Kenna Security and ReversingLabs Partner to Identify and Prevent Malware Threats

Dec 13, 2017
Kenna Security

Share with Your Network

Today, we are pleased to announce our results from our partnership with ReversingLabs, a leading provider of threat intelligence solutions that accelerate and broaden an organization’s ability to detect threats, respond to incidents, and gain visibility into advanced attacks.

The technology partnership integrates ReversingLabs’ real-time malware threat intelligence into the Kenna Security Platform. Kenna Security customers benefit from:

  • The ability to identify which of a company’s vulnerabilities are targeted by malware; their Kenna Security risk scoring will elevate accordingly.
  • Additional intelligence, including real-time telemetry about “in the wild” malware attacks, their volume (increasing use) and velocity (exploit frequency) that further informs Kenna Security’s real-time prioritization analysis.
  • Visual tagging of malware targeted vulnerabilities, with respectively increased risk scores, and prioritized using Kenna Security’s unique data-science driven risk analysis.
  • The ability to identify malware hashes to identify if and where malware strains exist across their network, enabling them to quickly and proactively both remove malware instances and remediate malware-targeted vulnerabilities.

These powerful enhancements are available immediately to all Kenna Security customers.

 “We are excited to partner with ReversingLabs.  Malware is an important and dangerous attack vector that threatens all of our customers,” said Ed Bellis, co-founder and CTO at Kenna Security.  “ReversingLabs’ threat intelligence enhances the Kenna Security Platform with the critical link between malware and the vulnerabilities they exploit.  This enables our customers to work across IT to effortlessly prioritize malware-targeted vulnerabilities and reduce cyber risk together.” 

“It’s been a pleasure working with the Kenna Security team to successfully deliver this integration which enhances the ability to detect and defeat advanced cybersecurity threats,” said Mario Vuksan, CEO at ReversingLabs. “This effort is a great example of how our technology can be applied to help Kenna Security’s customers identify and prioritize vulnerabilities targeted by malware, as well as making their threat hunting tools more effective.”

Learn more about protecting your organization from vulnerabilities and malware by viewing this 2-minute demo video led by Ed Bellis, Kenna Security Co-founder and CTO, and reading this blog post by Michael Roytman, Kenna Security’s Chief Data Scientist.                                                            

About ReversingLabs

ReversingLabs is a leading provider of malware detection and threat
 intelligence solutions that
 dramatically accelerate and broaden an organization’s ability to detect new threats, respond to incidents and gain visibility on attacks. Our solutions implement unique, innovative technologies that perform real-time deep inspection and analysis to detect threats within files. Large enterprises, government agencies and security vendors use these solutions to implement enterprise-scale classification, analysis and hunting. For more information refer to

 About Kenna Security

Kenna Security is the leading vendor in vulnerability and cyber risk management. The Kenna Security Platform enables organizations to work cross-functionally to determine and remediate cyber risks. Kenna Security leverages Cyber Risk Context Technology to track and predict real-world exploitations, focusing security teams on what matters most. Headquartered in San Francisco, Kenna Security counts among its customers many Fortune 100 companies, and serves nearly every major vertical.  For more information, visit Follow us on FacebookTwitter, and LinkedIn.   

Read the Latest Content

Research Reports

Prioritization to Prediction Volume 5: In Search of Assets at Risk

The fifth volume of the P2P series explores the vulnerability risk landscape by looking at how enterprises often view vulnerabilities.

5 Things Every CIO Should Know About Vulnerability Management

If you view vulnerability management (VM) as just a small part of your operation, it might be time to take another look.  Managing vulnerabilities is...



Get Started Using the Exploit Prediction Scoring System (EPSS).

Cyentia Institute’s Chief Data Scientist and Founder Jay Jacobs gives tips on how to get started using the Exploit Prediction Scoring System (EPSS). You...

© 2022 Kenna Security. All Rights Reserved. Privacy Policy.