CISA Releases Thorium for Automated Malware Analysis

By

The platform lets teams integrate multiple analysis tools.

The Cybersecurity and Infrastructure Security Agency (CISA), along with Sandia National Laboratories, has released Thorium – “a scalable platform for automated file analysis and result aggregation.”

Thorium lets teams integrate commercial and open source analysis tools to assess malware threats and generate forensic analysis results. It is “configured to ingest over 10 million files per hour per permission group and schedule over 1,700 jobs per second, while maintaining a fast results query,” the announcement states.

The platform lets you integrate command-line tools as Docker images and can be used for:

  • Filtering tool results
  • Controlling access through strict group-based permissions
  • Defining event triggers and tool execution sequences to automate workflows
  • Result aggregation
  • Tool sharing

Learn more at Thorium.
 
 

 
 
 

08/08/2025

Related content

  • Tech News
    In the news: Hetzner Announces S3-Compatible Object Storage; Ongoing Cyberattack Prompts New CISA Guidance for Communications Infrastructure; OpenMP 6.0 Released; Open Source Development Improves Software Security, Says LF Report; Most Organizations Are Unprepared for Climate-Related Disruptions; and SUSE Cloud Observability Announced.
  • News for Admins
    In the news: DHS Releases New Guidelines for Securing Critical Infrastructure; Datadog Report Examines DevSecOps Best Practices; Upskilling Key to Tech Staffing Challenges, Says LF Survey; 2024 Open Source Pros Job Survey Report Released; OpenSSF Issues Guidance to Help Prevent Social Engineering Attacks; Black Duck Supply Chain Edition Released by Synopsys; Spectra Logic Announces New Tape Libraries and Management Software; LPI Launches Open Source Essentials Program; Apache Software Foundation Celebrates 25 Years; SUSE Announces Rancher Prime 3.0; NSA Issues Zero Trust Guidelines for Network Security; and NIST Releases Major New Version of Cybersecurity Framework.
  • NSA’s Reverse Engineering Tool Released
  • The Cuckoo sandboxing malware analysis tool
    The open source Cuckoo Sandbox malware analysis system investigates malicious software.
  • Ransomware: Prepare for emergencies
    The danger of ransomware attacks calls for a robust backup and monitoring strategy.
comments powered by Disqus
Subscribe to our ADMIN Newsletters
Subscribe to our Linux Newsletters
Find Linux and Open Source Jobs



Support Our Work

ADMIN content is made possible with support from readers like you. Please consider contributing when you've found an article to be beneficial.

Learn More”>
	</a>

<hr>		    
			</div>
		    		</div>

		<div class=