PrivacyDigest<p><a href="https://mas.to/tags/cisawarning" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cisawarning</span></a> open-sources <a href="https://mas.to/tags/Thorium" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Thorium</span></a> platform for <a href="https://mas.to/tags/malware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>malware</span></a> , <a href="https://mas.to/tags/forensic" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>forensic</span></a> analysis </p><p>"Thorium enhances <a href="https://mas.to/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> teams' capabilities by automating analysis workflows through seamless integration of commercial, open-source, and custom tools," CISA said on Thursday.</p><p><a href="https://www.bleepingcomputer.com/news/security/cisa-open-sources-thorium-platform-for-malware-forensic-analysis/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">bleepingcomputer.com/news/secu</span><span class="invisible">rity/cisa-open-sources-thorium-platform-for-malware-forensic-analysis/</span></a></p>