeting financial workflows and developer environments.
Join us for a behind-the-scenes look at how these attacks work, how they evade traditional controls and how your team can leverage Spectra Assure Community like our research team does to detect threats.
Attendees will receive an attendance certificate to be used towards CPE credit.
5 days ago
SAP migrations introduce significant security and operational challenges across every stage of the transition. Risks often remain hidden within legacy systems, custom code, and outdated controls until migration begins, increasing the likelihood of exposure and disruption.
The discussion breaks down the migration journey into three phases: identifying risks before migration, managing performance and security during the transition, and maintaining control after go-live. It highlights challenges such as hybrid complexity, evolving threat exposure, and cloud cost drift. Attendees will gain a structured approach to improving visibility, reducing risk, and maintaining consistent security throughout SAP migration to cloud environments or modern platforms.
5 days ago
The EU Cyber Resilience Act introduces new requirements for vulnerability disclosure and coordinated response, raising expectations for how organizations manage security issues. This webinar explores how to design and implement a compliant vulnerability disclosure program, including establishing clear reporting channels and aligning with regulatory obligations. The session focuses on operationalizing the full vulnerability lifecycle from intake and validation to remediation and public communication.
Attendees will learn how to build scalable processes that support coordinated vulnerability handling and ensure audit ready documentation. The discussion also covers defining support periods, managing security updates, and integrating disclosure workflows across teams. The webinar provides practical guidance on meeting compliance requirements while strengthening vulnerability management and improving overall security governance.
5 days ago
SAP migrations introduce complex operational and security challenges that organizations often underestimate. As environments transition to platforms such as S/4HANA or cloud infrastructure, legacy configurations, custom code, and outdated security controls can expose hidden risks. This webinar examines the SAP migration journey and the security considerations that arise before, during, and after the transition.
The session explores how organizations can identify risks early, manage security exposure during active migration, and maintain control once systems go live. Speakers will discuss challenges such as hybrid environments, shifting performance demands, and evolving security requirements after migration. Attendees will gain a framework for maintaining visibility and reducing operational risk throughout the SAP migration process while preparing for ongoing security and governance needs.
5 days ago
Investigating individuals with limited visible data can be challenging when social media profiles are restricted by privacy settings. Understanding how to navigate these limitations is essential for uncovering relevant information while working from minimal starting points.
Practical techniques are presented for analyzing a person of interest using only a single locked profile. Through real case examples, the content demonstrates methods to uncover additional data and build a broader digital footprint despite restricted access. It highlights how structured OSINT approaches can turn limited visibility into actionable insight when dealing with concealed or partially hidden online identities.
1 week ago
Threat hunting remains one of the most effective ways to proactively identify attacker activity, yet it is often deprioritized due to the demands of reactive security operations. AI is emerging as a way to scale and accelerate hunting efforts while maintaining accuracy and trust.
The content explores how AI can support the creation of hunt packages, execute investigations across security tools, and analyze results by linking events and identifying attack chains. It also addresses the risks associated with using AI in threat hunting and outlines guardrails that security leaders should implement. Attendees will gain a practical framework for applying AI to threat hunting in a controlled and effective way.
1 week ago
Key insights from RSAC 2026 are distilled into a focused discussion on the trends shaping the cybersecurity landscape. Topics include AI trust and verification, software supply chain transparency, and the growing importance of managing risk in commercial software.
The conversation highlights what mattered most from the conference, cutting through the volume of announcements and sessions to focus on practical implications. It explores how organizations can respond to evolving threats, strengthen supply chain security, and prepare for what comes next in the industry. Attendees will gain a clearer view of emerging priorities and how to align their strategies with current and future security challenges.
1 week ago
Enterprises increasingly rely on AI systems built internally, sourced from open-source communities, and delivered through third-party vendors. This webinar examines the security risks across the AI supply chain and explains why organizations need independent verification of the AI and machine learning components running in their environments.
The session explores how to secure AI across three areas: purchased services, internally built models, and production deployments. Topics include gaining visibility into external AI services using SaaSBOM, generating a Machine Learning Bill of Materials to inventory open-source models, and protecting GenAI applications and RAG pipelines from prompt injection and data poisoning. The discussion focuses on improving transparency, strengthening controls, and supporting compliance with emerging regulations such as the EU AI Act.