ReversingLabs | Company Profile - Revenue, Headcount, Tech Stack, Contacts
Contact Information
Industry & Market
Company Metrics
Funding Information
Headcount Distribution
By Department
Department Breakdown
Technology Stack
Analytics & Tracking
Social & Marketing
Development
Video & Media
Email & Communication
Keywords & Focus Areas
ReversingLabs
Overview
ReversingLabs is a cybersecurity company headquartered in Cambridge, Massachusetts, founded in 2009. The company specializes in software supply chain security, threat intelligence, malware analysis, and file security. Its platform, powered by Spectra Core, analyzes a wide range of software artifacts to identify malware, vulnerabilities, and security risks, tracking over 40 billion files daily.
The organization provides solutions in two primary areas: Malware Analysis and Threat Hunting (MATH capabilities), and Software Supply Chain Security (SSCS). MATH capabilities equip SOC analysts with tools for threat research and incident response, while SSCS integrates into CI/CD pipelines for automated software package scanning. ReversingLabs serves clients in sectors such as finance, healthcare, and defense, aiming to deliver deep risk insights and ensure the integrity of software packages and binaries.
Basic Information
| Industry | computer & network security |
|---|---|
| Founded | 2009 |
| Revenue | 82.9M |
| Headquarters | 222 3rd St, unit 1101, Cambridge, Massachusetts 02142, United States |
| Languages | English |
Contact Details
- Phone: +1 617-250-7518
- Website: reversinglabs.com
- LinkedIn: linkedin.com/company/reversinglabs
- Facebook: facebook.com/reversinglabs
- Twitter: twitter.com/reversinglabs
- AngelList: angel.co/reversing
Key Focus Areas & Initiatives
- Cyber security
- Reverse engineering
- Cyber threats
- APT
- Malware
- Threat intelligence
- Malicious code
- Static analysis
- Threat detection
- Computer forensics
- Malware detection
- Cyber forensics
- File reputation
- Predictive detection
- Malware lab
- Application security
- Software supply chain security
- Container security
- DevSecOps
- DevOps
- InfoSec
- Information security
- Threat repository
- File analysis
- Software deconstruction
- SBOM (Software Bill of Materials)
- Software integrity verification
- Malware analysis
- Threat hunting for SOC
- Software security verification
- Threat detection in files
- Vulnerability detection
- Threat data enrichment
- Threat detection workflow
- Threat intelligence platform
- Threat contextualization
- Automated malware detection
- Cybersecurity compliance
- Dynamic analysis
- Security operations
- Incident response
- Continuous monitoring
- Compliance auditing
- Enterprise security solutions
Technologies Used
- AI
- AWS Trusted Advisor
- Amazon AWS
- Amazon S3
- Ansible
- Apache Solr
- Azure Linux Virtual Machines
- Bash
- Bing Ads
- BlueTie Vault
- Bootstrap Framework
- Chatter
- ClickHouse
- Confluence
- Django
- Docker
- Docusaurus
- DoubleClick
- DoubleClick Conversion
- Facebook Custom Audiences
- Facebook Login (Connect)
- Facebook Widget
- Git
- GitLab
- Gmail
- Google Analytics
- Google Apps
- Google Cloud
- Google Dynamic Remarketing
- Google Tag Manager
- Grafana
- HELM
- Hashicorp Packer
- Hotjar
- Hubspot
- Intel
- Javascript
- Jenkins
- Jira
- Kubernetes
- Linkedin Login
- Linkedin Marketing Solutions
- Linkedin Widget
- Logstash
- MITRE ATT&CK
- Marketo
- Microsoft Azure Monitor
- Microsoft Office 365
- Mobile Friendly
- New Relic
- Nginx
- Okta
- Playwright
- PostgreSQL
- Prometheus
- Python
- React
- Remote
- Route 53
- Ruby On Rails
- Salesforce
- Selenium
- Slack
- SpectraLink
- Terraform
- The Trade Desk
- TypeScript
- VMware
- Varnish
- Vidyard
- VirtualBox
- YouTube
- Zendesk
- go+