RL Blog

Topics

All Blog PostsAppSec & Supply Chain SecurityDev & DevSecOpsProducts & TechnologySecurity OperationsThreat Research

Follow us

XX / TwitterLinkedInLinkedInFacebookFacebookInstagramInstagramYouTubeYouTubeblueskyBluesky

Subscribe

Get the best of RL Blog delivered to your in-box weekly. Stay up to date on key trends, analysis and best practices across threat intelligence and software supply chain security.

ReversingLabs: The More Powerful, Cost-Effective Alternative to VirusTotalSee Why
Skip to main content
Contact UsSupportLoginBlogCommunity
reversinglabsReversingLabs: Home
Solutions
Secure Software OnboardingSecure Build & ReleaseProtect Virtual MachinesIntegrate Safe Open SourceGo Beyond the SBOM
Increase Email Threat ResilienceDetect Malware in File Shares & StorageAdvanced Malware Analysis SuiteICAP Enabled Solutions
Scalable File AnalysisHigh-Fidelity Threat IntelligenceCurated Ransomware FeedAutomate Malware Analysis Workflows
Products & Technology
Spectra Assure®Software Supply Chain SecuritySpectra DetectHigh-Speed, High-Volume, Large File AnalysisSpectra AnalyzeIn-Depth Malware Analysis & Hunting for the SOCSpectra IntelligenceAuthoritative Reputation Data & Intelligence
Spectra CoreIntegrations
Industry
Energy & UtilitiesFinanceHealthcareHigh TechPublic Sector
Partners
Become a PartnerValue-Added PartnersTechnology PartnersMarketplacesOEM Partners
Alliances
Resources
BlogContent LibraryCybersecurity GlossaryConversingLabs PodcastEvents & WebinarsLearning with ReversingLabsWeekly Insights Newsletter
Customer StoriesDemo VideosDocumentationOpenSource YARA Rules
Company
About UsLeadershipCareersSeries B Investment
EventsRL at RSAC
Press ReleasesIn the News
Pricing
Software Supply Chain SecurityMalware Analysis and Threat Hunting
Request a demo
Menu

Spectra Assure Free Trial

Get your 14-day free trial of Spectra Assure for Software Supply Chain Security

Get Free TrialMore about Spectra Assure Free Trial
Blog
Events
About Us
Webinars
In the News
Careers
Demo Videos
Cybersecurity Glossary
Contact Us
reversinglabsReversingLabs: Home
Privacy PolicyCookiesImpressum
All rights reserved ReversingLabs © 2026
XX / TwitterLinkedInLinkedInFacebookFacebookInstagramInstagramYouTubeYouTubeblueskyBlueskyRSSRSS
Back to Top
Products & TechnologyNovember 17, 2022

Introducing ReversingLabs Cloud Deep Scan, Protection for Your Cloud File Shares

ReversingLabs Cloud Deep Scan can help organizations quickly identify threats in their AWS file shares and storage. Here are the key features.

FacebookFacebookXX / TwitterLinkedInLinkedInblueskyBlueskyEmail Us
Introducing ReversingLabs Cloud Deep Scan, Protection for Your Cloud File Shares

With a large number of organizations moving to the cloud, there has been significant growth in the use of cloud B2B file shares, enabling file-based workflows between business partners and internal teams. The use of cloud storage and hosting platforms has also grown, including Amazon Web Services (AWS), which experienced a 33% growth between the first quarter of 2021 and the same period in 2022. While this has improved collaboration and business productivity, it has also increased cyber risks. Never ones to miss an opportunity, cybercriminals are taking advantage of the constantly growing and shifting cloud threat landscape.

Today, the cloud has become a new arena for cybercrime, in which threat actors are exploiting these services to spread malware and steal sensitive data from organizations. This past June, it was reported that both Pegasus Airlines, a Turkish flight operator, and Capital One suffered massive data breaches as a result of cybercriminal attacks on AWS Simple Storage Service (S3). Growing threats like that mean organizations that rely on AWS must look for secure solutions to defend against cybercriminals.

Unfortunately, cloud antivirus solutions and endpoint detection and response (EDR) do not have enough depth and breadth to find advanced threats in the multi-layered applications and multi-gigabyte files that power cloud applications and services. Organizations that rely only on these legacy security solutions alone will not be fully protected from cloud-based threats, and could suffer major data breaches as a result.

This is why ReversingLabs has taken the initiative to launch our newest solution: ReversingLabs Cloud Deep Scan. This service will allow organizations to properly defend against the growing attack surface found in AWS that other solutions miss.

Here are the key elements of ReversingLabs Cloud Deep Scan.

ReversingLabs Cloud Deep Scan: The Basics

In a nutshell, ReversingLabs Cloud Deep Scan provides visibility into organizations' AWS S3 buckets. This enables secure sharing between an organization’s customers, partners and internal teams. ReversingLabs Cloud Deep Scan is a cloud-native service that finds malware in files that are up to 10GB in size and that are shared in AWS S3 buckets.

This service gives IT teams fast, synthesized file classification of both malware and goodware files. IT teams will also benefit from the solution’s fast threat intelligence, enabling quick prioritization and investigation of the most serious strains that pop up.

What Other Solutions Miss

It is clear that the need for a solution such as ReversingLabs Cloud Deep Scan is high, given that other solutions do not meet the mark in fully securing an organization’s AWS S3.

Most other solutions cannot support the volume and speed at which files need to be scanned. Given the high storage amount in AWS S3, organizations will not be able to properly classify all files with other solutions. This will hurt an organization since they will not be able to determine which files are good and which are malicious.

Additionally, many organizations have complex, multi-layered applications, which host a string of multiple parent-child file relationships, continuously interconnected with one another. This great complexity found in multi-layered applications can potentially lead to threats. Most solutions today cannot properly decompose a layered application to properly inspect it for cyber threats, leaving organizations with these kinds of applications vulnerable.

Equally important, most solutions cannot process a high number of file formats. This means that IT teams are left in the dark when it comes to file formats that a solution cannot process, leaving threats undetected.

Lastly, most other solutions that aim to secure cloud storage do not offer comprehensive and accurate threat classifications resulting in a high number of false positives (too many false alerts) and false negatives (threats slip by undetected). This creates unnecessary work for IT teams, and takes away from the effort to handle real threats.

Features You Will Want

ReversingLabs Cloud Deep Scan fills the needs of IT security teams, and exceeds expectations of what a security solution for AWS should provide.

Cloud Deep Scan features include:

  • Analyzes and classifies files up to 10 GB in size.
  • Provides high-confidence, quality and actionable classification of file types based on unique binary analysis and ReversingLabs malware/goodware repository
  • Automatically identifies 4,800 file formats.

With the help of ReversingLabs Cloud Deep Scan, organizations can feel more secure in their reliance on AWS S3. IT security teams will now be able to detect and mitigate the threats that could cause major problems.

Keep Learning About ReversingLabs Cloud Deep Scan

  • Explore the Cloud Deep Scan solution page.
  • Learn how a global software company is using Cloud Deep Scan (PDF) to find threats in their applications before release.
  • Go deeper with the Cloud Deep Scan data sheet.



Explore RL's Spectra suite: Spectra Assure for software supply chain security, Spectra Detect for scalable file analysis, Spectra Analyze for malware analysis and threat hunting, and Spectra Intelligence for reputation data and intelligence.


Explore RL's Spectra suite: Spectra Assure for software supply chain security, Spectra Detect for scalable file analysis, Spectra Analyze for malware analysis and threat hunting, and Spectra Intelligence for reputation data and intelligence.

Tags:Products & Technology

More Blog Posts

QR Code Phishing Is Evolving: Here’s How Your Detection Can Keep Up

QR Code Phishing Evolves: How to Keep Up

Here's what you need to know about the rise of quishing — and how your threat hunting team can get out in front of it.

Learn More about QR Code Phishing Evolves: How to Keep Up
QR Code Phishing Evolves: How to Keep Up
Why RL Built Spectra Assure Community

Why RL Built Spectra Assure Community

We set out to help dev and AppSec teams secure the village: OSS dependencies, malware, more. Learn how.

Learn More about Why RL Built Spectra Assure Community
Why RL Built Spectra Assure Community
How a Simple YARA Rule Catches What AV Misses

ClickFix: YARA Rules Catch What AV Misses

Learn about the antivirus detection gap — and how to develop a simple YARA rule using Spectra Analyze.

Learn More about ClickFix: YARA Rules Catch What AV Misses
ClickFix: YARA Rules Catch What AV Misses

How to Examine Polyglot Files with Spectra Analyze

Here's how to assess a sample using Spectra Analyze in your environment — and create a YARA rule.

Learn More about How to Examine Polyglot Files with Spectra Analyze
How to Examine Polyglot Files with Spectra Analyze
Polyglot File Examination with Spectra Analyze