SourceSecurity.com
  • Products
    CCTV
    • CCTV cameras
    • CCTV software
    • IP cameras
    • Digital video recorders (DVRs)
    • Dome cameras
    • Network video recorders (NVRs)
    • IP Dome cameras
    • CCTV camera lenses
    Access Control
    • Access control readers
    • Access control software
    • Access control controllers
    • Access control systems & kits
    • Audio, video or keypad entry
    • Electronic locking devices
    • Access control cards/ tags/ fobs
    • Access control system accessories
    Intruder Alarms
    • Intruder alarm system control panels & accessories
    • Intruder detectors
    • Intruder warning devices
    • Intruder alarm communicators
    • Intruder alarm accessories
    • Intruder alarm lighting systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

  • Companies
    Companies
    • Manufacturers
    • Distributors
    • Resellers / Dealers / Reps
    • Installers
    • Consultants
    • Systems integrators
    • Events / Training / Services
    • Manned guarding
    Companies by Product area
    • CCTV
    • Access control
    • Intruder alarm
    • IP networking products
    • Biometrics
    • Software
    • Digital video recording
    • Intercom systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • News
    News
    • Product news
    • Corporate news
    • Case studies
    • Events news
    Latest
    • Hikvision attains ISO 37301 Certification for Compliance Management System
    • SentriGuard's role in sustainable security solutions
    • Axis joins CISA Secure by design for cybersecurity
    • Xtract One's SmartGateway enhances Nova Scotia security
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Insights
    Insights
    • Expert commentary
    • Security beat
    • Round table discussions
    • Round Table Expert Panel
    • eMagazines
    • Year in Review 2023
    • Year in Review 2022
    Featured
    • What are emerging applications for physical security in transportation?
    • What is the most overlooked factor when installing security systems?
    • Amid rising certificate demands, stricter compliance and quantum threats, PKIaaS is a necessity
    • How should security adapt to the unique aspects of healthcare?
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Markets
    Markets
    • Airports & Ports
    • Banking & Finance
    • Education
    • Hotels, Leisure & Entertainment
    • Government & Public Services
    • Healthcare
    • Remote Monitoring
    • Retail
    • Transportation
    • Industrial & Commercial
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Alamo enhances security with Alcatel-Lucent solutions

    Alamo enhances security with Alcatel-Lucent solutions

    The University of Dundee implements HID for modern access control

    The University of Dundee implements HID for modern access control

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    SBB upgrades surveillance with Hanwha Vision cameras

    SBB upgrades surveillance with Hanwha Vision cameras

  • Events
    Events
    • International security
    • Regional security
    • Vertical market
    • Technology areas
    • Conferences / seminars
    • Company sponsored
    Virtual events
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Security Storage
    • Video Management Systems
    • Integrated Systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Technology Summit International 2025

    Technology Summit International 2025

    G2E Philippines 2025

    G2E Philippines 2025

    IFSEC India 2025

    IFSEC India 2025

  • White papers
    White papers
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Video Compression
    • Security Storage
    White papers by company
    • HID
    • ASSA ABLOY Opening Solutions
    • Milestone Systems
    • Eagle Eye Networks
    • Hanwha Vision America
    Other Resources
    • eMagazines
    • Videos
    Aligning physical and cyber defence for total protection

    Aligning physical and cyber defence for total protection

    Understanding AI-powered video analytics

    Understanding AI-powered video analytics

    Modernizing access control

    Modernizing access control

    Enhancing physical access control using a self-service model

    Enhancing physical access control using a self-service model

About us Advertise
  • AI-powered video analytics
  • AI special report
  • Cyber security special report
  • 6
Cyber security
  • Home
  • About
  • News
  • Expert commentary
  • Security beat
  • Case studies
  • Round table
  • Products
  • White papers
  • Videos

Check out our special report on casino security

Get it now!

5 advantages of using a malware sandbox as part of your cyber security strategy

5 advantages of using a malware sandbox as part of your cyber security strategy
Stanislav Gaivoronskii
Stanislav Gaivoronskii
Contact company
Contact ANY.RUN
icon Add as a preferred source Download PDF version
Quick Read
⌵
Summary is AI-generated, newsdesk-reviewed
  • Malware sandboxes enhance email security by scanning and verifying phishing threats.
  • Sandboxes allow safe malware detonation, protecting against infected ads and programs.
  • Analysis speeds up zero-day attack response, reducing potential data breach costs.
Related Links
  • How does multi-factor authentication impact security?
  • 4 trends to follow at ISC West

The number of cyber attacks around the world has been steadily increasing year after year; for example, in 2022, the weekly rate of attacks on corporate networks was 38% higher than in 2021.

The potential financial losses of a data breach are substantial, with IBM's report putting the average cost at $4.35M. In order to reduce incidents quickly, organisations must take action and prevent them from happening in the first place. And using an interactive malware sandbox is a cost-effective and simple means of improving cybersecurity from the start. This article delves into the advantages this tool brings and how companies can benefit from it.

Potential financial losses

What is a malware sandbox? A malware sandbox is a virtual machine for malware analysis and dynamic testing. Security professionals use it to monitor malicious software and search for IOCs (Indicators of Compromise). These IOCs can inform endpoint detection systems and help protect future attacks. Here are five ways a sandbox can increase security for an organisation.

A malware sandbox is a virtual machine for malware analysis and dynamic testing

A malware sandbox increases email security - On average, one of every hundred emails that your organisation receives is a phishing attempt and one out of two hundred emails contains malicious software. Email is by far the most popular attack vector.

A single employee opening an infected document, likely sent in a way that the recipient is unaware of any danger, can cause the entire system to be breached. To reduce your risk of being infected, you should teach your staff about the potential harm of spear-phishing and phishing scams, as well as utilise a malware sandbox for scanning and verifying the threats.

  • First and foremost, employees should be able to spot a suspicious email.
  • Instead of immediately opening it, they should seek the help of an experienced defence professional.
  • Cybersecurity experts can then analyse the suspect object in a sandbox environment.
  • The analysis usually takes no longer than minutes and at the end, a report is generated.
  • If it turns out to be a false alarm, then employees can carry on with the email with no harm done.
  • But if it wasn't, you may have just saved yourself from potential disaster.

Safely detonating malware

A malware sandbox helps to analyse programs and links - Malicious emails are not the only form of payload delivery. Recently, criminals have begun to exploit Google Ads by creating replicas of open-source and commercial software to infect users.

Ads placed above organic search results often lead unsuspecting users to these infected versions

Ads placed above organic search results often lead unsuspecting users to these infected versions. The good news is that almost all malware requires some sort of user interaction to do damage, and sandboxes allow researchers to safely detonate malware in an isolated environment.

Suspicious network activity

A sandbox can help to respond to zero-day attacks quicker - Zero-day exploits have caused some of the most devastating attacks in history, like WannaCry ransomware and SolarWinds supply chain attack. While a sandbox won't prevent such incidents, it can help reduce their damage by allowing for quicker recovery. On average, companies can save $3M by reducing incident recovery time.

Let's say that a security professional notices suspicious network activity. They might immediately block the traffic stream with a firewall rule. But further investigation is still needed to determine how much of the system was compromised. Researchers can use a malware sandbox to execute the malicious file and collect the information about the processes, files, and network activity if created. Containment and eradication can then begin, such as developing a killswitch or restoring parts of the system from a backup.

Suspicious activity in the network traffic
Suspicious activity in the network traffic

Anticipating future risks

A sandbox can strengthen your threat-based security - At this moment, there are more than a billion samples of malicious programs floating around the internet, and thousands of new variations being created every month. A major component of any organisation's security is being aware of the current threat environment and having the capability to quickly adjust tactics to anticipate future risks.

Cybersecurity experts use a variety of techniques to stay up-to-date on the latest threats

Cybersecurity experts use a variety of techniques to stay up-to-date on the latest threats facing their organisation and its users. These techniques can include reading reports written by other experts in the field, exploring underground malware marketplaces, and downloading new samples for analysis, and more. A malware sandbox can be a great tool for analysis, speeding up productivity for researchers by collecting IOCs in minutes and determining whether further investigation is needed.

Reverse engineering malicious code

A sandbox is a huge help when it comes to malware analysis - Analysing malware is tricky, time-consuming, and can put networks at risk if done incorrectly.

Because malware developers use code obfuscation and divide execution into stages to fool researchers, reverse engineering malicious code requires deobfuscating encoded strings, reconstructing functions that broken into parts are scattered across thousands of lines of code, and general head scratching.

It’s an analyst’s job to understand what this does
It’s an analyst’s job to understand what this does

Threat-based security

A malware sandbox, however, can do the same job in two minutes or less

Even with a familiar sample that may have some new obfuscation techniques, it can take an analyst at least 15-30 minutes to dig into the code and get to the key information. A malware sandbox, however, can do the same job in two minutes or less.

In summary, a malware sandbox can increase email security, help analyse programs, enable quick response to zero-day attacks, and strengthen threat-based security. Ultimately, it can help reduce the cost of potential data breaches, or prevent them entirely.

Stanislav Gaivoronskii is a malware analyst at ANY.RUN malware sandbox, the first interactive online malware analysis sandbox. He has more than 9 years of experience in the digital forensics field and 4 years in malware analysis.

Discover how AI, biometrics, and analytics are transforming casino security

Download PDF version Download PDF version
Google logo Add as a preferred source on Google
  • Network / IP
  • Biometrics
  • Security devices
  • Security cameras
  • Security camera systems
  • Radio frequency Identification
  • Video analytics
  • Network cameras
  • Security software
  • Security service
  • Green security
  • Integration software
  • Cyber security
  • Warning Devices
  • Related links
  • ANPR Software CCTV software
  • GSM Intruder alarm communicators
  • Detection Software CCTV software
  • TFT LCD CCTV monitors
  • Radiowave Intruder alarm communicators
  • IP Surveillance Software CCTV software
  • Management Software CCTV software
  • Recording Software CCTV software
  • WAN Intruder alarm communicators
  • Surveillance Software CCTV software
  • IP / GPRS Intruder alarm communicators
  • Articles by Stanislav Gaivoronskii
  • Related categories
  • CCTV software
  • Intruder alarm communicators
  • CCTV monitors
Related white papers
Aligning physical and cyber defence for total protection

Aligning physical and cyber defence for total protection

Download
Combining security and networking technologies for a unified solution

Combining security and networking technologies for a unified solution

Download
System design considerations to optimize physical access control

System design considerations to optimize physical access control

Download
Related articles
How physical security consultants ensure cybersecurity for end users

How physical security consultants ensure cybersecurity for end users

How managed detection and response enhances cybersecurity management in organisations

How managed detection and response enhances cybersecurity management in organisations

Drawbacks of PenTests and ethical hacking for the security industry

Drawbacks of PenTests and ethical hacking for the security industry

Follow us

Sections Products CCTV Access Control Intruder Alarms Companies News Insights Case studies Markets Events White papers Videos AI special report Cyber security special report RSS
Topics Artificial intelligence (AI) Mobile access Healthcare security Counter terror Cyber security Robotics Thermal imaging Intrusion detection Body worn video cameras
About us Advertise About us 10 guiding principles of editorial content FAQs eNewsletters Sitemap Terms & conditions Privacy policy and cookie policy
  1. Home
  2. Topics
  3. Cyber security
  4. News
  5. Expert commentary
About this page

Discover the five key benefits of using a malware sandbox to protect your organization from cyber threats, including identifying and analyzing unknown samples and testing security solutions.

See this on SecurityInformed.com

Subscribe to our Newsletter

Stay updated with the latest trends and technologies in the security industry
Sign Up

DMA

SourceSecurity.com - Making the world a safer place
Copyright © Notting Hill Media Limited 2000 - 2025, all rights reserved

Our other sites:
SecurityInformed.com | TheBigRedGuide.com | HVACinformed.com | MaritimeInformed.com | ElectricalsInformed.com

Subscribe to our Newsletter


You might also like
Understanding AI-powered video analytics
Understanding AI-powered video analytics
Security and surveillance technologies for the casino market
Security and surveillance technologies for the casino market
Modernizing access control
Modernizing access control
Addressing Cybersecurity Vulnerabilities in the Physical World
Addressing Cybersecurity Vulnerabilities in the Physical World
SourceSecurity.com
SecurityInformed.com

Browsing from the Americas? Looking for our US Edition?

View this content on SecurityInformed.com, our dedicated portal for our Americas audience.

US Edition International Edition
Sign up now for full access to SourceSecurity.com content
Download Datasheet
Download PDF Version
Download SourceSecurity.com product tech spec