Close Menu
Pineapples Update –Pineapples Update –

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    Why do I suggest this budget phone with a paper -like screen on ‘minimal’ equipment

    August 4, 2025

    Inexpensive optical brain imaging advance

    August 4, 2025

    Lastpass can now warn or block login to shadow the mother -in -law app – how is here

    August 4, 2025
    Facebook X (Twitter) Instagram
    Facebook X (Twitter) Instagram Pinterest Vimeo
    Pineapples Update –Pineapples Update –
    • Home
    • Gaming
    • Gadgets
    • Startups
    • Security
    • How-To
    • AI/ML
    • Apps
    • Web3
    Pineapples Update –Pineapples Update –
    Home»Security»CISA Open-SOS Thorium Platform for Malware, Forensic Analysis
    Security

    CISA Open-SOS Thorium Platform for Malware, Forensic Analysis

    PineapplesUpdateBy PineapplesUpdateAugust 2, 2025No Comments2 Mins Read
    Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
    CISA Open-SOS Thorium Platform for Malware, Forensic Analysis
    Share
    Facebook Twitter LinkedIn Pinterest Email

    CISA Open-SOS Thorium Platform for Malware, Forensic Analysis

    The US Cyber Security and Infrastructure Security Agency (CISA) today announced the public availability of Thorium, which is an open-source platform for malware and forensic analysts in the government, public and private sectors.

    Thorium was developed Sandia in partnership with national laboratories As a scalable cyber security suit that automates several tasks involved in the cyber attack test, and can schedule more than 1,700 jobs per second and inges up more than 10 million files per hour per hour.

    “Thorium enhances the capabilities of cyber security teams by automatic analysis workflows through commercial, open-sources and custom tools,” Sisa said On Thursday.

    “It supports various mission functions, including software analysis, digital forensic, and the response to the event, allowing analysts to efficiently assess complex malware hazards.”

    Security teams can use thorium to automate and accelerate various file analysis workflows, including: but it is not limited:

    • Easily import and export equipment to facilitate sharing in cyber defense teams,
    • Integrate command-line tools in the form of doors images including open-sources, commercial and custom software,
    • Filter results using tag and full-text search,
    • Submission with strict group-based permissions, access to tools and results,
    • Scale with Kuberanets and Skyladb to meet the workload demands.

    Defenders can find installation instructions and get your copy of thorium CISA official github repository,

    “By sharing this platform publicly, we empower the wider cyber security community to orkstrate the use of advanced equipment for malware and forensic analysis,” said CISA Associate Director for Threat Hunting Zemine Roybuck.

    “Scalable analysis of other digital artifacts along with binergies further enables cyber safety analysts to understand and address weaknesses in benign software.”

    On Wednesday, CISA released Bicker strategies toolsWhich helps the security teams during the reaction of the incident by providing necessary action to include and evicted opponents from compromised networks and equipment.

    Last year, the Cyber Defense Agency also publicly provided its “Malware Next-Jen” analysis system, allowing the public to present samples of malware for analysis by CISA.

    A year ago, CISA began offering free security scans for important infrastructure facilities to help protect from hacker attacks.


    Picus Red Report 2025

    Malware targeting password stores increased 3x as the attackers secretly carried out the perfect history landscape, infiltrated and exploited important systems.

    Search for the top 10 Metter Att & CK techniques behind the 93% attacks and how to defend them.

    analysis CISA forensic Malware OpenSOS platform Thorium
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Previous ArticleGold Defisure Physics: In the superheating experiment, 14x is solid at the point of melting
    Next Article Apple had a record-breaking quarter, defeating revenue goals
    PineapplesUpdate
    • Website

    Related Posts

    Security

    Lastpass can now warn or block login to shadow the mother -in -law app – how is here

    August 4, 2025
    Security

    Mozilla warns of fishing attacks targeting ad-on developers

    August 4, 2025
    Security

    MCP: Reserve the backbone of agent AI

    August 4, 2025
    Add A Comment
    Leave A Reply Cancel Reply

    Top Posts

    Microsoft’s new text editor is a VIM and Nano option

    May 19, 2025797 Views

    The best luxury car for buyers for the first time in 2025

    May 19, 2025724 Views

    Massives Datenleck in Cloud-Spichenn | CSO online

    May 19, 2025650 Views
    Stay In Touch
    • Facebook
    • YouTube
    • TikTok
    • WhatsApp
    • Twitter
    • Instagram
    Latest Reviews

    Subscribe to Updates

    Get the latest tech news from FooBar about tech, design and biz.

    Most Popular

    10,000 steps or Japanese walk? We ask experts if you should walk ahead or fast

    June 16, 20250 Views

    FIFA Club World Cup Soccer: Stream Palmirus vs. Porto lives from anywhere

    June 16, 20250 Views

    What do chatbott is careful about punctuation? I tested it with chat, Gemini and Cloud

    June 16, 20250 Views
    Our Picks

    Why do I suggest this budget phone with a paper -like screen on ‘minimal’ equipment

    August 4, 2025

    Inexpensive optical brain imaging advance

    August 4, 2025

    Lastpass can now warn or block login to shadow the mother -in -law app – how is here

    August 4, 2025

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    Facebook X (Twitter) Instagram Pinterest
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms And Conditions
    • Disclaimer
    © 2025 PineapplesUpdate. Designed by Pro.

    Type above and press Enter to search. Press Esc to cancel.