Security Experts:

Connect with us

Hi, what are you looking for?


Malware & Threats

Seculert Adds ‘Elastic Sandbox’ to Simulate Malware Over Time, Geographic Locations

New Elastic Sandbox Enables Malware to Be Analyzed Over Long Time Periods and Geographic Locations

New Elastic Sandbox Enables Malware to Be Analyzed Over Long Time Periods and Geographic Locations

Seculert, an Israel-based provider of cloud-based threat detection solutions, has released of a new version of their service, featuring Elastic Sandbox technology, an updated API, and a new user interface.

This new release comes just after the company announced a $10 million Series B round of funding led by Sequoia Capital.

The new “Elastic Sandbox” is where malware is introduced, examined and profiled, the company said. Using the Elastic Sandbox, security teams analyzing malware samples can now select increments of time and different geographic locations by which to analyze their sample.

“Our Elastic Sandbox is a natural progression for our cloud-based SaaS solution; continuing our dedication to research, intelligence and protection from malware and advanced threats. It is the only truly ‘elastic’ sandbox available that allows malware to evolve over long periods of time, and not just run for a couple of minutes,” says Seculert CTO Aviv Raff.

Additionally, with the new API, Seculert customers will be able to better visualize the API calls and data manipulation. Through easy integration of the API and pre-existing on-premises products, customers can transform their current security defenses into a complete advanced threat protection solution.

The company also launched a new user interface that was designed to be more intuitive and put data about advanced threats instantly at the user’s fingertips.

Existing customers will automatically be upgraded to the new dashboard and API.

Seculert was founded in 2011 by security industry veterans Dudi Matot (CEO), Aviv Raff (CTO), and Alex Milstein (COO), and has R&D offices based in Israel, with sales offices located in the United States and Europe.

In late June, Seculert uncovered details of “PinkStats”, malware used in a string of attacks by several Chinese-speaking groups over the last four years to target different worldwide organizations and nation-states. 

Written By

For more than 10 years, Mike Lennon has been closely monitoring the threat landscape and analyzing trends in the National Security and enterprise cybersecurity space. In his role at SecurityWeek, he oversees the editorial direction of the publication and is the Director of several leading security industry conferences around the world.

Click to comment

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Expert Insights

Related Content

Malware & Threats

Microsoft plans to improve the protection of Office users by blocking XLL add-ins from the internet.


A recently disclosed vBulletin vulnerability, which had a zero-day status for roughly two days last week, was exploited in a hacker attack targeting the...


CISA, NSA, and MS-ISAC issued an alert on the malicious use of RMM software to steal money from bank accounts.


Russia-linked cyberespionage group APT29 has been observed using embassy-themed lures and the GraphicalNeutrino malware in recent attacks.


No one combatting cybercrime knows everything, but everyone in the battle has some intelligence to contribute to the larger knowledge base.


Chinese threat actor DragonSpark has been using the SparkRAT open source backdoor in attacks targeting East Asian organizations.

Malware & Threats

Security researchers are warning of a new wave of malicious NPM and PyPI packages designed to steal user information and download additional payloads.


The changing nature of what we still generally call ransomware will continue through 2023, driven by three primary conditions.