Cyber Security News

Stratoshark – A New Wireshark Tool Released for Cloud

The masterminds behind the revolutionary network analyzer Wireshark have unveiled a new tool, Stratoshark, designed to bring their proven methodology to system call analysis.

Marking over 25 years since Wireshark’s inception, this latest development continues the legacy of democratizing complex technical processes through accessible, high-quality tools.

Revolutionizing Network Visibility

Wireshark, released over two decades ago, emerged as a response to the limitations of traditional network analyzers.

Back then, network analysis tools were not only prohibitively expensive but also cumbersome and inefficient.

The creators saw an opportunity to innovate, leading to the development of Wireshark, which transformed the industry and provided affordable access to network-level visibility.

Are you from SOC/DFIR Teams? - Analyse Malware Files & Links with ANY.RUN Sandox -> Try for Free

With over 5 million daily users and more than 160 million downloads in the past decade, Wireshark has become a staple in the toolkit of IT professionals worldwide.

Beyond its widespread adoption for packet analysis, its design principles intuitive workflows, versatile filtering, and seamless troubleshooting set a benchmark for technical tools.

Recognizing the parallels between network packet analysis and modern challenges in the cloud-driven world, the creators of Wireshark have extended their expertise to system call analysis with Stratoshark.

Built on the philosophy that drove Wireshark’s success, Stratoshark enables users to capture and analyze Linux machine activity, including inside containers.

From file I/O and command executions to interprocess communication and network activity, Stratoshark consolidates system-level events into a unified, intuitive interface.

Designed for familiarity, Stratoshark adopts Wireshark’s user-friendly three-pane user interface, allowing users to efficiently navigate between high-level views and granular details.

The tool also retains Wireshark’s robust filtering system, enabling precision for both troubleshooting and security investigations.

Furthermore, Stratoshark integrates seamlessly with Falco, a popular runtime security tool, to streamline workflows for detecting and analyzing suspicious activity.

Users can customize displays to align with specific use cases, making Stratoshark a versatile solution for diverse technical environments.

Bridging Gaps in Cloud and Security

In a world where cloud-based applications produce massive volumes of data, existing log management tools are often slow and expensive.

Stratoshark addresses these gaps by offering a faster, more cost-effective alternative tailored for modern system call analysis.

According to SysDig, its ability to analyze system activity at granular levels is particularly beneficial for diagnosing performance issues and investigating security events.

With Stratoshark, longtime Wireshark users will find themselves in familiar territory, leveraging the same shortcuts, panels, and filter language they’ve grown accustomed to.

For newcomers, Stratoshark offers an accessible yet powerful approach to understanding system behavior.

The creators, reflecting on their journey from Wireshark to Stratoshark, expressed enthusiasm for this next chapter.

“We might have more gray hair (or less of it), but working collaboratively on Stratoshark has been exhilarating. We can’t wait for users to experience it and welcome their feedback.”

With Stratoshark, the developers aim to redefine system call analysis the same way they once reimagined network packet analysis, bridging the gap between complexity and usability for today’s IT landscape.

Integrating Application Security into Your CI/CD Workflows Using Jenkins & Jira -> Free Webinar

Aman Mishra

Aman Mishra is a Security and privacy Reporter covering various data breach, cyber crime, malware, & vulnerability.

Recent Posts

PAN-OS Command Injection Flaw Lets Hackers Execute Arbitrary Code Remotely

Palo Alto Networks has disclosed a medium-severity vulnerability (CVE-2025-0127) in its PAN-OS software, enabling authenticated…

10 minutes ago

Researchers Uncover Hacking Tools and Techniques Shared on Russian-Speaking Cybercrime Forums

Trend Micro, a cybersecurity firm, has released its 50th installment report on the Russian-speaking cybercriminal…

10 hours ago

SideCopy APT Hackers Impersonate Government Officials to Deploy Open-Source XenoRAT Tool

The Pakistan-linked Advanced Persistent Threat (APT) group known as SideCopy has significantly expanded its targeting…

11 hours ago

Russian APT Hackers Use Device Code Phishing Technique to Bypass MFA

Russian state-backed advanced persistent threat (APT) group Storm-2372 has exploited device code phishing to bypass…

12 hours ago

Threat Actors Exploit Messaging Services as Lucrative Cybercrime Platforms

Threat actors are exploiting weaknesses in SMS verification systems to generate massive, fraudulent message traffic,…

12 hours ago

Scattered Spider Launches Sophisticated Attacks to Steal Login Credentials and MFA Tokens

The cyber threat landscape has witnessed remarkable adaptation from the notorious hacker collective known as…

12 hours ago