News
Entertainment
Science & Technology
Sport
Business & Money
Life
Culture & Art
Hobbies
8 | Follower
ANY.RUN | Cybersecurity Blog
24.12.2024
Discover the latest cyber attacks in December 2024 and see technical analysis of the new tactics used by threat actors.
20.12.2024
Take a look at the major cybesecurity awards won by ANY.RUN in 2024 and discover the products recognized by leading experts in the industry.
19.12.2024
Check out practical examples of how DFIR analysts use a malware sandbox in their work to analyze cyber threats.
18.12.2024
Discover how a Windows 11 malware sandbox can help organizations safely analyze malicious files and URLs to ensure effective security.
17.12.2024
See how you can expand your threat detection capabilities with fresh IOCs from ANY.RUN's Cyber Threat Intelligence Feeds.
13.12.2024
See how you can integrate ANY.RUN’s Threat Intelligence Feeds via a dedicated MISP instance to expand your threat detection capabilities.
12.12.2024
Read an in-depth analysis of Nova, a newly discovered fork of the Snake Keylogger family, that employs more sophisticated tactics.
11.12.2024
See how attackers are targeting manufacturing companies to steal sensitive information and gain control over critical infrastructure.
06.12.2024
See technical analysis of a zero-day attack that uses corrupted malicious files to bypass detection by advanced security systems.
05.12.2024
Learn how to use wildcards and operators in TI Lookup to create effective search queries for collecting intelligence on cyber threats.
04.12.2024
Discover ANY.RUN's updates in November 2024: Stage 2 of Automated Interactivity, MITRE ATT&CK matrix with real-world samples, and more.
28.11.2024
See technical analysis PSLoramyra, an advanced malware that leverages PowerShell, VBS, and BAT scripts to execute directly in memory.
27.11.2024
Discover real-world cases of using TI Lookup to find and collect intel on phishing kits like Mamba2FA and Tycoon2FA and other cyber threats.
26.11.2024
Discover ANY.RUN's Black Friday 2024 offers to streamline your threat investigations and improve collaboration with your colleagues.
22.11.2024
See how TI Lookup integrates an interactive MITRE ATT&CK matrix that provides relevant malware and phishing samples for different TTPs.
21.11.2024
Learn about the most common mechanisms attackers use to keep their malware persistent on infected systems.
15.11.2024
See how the ANYRUN sandbox automatically detonates common cyber attack chains without any user involvement, including via API.
14.11.2024
Read a detailed technical analysis of the HawkEye keylogger malware to discover how it operates and learn about its key attack stages.
13.11.2024
Discover effective methods for collecting the latest threat intelligence with ANY.RUN's TI Lookup and see real-world use cases.
08.11.2024
See how attackers use open directories for hosting malicious files that are used to infect systems with AsyncRAT.
07.11.2024
Discover Dr. Jim Furstenberg's insights into his teaching methods and the critical importance of hands-on learning in cybersecurity.
Learn about the latest features introduced by ANY.RUN in October 2024, from TI Lookup Notifications to an improved Linux malware sandbox.
03.11.2024
Learn actionable tips for analyzing malware's network traffic and see real-world examples investigated in the ANY.RUN sandbox.
31.10.2024
Explore the most common types of protectors—packers and crypters—along with simple ways to detect and remove them.
30.10.2024
Learn about the organizational benefits of Cyber Threat Intelligence feeds and see how they can improve your business operations.
29.10.2024
Discover the latest cyber attacks identified by researchers at ANY.RUN to see new phishing techniques and malware campaigns.
25.10.2024
See how you can subscribe to real-time notifications for updates on emerging and evolving malware and phishing threats in TI Lookup.
24.10.2024
Explore in-depth analysis of the Remote Access Trojan (RAT) DarkComet used by attackers to remotely control systems and steal sensitive data.
22.10.2024
Explore the Q3 2024 malware trends report from ANY.RUN to learn about the most prevalent malware families, types, and TTPs.
17.10.2024
See actionable tips on how to proactively collect information on cyber threats and discover techniques used by security experts.
Learn about the key features and capabilities of ANY.RUN's Linux malware sandbox and see analysis of a Mirai malware sample.
09.10.2024
Learn about five key characteristics of good threat intelligence feeds and see how ANY.RUN meets these essential standards.
Learn more about ANY.RUN's powerful AI assistant for malware analysis that offers insightful reports with the privacy and security you need.
08.10.2024
See the detailed technical analysis of an attack using the new threat PhantomLoader to distribute the Rust-based malware SSLoad.
04.10.2024
Learn about ANY.RUN's updates in September 2024, from a new tool for exploring suspicious URLs to the integration with Splunk.
03.10.2024
See real-world use cases for ANY.RUN's Threat Intelligence Lookup presented by the professional threat intelligence researcher Anna Pham
02.10.2024
See how you can collect a wide variety of IOCs, from IP addresses to hashes, in ANY.RUN to get a complete picture of any cyber threat.
26.09.2024
See how you can obtain data collected by threat actors from infected systems and exfiltrated to Telegram or Discord.
25.09.2024
Learn about Safebrowsing from ANY.RUN, an interactive browser in the cloud that lets you safely check malicious URLs and phishing.
24.09.2024
Learn about Kransom, a new ransomware that uses the DLL-sideloading technique to hijack the popular game Honkai: Star Rail.