News
Entertainment
Science & Technology
Sport
Business & Money
Life
Culture & Art
Hobbies
8 | Follower
ANY.RUN | Cybersecurity Blog
16.05.2024
See how YARA Search from ANY.RUN lets you hunt for malicious files using custom YARA rules and find fresh malware samples.
Check out special discounts from ANY.RUN for both new and existing clients, celebrating the 8th birthday of the service.
09.05.2024
Learn how to effectively use threat intelligence feeds and understand the difference between commercial and open-source feeds.
08.05.2024
Learn about all the privacy and security features implemented in ANY.RUN that keep enterprise users' data protected.
02.05.2024
In April, ANY.RUN released YARA Search, updated the RSPAMD module, expanded threat coverage with new YARA and Suricata rules, and more.
28.04.2024
Learn about the new Redline Stealer variant that uses Lua bytecode to hide malicious code and spreads via Microsoft's vcpkg GitHub repo.
25.04.2024
Explore the new YARA Search tool from ANY.RUN. Find relevant malware samples using your own YARA rules and study them in the sandbox.
23.04.2024
A new malicious campaign on Google Ads is exploiting domains that impersonate an IP scanner to distribute a new backdoor called MadMxShell.
19.04.2024
See how you can analyze malicious PowerShell scripts in the ANY.RUN sandbox and explore their entire execution step by step.
17.04.2024
Check out ANY.RUN CTO Dmitry Marinov's interview for CIO World magazine and learn about his insights into security products development.
16.04.2024
Read ANY.RUN's quarterly update on the most widely deployed malware families, types, and TTPs we saw during the last 3 months of the year.
12.04.2024
Learn about the the fundamentals of cryptography, XOR encryption, how it works, and how to decrypt it when your encounter it in malware.
10.04.2024
Learn more about the new Linux backdoor found in XZ Utils, a popular open-source tool, which is tracked as CVE-2024-3094.
Learn about the ANY.RUN sandbox's Enterprise plan made for teams, offering team management, data protection and interactive malware analysis.
09.04.2024
Learn how attackers can place malicious payloads on remote servers to download and execute them on the victim's PC using WebDAV.
05.04.2024
See how to use process trees in malware analysis and discover what insights you can gain from a superficial investigation of a malware sample.
Discover the four levels of threat intelligence and examples of how to effectively collect data, and then — apply it.
03.04.2024
In March 2024, ANY.RUN added PowerShell support to the Script Tracer tool, released a Chrome browser extension, and integrated with OpenCTI.
29.03.2024
Discover how attackers use basic packers and how you can analyze packed malware in the ANY.RUN cloud sandbox.
27.03.2024
Learn more about the new features of the BunnyLoader malware and see how to analyze this threat using ANY.RUN.
Threat Intelligence Feeds are data streams of indicators of compromise (like malicious domains, IP addresses, links and file hashes).
26.03.2024
Discover an in-depth analysis of the Snake Keylogger malware, exposing its config, infostealing features, and anti-analysis techniques.
21.03.2024
See how you can gain a clear understanding of the global threat landscape by using ANY.RUN's threat intelligence sources.
See how you can use ANY.RUN to analyze a new phishing campaign delivering STRRAT and VCURMS via a Java-based downloader.
19.03.2024
See how Threat Intelligence Lookup helps you combine more than one indicator of compromise to search for relevant context.
18.03.2024
Discover a detailed technical analysis of the latest AsukaStaler malware and find out about the similarities it shares with ObserverStealer.
13.03.2024
Find out how ANY.RUN processes indicators of compromise from its database of threat data to enrich Threat Intelligence Lookup and TI Feeds.
12.03.2024
See how you can use the ANY.RUN sandbox to enrich OpenCIT observations with malware labels, TTPs, file hashes, IP addresses, and domains.
See how to set up a working environment in a sandbox to gather IOCs and write detection rules, using CVE-2024-21413 as an example.
08.03.2024
The LockBit ransomware gang has resumed attacks after the FBI takedown in February 2024. Learn more the latest version 4.0.
05.03.2024
In February, we released TI Lookup, introduced a new email analysis workflow with RSPAMD, and expanded threat coverage.
Read how Threat Intelligence Lookup, a large searchable database of threat data, was built by the ANY.RUN sandbox team.
29.02.2024
Find out how to build a sandbox for safely working with malware and discover alternatives such as the ANY.RUN sandbox.
27.02.2024
Learn about the distribution and ecosystem of DCRat and study a detailed dynamic analysis of DCRat using the ANY.RUN sandbox.
22.02.2024
See how you can strengthen your security posture by analyzing Linux malware, such as Mirai, and understanding its behavior.
21.02.2024
Discover how crypto malware operates, learn about the most popular crypto malware families, and see how you can analyze malware in ANY.RUN.
20.02.2024
Learn about types of malicious macros and how to find an obfuscated macro in a maldoc and to understand what it does.
15.02.2024
See how ANY.RUN lets you analyze emails in greater detail and better understand if they pose a risk to your organization using RSPAMD.
13.02.2024
Explore a realistic scenario of investigating a phishing attack using ANY.RUN's Threat Intelligence Lookup.
12.02.2024
Learn about by obfuscators like .NET Reactor and SmartAssembly favored by malware creators and discover deobfuscation methods.