ReversingLabs | Company Profile - Revenue, Headcount, Tech Stack, Contacts

Company Directory for ReversingLabs

ReversingLabs

Overview

ReversingLabs is a cybersecurity company headquartered in Cambridge, Massachusetts, founded in 2009. The company specializes in software supply chain security, threat intelligence, malware analysis, and file security. Its platform, powered by Spectra Core, analyzes a wide range of software artifacts to identify malware, vulnerabilities, and security risks, tracking over 40 billion files daily.

The organization provides solutions in two primary areas: Malware Analysis and Threat Hunting (MATH capabilities), and Software Supply Chain Security (SSCS). MATH capabilities equip SOC analysts with tools for threat research and incident response, while SSCS integrates into CI/CD pipelines for automated software package scanning. ReversingLabs serves clients in sectors such as finance, healthcare, and defense, aiming to deliver deep risk insights and ensure the integrity of software packages and binaries.

Basic Information

Industrycomputer & network security
Founded2009
Revenue82.9M
Headquarters222 3rd St, unit 1101, Cambridge, Massachusetts 02142, United States
LanguagesEnglish

Contact Details

Key Focus Areas & Initiatives

  • Cyber security
  • Reverse engineering
  • Cyber threats
  • APT
  • Malware
  • Threat intelligence
  • Malicious code
  • Static analysis
  • Threat detection
  • Computer forensics
  • Malware detection
  • Cyber forensics
  • File reputation
  • Predictive detection
  • Malware lab
  • Application security
  • Software supply chain security
  • Container security
  • DevSecOps
  • DevOps
  • InfoSec
  • Information security
  • Threat repository
  • File analysis
  • Software deconstruction
  • SBOM (Software Bill of Materials)
  • Software integrity verification
  • Malware analysis
  • Threat hunting for SOC
  • Software security verification
  • Threat detection in files
  • Vulnerability detection
  • Threat data enrichment
  • Threat detection workflow
  • Threat intelligence platform
  • Threat contextualization
  • Automated malware detection
  • Cybersecurity compliance
  • Dynamic analysis
  • Security operations
  • Incident response
  • Continuous monitoring
  • Compliance auditing
  • Enterprise security solutions

Technologies Used

  • AI
  • AWS Trusted Advisor
  • Amazon AWS
  • Amazon S3
  • Ansible
  • Apache Solr
  • Azure Linux Virtual Machines
  • Bash
  • Bing Ads
  • BlueTie Vault
  • Bootstrap Framework
  • Chatter
  • ClickHouse
  • Confluence
  • Django
  • Docker
  • Docusaurus
  • DoubleClick
  • DoubleClick Conversion
  • Facebook Custom Audiences
  • Facebook Login (Connect)
  • Facebook Widget
  • Git
  • GitLab
  • Gmail
  • Google
  • Google Analytics
  • Google Apps
  • Google Cloud
  • Google Dynamic Remarketing
  • Google Tag Manager
  • Grafana
  • HELM
  • Hashicorp Packer
  • Hotjar
  • Hubspot
  • Intel
  • Javascript
  • Jenkins
  • Jira
  • Kubernetes
  • Linkedin Login
  • Linkedin Marketing Solutions
  • Linkedin Widget
  • Logstash
  • MITRE ATT&CK
  • Marketo
  • Microsoft Azure Monitor
  • Microsoft Office 365
  • Mobile Friendly
  • New Relic
  • Nginx
  • Okta
  • Playwright
  • PostgreSQL
  • Prometheus
  • Python
  • React
  • Remote
  • Route 53
  • Ruby On Rails
  • Salesforce
  • Selenium
  • Slack
  • SpectraLink
  • Terraform
  • The Trade Desk
  • TypeScript
  • VMware
  • Varnish
  • Vidyard
  • VirtualBox
  • YouTube
  • Zendesk
  • go+

Affiliated Organizations & Regional Branches