{
	"id": "6fc43532-3531-49fb-9feb-550f1b42dd4d",
	"created_at": "2026-04-06T00:06:12.394186Z",
	"updated_at": "2026-04-10T13:11:52.692308Z",
	"deleted_at": null,
	"sha1_hash": "418a6825e4dc16d1adda0c8a3f36bb1359194179",
	"title": "RL Blog | ReversingLabs",
	"llm_title": "",
	"authors": "",
	"file_creation_date": "0001-01-01T00:00:00Z",
	"file_modification_date": "0001-01-01T00:00:00Z",
	"file_size": 44666,
	"plain_text": "RL Blog | ReversingLabs\r\nPublished: 2026-04-02 · Archived: 2026-04-05 14:30:52 UTC\r\naxios\r\nApril 2, 2026\r\nAxios: How AppSec teams should respond\r\nHere's a mitigations checklist and best practices. Plus: How RL’s xBOM and Spectra Assure Community can help.\r\nAxios: How AppSec teams should respond\r\nSoftware trust debt\r\nApril 1, 2026\r\nHow JPMC tackles software ‘trust debt’\r\nJPMorgan Chase CISO Patrick Opet discussed his letter on third-party software risk — and how that has played\r\nout.\r\nHow JPMC tackles software ‘trust debt’\r\nAI ramps up risk\r\nMarch 31, 2026\r\nGenAI Security Project ramps up guidance\r\nWith AI ramping up risk, OWASP stepped up its project to help AppSec teams get up to speed — and take action.\r\nGenAI Security Project ramps up guidance\r\nCascading supply chain attack\r\nMarch 27, 2026\r\nAppSec as attacker: Inside Trivy–LiteLLM\r\nThe perimeter isn't your firewall — it's your CI/CD pipeline. Here’s what to know about TeamPCP's supply chain\r\nattack.\r\nAppSec as attacker: Inside Trivy–LiteLLM\r\nTeamPCP supply chain attack\r\nhttps://blog.reversinglabs.com/blog/rana-android-malware\r\nPage 1 of 3\n\nMarch 27, 2026\r\nThe TeamPCP supply chain attack evolves\r\nThe malicious campaign started with Trivy and Checkmarx and has shifted to LiteLLM — and now telnix. Here's\r\nhow.\r\nThe TeamPCP supply chain attack evolves\r\nDecouple SIEM data for better AppSec\r\nMarch 26, 2026\r\nDecouple SIEM data to reshape your AppSec\r\nShift to a data security pipeline platform to get software visibility that modern supply chain threats demand.\r\nDecouple SIEM data to reshape your AppSec\r\nIDE insider threat\r\nMarch 25, 2026\r\nHow AI agents can weaponize IDEs\r\nResearch shows that AI coding can tap integrated development environments to become privileged insider\r\nthreats. \r\nHow AI agents can weaponize IDEs\r\nAI agents black hole of risks\r\nMarch 18, 2026\r\nOpenClaw lesson: AI agents are a black hole\r\nAI agents create novel attack surfaces and control issues that require rethinking assumptions — and AppSec\r\ntooling.\r\nOpenClaw lesson: AI agents are a black hole\r\nSBOM: check\r\nMarch 12, 2026\r\nMake Your SBOMs Actionable with PURLs\r\nLearn how Package URLs improve vulnerability matching, which reduces alert fatigue and simplifies compliance.\r\nMake Your SBOMs Actionable with PURLs\r\nhttps://blog.reversinglabs.com/blog/rana-android-malware\r\nPage 2 of 3\n\nContainer security\r\nMarch 11, 2026\r\nOWASP adopts DockSec: Why it matters\r\nOWASP has adopted the container security tool to slow information overload. Here’s what you need to know.\r\nOWASP adopts DockSec: Why it matters\r\nOpenClaw agentic AI risk\r\nMarch 10, 2026\r\nOpenClaw and AI risk: 3 AppSec lessons\r\nThe OpenClaw saga is a case study on the threat from agentic AI, showing how it increases software risk.\r\nOpenClaw and AI risk: 3 AppSec lessons\r\nSource: https://blog.reversinglabs.com/blog/rana-android-malware\r\nhttps://blog.reversinglabs.com/blog/rana-android-malware\r\nPage 3 of 3",
	"extraction_quality": 1,
	"language": "EN",
	"sources": [
		"ETDA",
		"Malpedia"
	],
	"origins": [
		"web"
	],
	"references": [
		"https://blog.reversinglabs.com/blog/rana-android-malware"
	],
	"report_names": [
		"rana-android-malware"
	],
	"threat_actors": [
		{
			"id": "63883709-27b5-4b65-9aac-c782780fbb28",
			"created_at": "2026-04-10T02:00:03.996704Z",
			"updated_at": "2026-04-10T02:00:03.996704Z",
			"deleted_at": null,
			"main_name": "TeamPCP",
			"aliases": [],
			"source_name": "MISPGALAXY:TeamPCP",
			"tools": [],
			"source_id": "MISPGALAXY",
			"reports": null
		}
	],
	"ts_created_at": 1775433972,
	"ts_updated_at": 1775826712,
	"ts_creation_date": 0,
	"ts_modification_date": 0,
	"files": {
		"pdf": "https://archive.orkl.eu/418a6825e4dc16d1adda0c8a3f36bb1359194179.pdf",
		"text": "https://archive.orkl.eu/418a6825e4dc16d1adda0c8a3f36bb1359194179.txt",
		"img": "https://archive.orkl.eu/418a6825e4dc16d1adda0c8a3f36bb1359194179.jpg"
	}
}