Saturday, May 24, 2025
HomeCyber Security NewsStratoshark - A New Wireshark Tool Released for Cloud

Stratoshark – A New Wireshark Tool Released for Cloud

Published on

SIEM as a Service

Follow Us on Google News

The masterminds behind the revolutionary network analyzer Wireshark have unveiled a new tool, Stratoshark, designed to bring their proven methodology to system call analysis.

Marking over 25 years since Wireshark’s inception, this latest development continues the legacy of democratizing complex technical processes through accessible, high-quality tools.

Revolutionizing Network Visibility

Wireshark, released over two decades ago, emerged as a response to the limitations of traditional network analyzers.

- Advertisement - Google News

Back then, network analysis tools were not only prohibitively expensive but also cumbersome and inefficient.

The creators saw an opportunity to innovate, leading to the development of Wireshark, which transformed the industry and provided affordable access to network-level visibility.

Are you from SOC/DFIR Teams? - Analyse Malware Files & Links with ANY.RUN Sandox -> Try for Free

With over 5 million daily users and more than 160 million downloads in the past decade, Wireshark has become a staple in the toolkit of IT professionals worldwide.

Beyond its widespread adoption for packet analysis, its design principles intuitive workflows, versatile filtering, and seamless troubleshooting set a benchmark for technical tools.

Recognizing the parallels between network packet analysis and modern challenges in the cloud-driven world, the creators of Wireshark have extended their expertise to system call analysis with Stratoshark.

Built on the philosophy that drove Wireshark’s success, Stratoshark enables users to capture and analyze Linux machine activity, including inside containers.

From file I/O and command executions to interprocess communication and network activity, Stratoshark consolidates system-level events into a unified, intuitive interface.

Designed for familiarity, Stratoshark adopts Wireshark’s user-friendly three-pane user interface, allowing users to efficiently navigate between high-level views and granular details.

The tool also retains Wireshark’s robust filtering system, enabling precision for both troubleshooting and security investigations.

Furthermore, Stratoshark integrates seamlessly with Falco, a popular runtime security tool, to streamline workflows for detecting and analyzing suspicious activity.

Users can customize displays to align with specific use cases, making Stratoshark a versatile solution for diverse technical environments.

Bridging Gaps in Cloud and Security

In a world where cloud-based applications produce massive volumes of data, existing log management tools are often slow and expensive.

Stratoshark addresses these gaps by offering a faster, more cost-effective alternative tailored for modern system call analysis.

According to SysDig, its ability to analyze system activity at granular levels is particularly beneficial for diagnosing performance issues and investigating security events.

With Stratoshark, longtime Wireshark users will find themselves in familiar territory, leveraging the same shortcuts, panels, and filter language they’ve grown accustomed to.

For newcomers, Stratoshark offers an accessible yet powerful approach to understanding system behavior.

The creators, reflecting on their journey from Wireshark to Stratoshark, expressed enthusiasm for this next chapter.

“We might have more gray hair (or less of it), but working collaboratively on Stratoshark has been exhilarating. We can’t wait for users to experience it and welcome their feedback.”

With Stratoshark, the developers aim to redefine system call analysis the same way they once reimagined network packet analysis, bridging the gap between complexity and usability for today’s IT landscape.

Integrating Application Security into Your CI/CD Workflows Using Jenkins & Jira -> Free Webinar

Aman Mishra
Aman Mishra
Aman Mishra is a Security and privacy Reporter covering various data breach, cyber crime, malware, & vulnerability.

Latest articles

Zero-Trust Policy Bypass Enables Exploitation of Vulnerabilities and Manipulation of NHI Secrets

A new project has exposed a critical attack vector that exploits protocol vulnerabilities to...

Threat Actor Sells Burger King Backup System RCE Vulnerability for $4,000

A threat actor known as #LongNight has reportedly put up for sale remote code...

Chinese Nexus Hackers Exploit Ivanti Endpoint Manager Mobile Vulnerability

Ivanti disclosed two critical vulnerabilities, identified as CVE-2025-4427 and CVE-2025-4428, affecting Ivanti Endpoint Manager...

Hackers Target macOS Users with Fake Ledger Apps to Deploy Malware

Hackers are increasingly targeting macOS users with malicious clones of Ledger Live, the popular...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Zero-Trust Policy Bypass Enables Exploitation of Vulnerabilities and Manipulation of NHI Secrets

A new project has exposed a critical attack vector that exploits protocol vulnerabilities to...

Threat Actor Sells Burger King Backup System RCE Vulnerability for $4,000

A threat actor known as #LongNight has reportedly put up for sale remote code...

Chinese Nexus Hackers Exploit Ivanti Endpoint Manager Mobile Vulnerability

Ivanti disclosed two critical vulnerabilities, identified as CVE-2025-4427 and CVE-2025-4428, affecting Ivanti Endpoint Manager...