
John Mello
Writer at Freelance
I am a freelance writer specializing in business and technology subjects, including consumer electronics, business computing and cyber security.
Articles
-
2 weeks ago |
reversinglabs.com | John Mello
Virtual machines (VMs) have become ubiquitous in the enterprise by offering flexibility, scalability, and cost savings. But widespread adoption has outpaced traditional security controls, which often rely on runtime access or agent-based monitoring. Dan Petrillo, vice president of product marketing at ReversingLabs (RL), said in a recent webinar that VMs can be blind spots for threats, exposing organizations to malware, vulnerabilities, supply chain risks, and compliance gaps.
-
3 weeks ago |
reversinglabs.com | John Mello
Software bills of materials (SBOMs) have become a hot topic recently — for a number of reasons. High-profile attacks on software supply chains have exposed the need for organizations to know what third-party and open-source components are in the applications they use. SBOMs are seen as an essential first step on that journey.
-
1 month ago |
reversinglabs.com | John Mello
While the shortest distance between two points is a straight line, a straight-line attack on a large language model (LLM) isn't always the most efficient — and least noisy — way to get the LLM to do bad things. That's why malicious actors have been turning to indirect prompt attacks on LLMs to carry out attacks. Indirect prompt injection attacks occur when malicious instructions are embedded within external content — documents, web pages, or emails — that an LLM processes.
-
1 month ago |
reversinglabs.com | John Mello
Despite the risks associated with artificial intelligence (AI) coding, developers remain enthusiastic, using it to keep up with the demand for delivery software at speed. A recent GitHub survey found that 92% of U.S.-based developers are using AI coding regularly. But while many developers are using AI to assist them in writing code, they seem to be doing so warily.
-
1 month ago |
reversinglabs.com | John Mello
Risks to software supply chains from mobile applications are increasing, largely due to a lack of deeper visibility into their codebase, a new study has found. Zimperium researchers noted in the 2025 Global Mobile Threat Report that more than 60% of top Android and iOS third-party components, or software development kits (SDK’s), are shipped as precompiled binary packages, often with partial or missing software bills of materials (SBOMs).
Try JournoFinder For Free
Search and contact over 1M+ journalist profiles, browse 100M+ articles, and unlock powerful PR tools.
Start Your 7-Day Free Trial →X (formerly Twitter)
- Followers
- 1K
- Tweets
- 4K
- DMs Open
- Yes