Certificate Revocation
Learn how ReversingLabs tracks and adjusts certificate revocation dates, and how this affects sample classification and search results.
Learn how ReversingLabs tracks and adjusts certificate revocation dates, and how this affects sample classification and search results.
Lists the required network ports, protocols, and endpoint connections for Spectra Appliances, including communication between internal components, external cloud services, storage systems, and standard network services.
Comprehensive database of known vulnerabilities detected by Spectra Core including CVE listings and format malformation exploits used in static file analysis.
Provides an overview of the OAuth 2.0 and OpenID Connect protocols, explaining their roles in authentication and authorization processes within ReversingLabs products.
Details ReversingLabs' approach to data privacy, including policies and practices implemented to protect user information and ensure compliance with relevant regulations.
Outlines the standardized naming conventions used by ReversingLabs to identify and classify malware, ensuring consistency and clarity in threat reporting.
Discusses the Security Assertion Markup Language (SAML) standard and its application in facilitating single sign-on (SSO) and other security assertions within ReversingLabs solutions.
Reference for Spectra Core security grades (A-F) and detailed grade codes (RC, WC, SC) assigned during static analysis.
Complete list of trusted certificates in Spectra Core with common names, serial numbers, and SHA1/SHA256 thumbprints for validation.
Reference for Spectra Core behavior indicators that identify file operations, registry access, debugger detection, and other suspicious activities.
Complete reference of Spectra Core tags for file classification, digital signatures, certificate validation, vulnerabilities, and security characteristics detected during static analysis.
Complete reference of Spectra Core verified software identities including applications, LOLBins, LOLDrivers, steganography tools, hacker tools, and frameworks detected during file analysis.