Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Vulnerabilities / Threats

04:13 PM
Dark Reading
Dark Reading
Products and Releases

Sunbelt Software Unveils Updated Security Services

Upcoming CWSandbox enhancements allow security providers to automate bulk malware analysis; Exploit Feed adds to Threat Track portfolio

LAS VEGAS, July 29 /PRNewswire/ -- Black Hat 2009 -- Sunbelt Software, a leading provider of Windows security software, today announced the upcoming availability of the next version of the industry's premier automated malware analysis tool, CWSandbox(TM). Sunbelt also announced the availability of its Exploit Feed, a new component to its Threat Track(TM) data service which provides customers with the industry's most accurate and up-to-date feeds, identifying and propagating to researchers the latest malicious URLs and malware. Both offerings rely on the world-class research efforts of SunbeltLabs(TM), the malware research and analysis division of Sunbelt Software.

CWSandbox is an automated behavior analysis tool that leverages unique technology for the automatic detection of malware. The forthcoming release of CWSandbox v3.0 will give researchers the ability to compare multiple analyses for differences and similarities, and allow them to send malware samples to multiple sandbox configurations and centrally manage the process. Unlike other malware analysis tools on the market today, CWSandbox provides true automation and gives those on the front lines of cyber-defense the ability to analyze in bulk and save crucial time.

Security researchers will have the ability to compare simultaneously how malware operates in a variety of environments. By leveraging this sophisticated analysis, enterprises can put security best practices in place to account for how malware behaves differently on varied desktop configurations within their networks and proactively protect against targeted threats.

"Sunbelt has a long history of marrying its endpoint anti-malware tools with state-of-the-art threat research," said Chad Loeven, VP, business development for Sunbelt Software. "Cooperation and sharing of such research in the security community is essential for the timely protection of businesses, federal agencies and consumers against the rising tide of malware attacks. SunbeltLabs is continually improving its world-class research methods in order to lead the effort to keep the bad guys out."

To that end, Sunbelt introduces a new Exploit Feed, which is one of the vital data streams maintained by SunbeltLabs, and is now part of the Threat Track service. The Exploit Feed tracks URLs deemed to be malicious based on a set of behavior and code traits, and is updated continuously, identifying links to exploits before users can become infected. The URLs are passed through an array of "honeyclients" configured to detect any malicious activity.

Data captured by the Exploit Feed include files dropped by the URL, other URLs involved in the exploit process, code containing the actual exploit, and an XML behavior analysis report of the browser and all related malware processes. The Exploit Feed, in conjunction with the other feed components of Threat Track, is heterogeneous in nature and can be incorporated into cloud, gateway and desktop Web security solutions.

Sunbelt's CWSandbox and Exploit Feed will be on display today and tomorrow in Booth #1 at Black Hat USA 2009 in Caesar's Palace, Las Vegas, Nevada. For more information on CWSandbox or Threat Track, please visit www.sunbeltsandbox.com.


Headquartered in Tampa Bay (Clearwater), Fla., Sunbelt Software was founded in 1994 and is a leading provider of Windows security software including enterprise antivirus, antispyware, email security, and malware analysis tools. Leading products include the VIPRE(R) and CounterSpy(R) product lines, Ninja(TM) Email Security, Sunbelt Exchange Archiver(TM), CWSandbox(TM), and Threat Track(TM).

For more information about Sunbelt Software, please visit the company's website at http://www.sunbeltsoftware.com. To learn more about current activities, products, and ideas at Sunbelt Software, please visit Sunbelt's corporate blog at http://www.sunbeltblog.com. To view this release online, go to http://www.sunbeltsoftware.com/Press/Releases/?id=294.


Recommended Reading:

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 7/14/2020
Omdia Research Launches Page on Dark Reading
Tim Wilson, Editor in Chief, Dark Reading 7/9/2020
Why Cybersecurity's Silence Matters to Black Lives
Tiffany Ricks, CEO, HacWare,  7/8/2020
Register for Dark Reading Newsletters
White Papers
Current Issue
Special Report: Computing's New Normal, a Dark Reading Perspective
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
The Threat from the Internetand What Your Organization Can Do About It
The Threat from the Internetand What Your Organization Can Do About It
This report describes some of the latest attacks and threats emanating from the Internet, as well as advice and tips on how your organization can mitigate those threats before they affect your business. Download it today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2020-07-15
Advantech iView, versions 5.6 and prior, has an improper access control vulnerability. Successful exploitation of this vulnerability may allow an attacker to obtain all user accounts credentials.
PUBLISHED: 2020-07-15
Advantech iView, versions 5.6 and prior, has an improper authentication for critical function (CWE-306) issue. Successful exploitation of this vulnerability may allow an attacker to obtain the information of the user table, including the administrator credentials in plain text. An attacker may also ...
PUBLISHED: 2020-07-15
Advantech iView, versions 5.6 and prior, has an improper input validation vulnerability. Successful exploitation of this vulnerability could allow an attacker to remotely execute arbitrary code.
PUBLISHED: 2020-07-15
Advantech iView, versions 5.6 and prior, contains multiple SQL injection vulnerabilities that are vulnerable to the use of an attacker-controlled string in the construction of SQL queries. An attacker could extract user credentials, read or modify information, and remotely execute code.
PUBLISHED: 2020-07-15
Advantech iView, versions 5.6 and prior, has an improper neutralization of special elements used in a command (“command injection�) vulnerability. Successful exploitation of this vulnerability may allow an attacker to send a HTTP GET or POST request that create...