In which applications to wait for an unknown malicious code?

    Today I looked through the Wildfire statistics and it became interesting for which applications the unknown malicious code (zero-day) walks and how often. The picture shows statistics on applications and the frequency of attacks through this application. The first column is the name of the application. The second column indicates how many days per year in this application select the zero-day. The third column is the number of sessions of this application or, in fact, the number of samples per year. Statistics taken for the entire 2018 from January to December.

    Interestingly, there are applications that malicious code rarely use, such as the SOAP application, but they see it every day. There is where every day and in large volumes. I can see from my experience that the most frequent sandboxing applications are SMTP and web-browsing. Other applications are usually ignored. Most likely, the attacks take place just where they are not expected.

    image
    The Wildfire cloud sandbox is accessible from any corner of the Internet, you can send files to it for checking from any firewall or any host or even check the interface manually via the web.
    Interestingly, the Wildfire signature database is updated by all participants every minute, respectively, all those who subscribe to the zero-day update service can pick up fresh signatures every minute and block freshly found zero-day other members of the community in the network or workstation in a timely manner.

    Only registered users can participate in the survey. Sign in , please.

    What applications do you check with the sandbox?


    Also popular now: