News
Entertainment
Science & Technology
Sport
Business & Money
Life
Culture & Art
Hobbies
8 | Follower
ANY.RUN | Cybersecurity Blog
03.06.2025
Explore in-depth technical analysis of OtterCookie, a new North Korean Lazarus APT malware that steals victims' crypto and credentials.
29.05.2025
See a case study on how MSSPs can track down active phishing campaigns, identify their targets, and collect IOCs with ANY.RUN.
28.05.2025
See hands-on examples of how you can analyze and detect hard-to-catch malware using ANY.RUN's Interactive Sandbox.
23.05.2025
Learn about a new phishing campaign spreading Remcos through DBatLoader. It employs UAC bypass and obfuscated scripts to compromise systems.
22.05.2025
See how integrating Threat Intelligence Feeds can help SOC teams and MSSPs to improve key KPIs like MTTD, MTTR, and reduce false positives.
21.05.2025
Discover how to intercept data stolen by cybercriminals via Telegram bots and learn to use it to clarify related threat landscape.
20.05.2025
Celebrate ANY.RUN's 9th birthday with special offers to supercharge your SOC team's malware analysis and threat intelligence capabilities.
16.05.2025
ANY.RUN's Threat Intelligence Lookup won Gold at Globee Awards 2025. See how business use it to boost their defense.
15.05.2025
Discover how SOC teams and MSSPs can access ANY.RUN's malware analysis course to increase expertise and get up-to-date cybersecurity skills.
14.05.2025
Explore technical analysis all evasion mechanisms employed by the Tycoon 2FA phishing kit to beat detection systems.
08.05.2025
Discover report on Nitrogen Ransomware, a new threat to financial institutions in the United States and see how your company can counter it.
07.05.2025
Discover detailed breakdown of Mamona, a new ransomware strain with advanced encryption capabilities operated by BlackLock affiliates.
01.05.2025
Discover ANY.RUN's releases in April 2025, including SDK for seamless integrations, Notifications to help you get updates, and more.
30.04.2025
Read in-depth technical analysis of Pentagon Stealer, an evolving malware with Python & Golang variants that targets crypto wallets.
24.04.2025
Discover how Cyber Threat Intelligence Feeds help organizations effectively tackle and mitigate cybersecurity incidents.
23.04.2025
Read technical analysis of PE32, a new ransomware strain that demands ransom for both decryption and not leaking stolen data.
18.04.2025
Automate SOC tasks with ANY.RUN's SDK to simplify, improve, and speed up threat detection, response, and hunting.
17.04.2025
Learn how SOC teams use Indicators of Compromise (IOCs), Attack (IOAs), and Behavior (IOBs) for threat detection.
16.04.2025
Learn about malware signatures and see real-world examples of how they are used for detecting cyber threats.
Download the latest report on the current threat landscape based on the data from 15,000 organizations and SOC teams.
10.04.2025
Learn about Security Training Lab, a practical course on malware analysis by ANY.RUN designed for universities to enrich their curriculum.
09.04.2025
Discover how MSSP Expertware has decreased turnaround time for malware investigation and IOC extraction processes by 50% with ANY.RUN.
04.04.2025
Discover the latest additions to ANY.RUN's products in March 2025, including Android VM, pre-installed dev tools, and new TI Reports.
03.04.2025
Learn to hunt for Linux malware with ANY.RUN's Threat Intelligence Lookup and see how you can use it together with the Interactive Sandbox.
02.04.2025
Discover detailed analysis of Salvador Stealer, a new Android malware targeting users of mobile banking apps.
28.03.2025
Learn about ANY.RUN's award in the Outstanding Threat Detection and Response category at The Globee Awards 2025.
Discover how ANY.RUN provides cyber threat intelligence enriched by the IOCs and IOBs from the latest malware analyzed by 15,000 companies.
26.03.2025
Discover technical analysis of GorillaBot, a new malware variant based on the original code of the Mirai botnet.
20.03.2025
ANY.RUN wins Best Threat Intelligence Service at the Cybersecurity Excellence Awards 2025, recognizing its impact on real-time malware analysis.
To become malware analyst, one must develop a specter of hard and soft skills including static, dynamic analysis, collaboration, and more.
19.03.2025
Analyze Android malware in real time with ANY.RUN sandbox. Detect threats in an ARM-based environment available to all users, including Free!
14.03.2025
ANY.RUN now offers a new pre-installed development software set, giving analysts advanced tools for deeper malware investigation.
13.03.2025
AI can pose cyber threats when used with unethical purposes or permits unintended failures, these risks must be understood and controlled.
12.03.2025
Explore how malware evades detection using steganography, obfuscation, Regsvr32 abuse, and other techniques with real-world samples.
06.03.2025
See how a transport company automatically monitors active malware, credential theft, and CVE attacks for fresh IOCs, IOBs, and samples.
05.03.2025
Discover the latest updates from ANY.RUN, including Threat Intelligence Reports, fresh website design, and new detection rules.
28.02.2025
See how ANY.RUN sources unique indicators of compromise for Threat Intelligence Feeds, helping businesses detect cyber threats.
27.02.2025
Master malware analysis skills with Security Training Lab from ANY.RUN to analyze the latest cyber threats.
26.02.2025
Learn to identify and analyze Linux cyber threats by their network traffic activities and see how you can speed up detection with ANY.RUN.
20.02.2025
Learn to identify and investigate phishing kit attacks with Threat Intelligence Lookup from ANY.RUN to proactively defend your organization.