Thursday, June 13, 2024

Sandboxie – A Free Tool to Run Any Application Securely in Isolated Environment

Sandboxie is a free tool that uses isolation technology to separate applications from making changes to your data, programs, and applications on your hard drive.

The tool lets you run any applications such as your web browser and other programs in a sandbox environment, so thereby it won’t affect any system applications.

The sandboxes are used by developers to experiment with their newly developed application and Cyber Security professionals use sandboxes to test malware.

Sandboxie was developed by Ronen Tzur, later it was acquired by Invincea, in February 2017, Invincea was acquired by Sophos. Now Sophos has changed the product license to freeware and has plans to make it as an open-source tool

Sandboxie for Security Purposes

By running the browser in the sandbox you can prevent your system from malware attacks, viruses, ransomware, and zero-day threats. With the sandbox, you can test your suspicious files without making any harm to the system.

For threat actors, the email address is the tempting targets, they find all the possible ways to infiltrate your email accounts. Nowadays Email accounts emerged as a major security threat for business and home computers.

Tools like Sandboxie lets you run your favorite Email application’s in the sandbox and thereby you should not worry about opening any suspicious documents. It also prevents websites and other applications in modifying personal data, files & folders on your system.

You can find the animation here that shows changes by a program running under Sandboxie.

Hard Disk With Sandbox Credits: Sandboxie

“The animation illustrates that Sandboxie can intercept the changes and isolate them within a sandbox, depicted as a yellow rectangle. It also illustrates that grouping the changes together makes it easy to delete all of them at once.”

The tool supports for both 32 and 64-bit operating system versions, you can open all major browsers, Microsoft Office Suite, PDF and Multimedia files with Sandboxie.

You can Download the Sandboxie Tool Here and learn more from Sandboxie Tutorial.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity and hacking news updates.


Latest articles

CISA Warns of Scammers Impersonating as CISA Employees

The Cybersecurity and Infrastructure Security Agency (CISA) has issued a warning about a surge...

Microsoft Windows Ntqueryinformationtoken Flaw Let Attackers Escalate Privileges

Microsoft has disclosed a critical vulnerability identified as CVE-2024-30088.With a CVSS score of 8.8, this flaw affects Microsoft...

256,000+ Publicly Exposed Windows Servers Vulnerable to MSMQ RCE Flaw

Cybersecurity watchdog Shadowserver has identified 256,000+ publicly exposed servers vulnerable to a critical Remote...

Indian National Jailed For Hacked Servers Of Company That Fired Him

An Indian national was sentenced to two years and eight months in jail for...

JetBrains Warns of GitHub Plugin that Exposes Access Tokens

A critical vulnerability (CVE-2024-37051) in the JetBrains GitHub plugin for IntelliJ-based IDEs (2023.1 and...

Critical Flaw In Apple Ecosystems Let Attackers Gain Unauthorized Access

Hackers go for Apple due to its massive user base along with rich customers,...

Hackers Exploiting Linux SSH Services to Deploy Malware

SSH and RDP provide remote access to server machines (Linux and Windows respectively) for...
Guru baran
Guru baran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Free Webinar

API Vulnerability Scanning

71% of the internet traffic comes from APIs so APIs have become soft targets for hackers.Securing APIs is a simple workflow provided you find API specific vulnerabilities and protect them.In the upcoming webinar, join Vivek Gopalan, VP of Products at Indusface as he takes you through the fundamentals of API vulnerability scanning..
Key takeaways include:

  • Scan API endpoints for OWASP API Top 10 vulnerabilities
  • Perform API penetration testing for business logic vulnerabilities
  • Prioritize the most critical vulnerabilities with AcuRisQ
  • Workflow automation for this entire process

Related Articles