Explore Joe Security Cloud Basic Accounts Contact Us
top title background image

Joe Security's Blog

Joe Sandbox v36 Rainbow Opal

Today we release Joe Sandbox 36 under the code name Rainbow Opal! This release is packed with many new detection signatures and interesting features to make malware detection even more precise!Our Joe Sandbox Cloud Pro, Basic and OEM servers have recently been upgraded to Rainbow Opal.If you wish to upgrade your on-premise Joe Sandbox Desktop, Mobile, X, Linux, Complete or Ultimate installation right away, please read the Update Guide that you receive via our mailing list. Note that this update requires an OS update to Ubuntu 22.04 first.

Read more...

Joe Sandbox v35 Citrine

Today we release Joe Sandbox 35 under the code name Citrine! This release is packed with many new detection signatures and interesting features to make malware detection even more precise!Our Joe Sandbox Cloud Pro, Basic and OEM servers have recently been upgraded to Citrine.If you wish to upgrade your on-premise Joe Sandbox Desktop, Mobile, X, Linux, Complete or Ultimate installation right away, please run the following command:mono joeboxserver.exe --updatefast 215 new SignaturesWith these brand new Yara and Behavior signatures, Joe Sandbox is able to precisely detect various new malware families like syslogk, BlackBasta, Record Stealer, Symbiote, SVCReady, PrivateLoader, BPFDoor, BumbleBee and many more. In addition, we added 9 Malware Configuration Extractors, e.

Read more...

Live Interaction and Results

 In this blog post we are going to outline a new and exciting technology we have built some time ago and have extended over time. The technology enables analysts to directly interact with the analyzer and in addition get live data on detection rules, verdicts, IOCs etc. Why is this a great feature and useful for analysts? Manual AnalysisJoe Sandbox features various technologies to automate user behavior. Here is a good example:Full Analysis Report: https://www.

Read more...