Tuesday, February 11, 2025
HomeCyber Security NewsCISA Opens Its Internal Malware Analysis Tool for Public Use

CISA Opens Its Internal Malware Analysis Tool for Public Use

Published on

SIEM as a Service

Follow Us on Google News

The Cybersecurity and Infrastructure Security Agency (CISA) has unveiled its latest initiative: opening its advanced malware analysis system, Malware Next-Gen, to the public.

Malware Next-Gen is a revolutionary approach to detecting and mitigating cyber threats and malicious software.

With scalability and efficiency in mind, this next-generation platform allows governmental bodies, private organizations, security researchers, and individuals to submit malware samples and suspicious artifacts for comprehensive analysis.

Eric Goldstein, CISA’s Executive Assistant Director for Cybersecurity, emphasized the importance of this initiative, stating, “Effective and efficient malware analysis helps security professionals detect and prevent malicious software from enabling adversary access to persistence within an organization.”

He emphasized that the Malware Next-Gen is evidence of CISA’s dedication to improving the country’s cybersecurity position.

Malware Next-Gen is engineered to automate the analysis of newly identified malware, providing timely, actionable intelligence crucial for network defenders in conducting cyber incident responses or threat hunts.

The platform can provide advanced and dependable analysis and can be scaled to meet future workload requirements.

Document
Stop Advanced Phishing Attack With AI

AI-Powered Protection for Business Email Security

Trustifi’s Advanced threat protection prevents the widest spectrum of sophisticated attacks before they reach a user’s mailbox. Stopping 99% of phishing attacks missed by other email security solutions. .

One of the standout features of Malware Next-Gen is its multilevel containment capabilities, which allow for the automatic analysis of potentially malicious files or URLs.

This integrated system equips CISA analysts and the operations community with the tools necessary to respond rapidly and effectively to evolving cyber threats and safeguard critical systems and infrastructure.

Empowering Partnerships and Enhancing Defense

With the aim of creating a collaborative environment among partners to share information and insights into cyber threats, CISA has opened Malware Next-Gen to the public.

This initiative not only facilitates the enrichment and correlation of data but also supports the rapid dissemination of cyber threat insights, ultimately enhancing the collective defense against cyber adversaries.

Also, you can see how Sandbox is like ANY.RUN can benefit your organization. You can get free access for your security team.

All organizations, security researchers, and individuals are encouraged to register and submit suspected malware into this automated system for analysis.

This collaborative approach is expected to significantly contribute to the detection, prevention, and mitigation of cyber threats, reinforcing the security of national and global digital infrastructure.

For more information on how to participate in this initiative, visit CISA’s official website.

The launch of Malware Next-Gen for public use is a pivotal moment in the fight against cyber threats.

Secure your emails in a heartbeat! To find your ideal email security vendor, Take a Free 30-Second Assessment.

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

12,000+ KerioControl Firewalls Exposed to 1-Click RCE Attack

Cybersecurity researchers caution that over 12,000 instances of GFI KerioControl firewalls remain unpatched and...

Apple iOS 0-day Vulnerability Exploited Wild in Extremely Sophisticated Attack

Apple has released emergency security updates to address a zero-day vulnerability, CVE-2025-24200, that has...

SHA256 Hash Calculation from Data Chunks

The SHA256 algorithm, a cryptographic hash function, is widely used for securing data integrity...

New Report of of 1M+ Malware Samples Show Application Layer Abused for Stealthy C2

A recent analysis of over one million malware samples by Picus Security has revealed...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

12,000+ KerioControl Firewalls Exposed to 1-Click RCE Attack

Cybersecurity researchers caution that over 12,000 instances of GFI KerioControl firewalls remain unpatched and...

Apple iOS 0-day Vulnerability Exploited Wild in Extremely Sophisticated Attack

Apple has released emergency security updates to address a zero-day vulnerability, CVE-2025-24200, that has...

SHA256 Hash Calculation from Data Chunks

The SHA256 algorithm, a cryptographic hash function, is widely used for securing data integrity...