Skip to main content

15 docs tagged with "concepts"

View all tags

Certificate Revocation

Learn how ReversingLabs tracks and adjusts certificate revocation dates, and how this affects sample classification and search results.

Classification

Explains ReversingLabs' classification algorithm, detailing how files are categorized into four groups: no threats found, known (goodware), suspicious, and malicious. Explains the concept of risk scores, which represent the trustworthiness or malicious severity of a sample.

File Analysis Approaches

Compare file analysis approaches: hash reputation lookup, full static analysis, and sandbox execution. Understand speed and depth tradeoffs and which ReversingLabs products use each approach.

Glossary

Definitions of key terms, concepts, and product names used across ReversingLabs documentation and threat intelligence workflows.

Privacy & Data Sharing

Details ReversingLabs' approach to data privacy, including policies and practices implemented to protect user information and ensure compliance with relevant regulations.

ReversingLabs malware naming standard

Outlines the standardized naming conventions used by ReversingLabs to identify and classify malware, ensuring consistency and clarity in threat reporting.

Static Analysis Rescans

Understand when static analysis rescans happen in ReversingLabs products and how to trigger them if needed.

Static vs. Dynamic Analysis

Compare static and dynamic file analysis approaches: how each works, their strengths and limitations, and how ReversingLabs products combine both for comprehensive threat detection.

YARA and Spectra Core

Explores the integration of YARA, a tool for pattern matching, with Spectra Core, detailing how custom rules can be utilized to identify and classify files based on specific patterns.