Cyber Security News

Stratoshark – A New Wireshark Tool Released for Cloud

The masterminds behind the revolutionary network analyzer Wireshark have unveiled a new tool, Stratoshark, designed to bring their proven methodology to system call analysis.

Marking over 25 years since Wireshark’s inception, this latest development continues the legacy of democratizing complex technical processes through accessible, high-quality tools.

Revolutionizing Network Visibility

Wireshark, released over two decades ago, emerged as a response to the limitations of traditional network analyzers.

Back then, network analysis tools were not only prohibitively expensive but also cumbersome and inefficient.

The creators saw an opportunity to innovate, leading to the development of Wireshark, which transformed the industry and provided affordable access to network-level visibility.

Are you from SOC/DFIR Teams? - Analyse Malware Files & Links with ANY.RUN Sandox -> Try for Free

With over 5 million daily users and more than 160 million downloads in the past decade, Wireshark has become a staple in the toolkit of IT professionals worldwide.

Beyond its widespread adoption for packet analysis, its design principles intuitive workflows, versatile filtering, and seamless troubleshooting set a benchmark for technical tools.

Recognizing the parallels between network packet analysis and modern challenges in the cloud-driven world, the creators of Wireshark have extended their expertise to system call analysis with Stratoshark.

Built on the philosophy that drove Wireshark’s success, Stratoshark enables users to capture and analyze Linux machine activity, including inside containers.

From file I/O and command executions to interprocess communication and network activity, Stratoshark consolidates system-level events into a unified, intuitive interface.

Designed for familiarity, Stratoshark adopts Wireshark’s user-friendly three-pane user interface, allowing users to efficiently navigate between high-level views and granular details.

The tool also retains Wireshark’s robust filtering system, enabling precision for both troubleshooting and security investigations.

Furthermore, Stratoshark integrates seamlessly with Falco, a popular runtime security tool, to streamline workflows for detecting and analyzing suspicious activity.

Users can customize displays to align with specific use cases, making Stratoshark a versatile solution for diverse technical environments.

Bridging Gaps in Cloud and Security

In a world where cloud-based applications produce massive volumes of data, existing log management tools are often slow and expensive.

Stratoshark addresses these gaps by offering a faster, more cost-effective alternative tailored for modern system call analysis.

According to SysDig, its ability to analyze system activity at granular levels is particularly beneficial for diagnosing performance issues and investigating security events.

With Stratoshark, longtime Wireshark users will find themselves in familiar territory, leveraging the same shortcuts, panels, and filter language they’ve grown accustomed to.

For newcomers, Stratoshark offers an accessible yet powerful approach to understanding system behavior.

The creators, reflecting on their journey from Wireshark to Stratoshark, expressed enthusiasm for this next chapter.

“We might have more gray hair (or less of it), but working collaboratively on Stratoshark has been exhilarating. We can’t wait for users to experience it and welcome their feedback.”

With Stratoshark, the developers aim to redefine system call analysis the same way they once reimagined network packet analysis, bridging the gap between complexity and usability for today’s IT landscape.

Integrating Application Security into Your CI/CD Workflows Using Jenkins & Jira -> Free Webinar

Aman Mishra

Aman Mishra is a Security and privacy Reporter covering various data breach, cyber crime, malware, & vulnerability.

Recent Posts

DeepSeek is Now Available With Microsoft Azure AI Foundry

Microsoft has officially added DeepSeek R1, an advanced AI model, to its Azure AI Foundry…

2 minutes ago

New Apple SLAP & FLOP Side-Channel Attacks Let Attackers Steal Login Details From Browser

Researchers from the Georgia Institute of Technology and Ruhr University Bochum have uncovered two novel…

12 hours ago

Hackers Exploit OAuth 2.0 Code Flow Using AiTM Attack on Microsoft Azure AD

Security enthusiasts and professionals are turning their focus towards a new angle on phishing attacks…

12 hours ago

Russian APT28 Hackers Exploit Zero-Day Vulnerabilities to Target Government and Security Sectors

A detailed analysis from Maverits, a leading cybersecurity firm, reveals a significant evolution in the…

12 hours ago

Lynx Ransomware Architecture to Attack Windows, Linux, ESXi Uncovered

The emergence of the Lynx Ransomware-as-a-Service (RaaS) platform has drawn significant attention in cybersecurity circles,…

12 hours ago

WhatsApp’s “View Once” Feature Flaw Let Anyone View the Image Unlimitedly

Privacy is the cornerstone of digital communication in today’s world, and platforms like WhatsApp consistently…

16 hours ago