RL;DR: GobRAT YARA rule, OSS security guidance, go beyond CVEs
Welcome to the latest edition of RL;DR, a weekly newsletter that highlights the latest content from RL Blog, including threat research, thought leadership, best practices, product and solution updates – and more.
This week: RL published a new open-source YARA rule for GobRAT. Also: OpenSSF boosts OSS security guidelines, and why you need to think beyond vulnerabilities for your AppSec.
Security Alert
New RL YARA Rule: GobRAT
RL threat analysts have written an open-source YARA rule for GobRAT, a malicious backdoor that infects publicly exposed routers to gather machine information, execute a reverse shell, and perform distributed denial of service (DDoS) attacks.
Access and use this YARA rule via RL’s GitHub page here.
Keep Learning with RL Blog
OpenSSF guidelines encourage OSS devs to build securely
The Open Source Secure Baseline provides a framework for securing OSS development — but it could breed complacency. Learn about the new guidelines designed to bolster the security posture of OSS projects, featuring expert insights from Ben Cotton , Stacey Potter , Michael McGuire , and Jason Soroko . (Read More)
CVEs lose relevance: Think beyond vulnerabilities
More cracks in the NVD emerge, making the CVE system less useful. Shift your approach to keep up with software risk. (Read More)
Recommended by LinkedIn
Malicious Python packages target popular Bitcoin library
RL researchers detected two Python libraries that are designed to steal sensitive data while posing as fixes for a popular cryptocurrency library. (Read More)
Get more insights and practical knowledge at RL Blog.
Stay Informed with Insightful Conversation
Webinar | Secure Your Virtual Machines
Wednesday, April 9 at 12pm ET
Virtual Machines (VMs) are foundational to modern enterprise IT, but they can become blind spots for threats, exposing organizations to malware, vulnerabilities, supply chain risks, and compliance gaps. Learn more in this upcoming webinar. (Save Your Seat)
Webinar | EU Regulatory Compliance in the Supply Chain
Thursday, April 10 at 9:30am ET
The EU is rolling out major regulations — CRA, NIS2, and DORA — to strengthen software supply chain security and third-party risk management. Join this webinar to learn how to not only achieve compliance, but also proactively detect and mitigate software supply chain threats. (Save Your Seat)
Podcast | ConversingLabs: Cybersecurity’s Double-Edged Sword
RL chatted with Malcolm Harkins, chief security and trust officer at HiddenLayer, to discuss why artificial intelligence (AI) is cybersecurity’s double-edged sword. Stream it now wherever you listen to your podcasts, or watch it here.