News
Entertainment
Science & Technology
Sport
Business & Money
Life
Culture & Art
Hobbies
8 | Follower
ANY.RUN | Cybersecurity Blog
04.04.2025
Discover the latest additions to ANY.RUN's products in March 2025, including Android VM, pre-installed dev tools, and new TI Reports.
03.04.2025
Learn to hunt for Linux malware with ANY.RUN's Threat Intelligence Lookup and see how you can use it together with the Interactive Sandbox.
02.04.2025
Discover detailed analysis of Salvador Stealer, a new Android malware targeting users of mobile banking apps.
28.03.2025
Learn about ANY.RUN's award in the Outstanding Threat Detection and Response category at The Globee Awards 2025.
Discover how ANY.RUN provides cyber threat intelligence enriched by the IOCs and IOBs from the latest malware analyzed by 15,000 companies.
26.03.2025
Discover technical analysis of GorillaBot, a new malware variant based on the original code of the Mirai botnet.
20.03.2025
To become malware analyst, one must develop a specter of hard and soft skills including static, dynamic analysis, collaboration, and more.
ANY.RUN wins Best Threat Intelligence Service at the Cybersecurity Excellence Awards 2025, recognizing its impact on real-time malware analysis.
19.03.2025
Analyze Android malware in real time with ANY.RUN sandbox. Detect threats in an ARM-based environment available to all users, including Free!
14.03.2025
ANY.RUN now offers a new pre-installed development software set, giving analysts advanced tools for deeper malware investigation.
13.03.2025
AI can pose cyber threats when used with unethical purposes or permits unintended failures, these risks must be understood and controlled.
12.03.2025
Explore how malware evades detection using steganography, obfuscation, Regsvr32 abuse, and other techniques with real-world samples.
06.03.2025
See how a transport company automatically monitors active malware, credential theft, and CVE attacks for fresh IOCs, IOBs, and samples.
05.03.2025
Discover the latest updates from ANY.RUN, including Threat Intelligence Reports, fresh website design, and new detection rules.
28.02.2025
See how ANY.RUN sources unique indicators of compromise for Threat Intelligence Feeds, helping businesses detect cyber threats.
27.02.2025
Master malware analysis skills with Security Training Lab from ANY.RUN to analyze the latest cyber threats.
26.02.2025
Learn to identify and analyze Linux cyber threats by their network traffic activities and see how you can speed up detection with ANY.RUN.
20.02.2025
Learn to identify and investigate phishing kit attacks with Threat Intelligence Lookup from ANY.RUN to proactively defend your organization.
19.02.2025
Learn how TI Lookup from ANY.RUN helps businesses collect intelligence on active Advanced Persistent Threats to prevent cyber attacks.
Get fresh Threat Intelligence reports on the latest cyber attacks and persistent APTs to enrich your company's security.
See how you can launch analysis of suspicious URLs in Safebrowsing via ANY.RUN's browser extension in just two clicks.
Discover technical analysis of the Zhong stealer, a malware that targets the Fintech industry by abusing support ticket systems.
Service optimization, extended APT coverage, YARA and Suricata rules for emerging cyber threats, new malware signatures, and more.
Discover how an investment bank cut threat response time in half and prevented hundreds of security incidents with ANY.RUN's sandbox.
Discover the timeline of cyber attacks on DeepSeek and see analysis of the Botnets, HailBot and RapperBot, used to disrupt the AI service.
30.01.2025
Discover three cyberattacks in January 2025 analyzed with the help of ANY.RUN's Interactive Sandbox and TI Lookup.
29.01.2025
Discover comprehensive analysis of the attacks of Interlock Ransomware on Healthcare organizations in the United States.
24.01.2025
Learn how to proactively identify ransomware attacks and prevent them from compromising your company's infrastructure.
23.01.2025
Learn how Threat Intelligence Lookup from ANY.RUN can help your company strengthen proactive cybersecurity.
22.01.2025
Discover a detailed technical analysis of the InvisibleFerret malware that targets businesses across different industries.
17.01.2025
Discover the key cyber threat trends in 2024, from the most prevalent malware families and types to the most common TTPs.
16.01.2025
Discover how YARA detection rules work and see real-world examples of rules used in ANY.RUN's Interactive Sandbox.
15.01.2025
Learn about pivoting in threat intelligence and see how it can help you collect actionable insights on active cyber threats.
28.12.2024
Explore the current state of the global cyber threat landscape with ANY.RUN's quarterly report on Q4 2024.
Explore the annual report from ANY.RUN to see all the products, features, and updates released throughout 2024.
MISP integration, new search operators in TI Lookup, multi-admin support, and expanded threat coverage in December 2024 updates from ANY.RUN.
24.12.2024
Discover the latest cyber attacks in December 2024 and see technical analysis of the new tactics used by threat actors.
20.12.2024
Take a look at the major cybesecurity awards won by ANY.RUN in 2024 and discover the products recognized by leading experts in the industry.
19.12.2024
Check out practical examples of how DFIR analysts use a malware sandbox in their work to analyze cyber threats.
18.12.2024
Discover how a Windows 11 malware sandbox can help organizations safely analyze malicious files and URLs to ensure effective security.