Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Malware & Threats

Sunbelt Software Upgrades Sandbox Malware Analysis Tool

Sunbelt Software today announced the availability of Sunbelt CWSandbox 3.0, an upgraded version of their automated dynamic malware analysis tool. CWSandbox leverages unique behavior analysis technology for the identification of malicious threats like PDF exploits, fake media players and other socially engineered attacks against enterprise or government networks.

Sunbelt Software today announced the availability of Sunbelt CWSandbox 3.0, an upgraded version of their automated dynamic malware analysis tool. CWSandbox leverages unique behavior analysis technology for the identification of malicious threats like PDF exploits, fake media players and other socially engineered attacks against enterprise or government networks.

Sunbelt CWSandboxThe latest version enables security analysts and incident response teams to analyze the behavior of suspected files by executing code inside a controlled and monitored environment. It records all malicious activity including system changes, network traffic and memory dumps. One of the key features now in CWSandbox is Digital Behavior Traits (DBT) technology, which interprets the behavior of a file, ad, document or website to determine automatically whether it is malicious.

CWSandbox gives users the ability to safely analyze virtually any Windows application or file including infected documents, malicious URLs, custom applications and scripts in Flash ads. It also gives researchers the ability to compare multiple analyses for differences and similarities, and to send malware samples to multiple sandbox configurations and centrally manage the process.

By simulating the way in which a user would interact with a rogue application, CWSandbox automates what is otherwise a manual process. Rather than analyzing new threats on a case-by-case basis, security researchers can now simultaneously compare how malware operates in multiple environments.

“Automated threat analysis is essential to organizations that are targeted by malware writers with brand new viruses that have not yet been categorized or catalogued by traditional antivirus solutions,” said Chad Loeven, vice president and general manager for SunbeltLabs. 

Written By

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Mike Dube has joined cloud security company Aqua Security as CRO.

Cody Barrow has been appointed as CEO of threat intelligence company EclecticIQ.

Shay Mowlem has been named CMO of runtime and application security company Contrast Security.

More People On The Move

Expert Insights

Related Content

Cybercrime

A recently disclosed vBulletin vulnerability, which had a zero-day status for roughly two days last week, was exploited in a hacker attack targeting the...

Cybercrime

The changing nature of what we still generally call ransomware will continue through 2023, driven by three primary conditions.

Malware & Threats

The NSA and FBI warn that a Chinese state-sponsored APT called BlackTech is hacking into network edge devices and using firmware implants to silently...

Cyberwarfare

An engineer recruited by intelligence services reportedly used a water pump to deliver Stuxnet, which reportedly cost $1-2 billion to develop.

Application Security

Virtualization technology giant VMware on Tuesday shipped urgent updates to fix a trio of security problems in multiple software products, including a virtual machine...

Malware & Threats

Apple’s cat-and-mouse struggles with zero-day exploits on its flagship iOS platform is showing no signs of slowing down.

Malware & Threats

Unpatched and unprotected VMware ESXi servers worldwide have been targeted in a ransomware attack exploiting a vulnerability patched in 2021.

Malware & Threats

Cisco is warning of a zero-day vulnerability in Cisco ASA and FTD that can be exploited remotely, without authentication, in brute force attacks.