Resolution1 ThreatScanner™ detects Regin and Sony hacks

Resolution1 Security, the leader in incident resolution solutions, has announced the availability of ThreatScanner™, a new freeware tool that searches for malware artifacts on a suspect endpoint. Using ThreatScanner, security personnel will be able to quickly and proactively hunt for threats to minimize the impact of an attack by instantly identifying compromised systems. Once installed, they can immediately scan for malware, including those attributed to the recent Regin and Sony Pictures hacks.

ThreatScanner is a powerful detection tool that’s easy to use and flexible to create customized scans using current threat formats. Once downloaded, the command-line tool runs a simple script to hunt for indications of compromise (IOCs) or YARA rules on a Microsoft Windows endpoint. An automatically generated report (HTML and XML) provides details of suspicious artifacts so that analysts can take immediate action.

With this initial release, the integration of IOC and YARA rules is a technology first to use both formats simultaneously for greater search flexibility. Current tools are limiting in that they scan one or the other but not both. ThreatScanner comes preconfigured with a Regin IOC and Regin YARA rule, as well as a Sony IOC.

“We’ve developed ThreatScanner to help not only our customers, but also the security community at large, by making this freeware tool widely available,” said Brian Karney, CEO of Resolution1 Security. “In today’s advanced threat landscape, enterprises need to be proactive and hunt for threats rather than passively rely on the thousands of daily SIEM alerts. We built ThreatScanner to give security teams additional tools to strengthen their incident response.”

“As the severity of advanced attacks increases, one of the biggest challenges we have is quickly determining if we have an issue and the extent of the impact across our enterprise,” said Eric Hlutke, Global Director of IT Security Architecture & Strategy at Anheuser Busch. “Having a flexible free tool, like ThreatScanner to quickly determine if a single suspect machine has a problem is powerful, especially with the recent Regin and Sony attacks.”

“Our company realised we needed to strengthen and invest in our information security and incident response after experiencing increased incidents,” said Chris Morris, Owner at Turrem Data. “We implemented proactive processes to hunt for suspicious activities to get in front of major cyberattacks. A free tool like ThreatScanner is a much needed capability for scanning suspect machines for threat issues that can rapidly escalate to major incidents.”

ThreatScanner is available for immediate download here.

About Security Buyer

Security Buyer is the leading authority in global security content, delivering expert news, in-depth articles, exclusive interviews, and industry insights across print, digital, and event platforms. Published 10 times a year, the magazine is a trusted resource for professionals seeking updates and analysis on the latest developments in the security sector.

To submit an article, or for sponsorship opportunities, please contact our team below.

Rebecca Spayne picture 2025

Rebecca Spayne

Managing
EDITOR

Georgina Turner image

Georgina Turner

Sales
Manager

Afua Akoto image - Security Buyer

Afua Akoto

Marketing Manager

Read the Latest Issue

Follow us on X

Follow us on X

Click Here

Follow us on LinkedIn

Follow us on LinkedIn

Click Here

Advertise here

Reach decision makers and amplify your marketing

Advertise here

Click Here

Related News

MOVEit cyber-attacks prompt UK business

In the wake of the MOVEit vulnerability, which impacted an estimated 40 million people worldwide, UK business leaders are increasing…

Most cyber attacks in Middle East involve spyware

Positive Technologies has analysed the attacks carried out on individuals in Middle Eastern countries between 2022…
Cyber

Savanti reveals cybersecurity threats

Following the release of a recent report by UK cybersecurity consultancy Savanti, which warns of increased cyberattack

BeyondTrust makes security insights available

BeyondTrust recently announced the general availability of its Identity Security Insights solution. With the escalating complexity of cyber…

Trellix expands their XDR platform

Trellix, the cybersecurity company delivering the future of extended detection and response (XDR), has announced the expansion of its XDR platform.
Camera

Camera and microphone been hacked?

Microphone and camera hacking is when an attacker gains remote access to a device’s camera and microphone – usually with the…

New UK rules to protect telecoms networks

The new telecoms security regulations will be among the strongest in the world and will provide much tougher protections for the UK.

Nozomi reveal global cyber threat in latest report

The latest report from Nozomi Networks Labs finds malware, botnet activity and the Russia/Ukraine war impacted the threat landscape in 2022. 
malware

Peer Software will monitor malware patterns

Peer Software today announced the formation of a strategic alliance with Pulsar Security to continuously analyse malware attack patterns.
Scroll to Top