We discuss hot topics, malware behavior, techniques, practices for analyzing malicious files, and of course, we will talk more about our online interactive sandbox.| ANY.RUN's Cybersecurity Blog
Read a technical analysis of the Ducex packer used by Android malware like Triada for obfuscation and analysis evasion.| ANY.RUN's Cybersecurity Blog
Explore in-depth technical analysis of OtterCookie, a new North Korean Lazarus APT malware that steals victims' crypto and credentials.| ANY.RUN's Cybersecurity Blog
Read technical analysis of PE32, a new ransomware strain that demands ransom for both decryption and not leaking stolen data.| ANY.RUN's Cybersecurity Blog
See technical analysis PSLoramyra, an advanced malware that leverages PowerShell, VBS, and BAT scripts to execute directly in memory.| ANY.RUN's Cybersecurity Blog
See technical analysis of a zero-day attack that uses corrupted malicious files to bypass detection by advanced security systems.| ANY.RUN's Cybersecurity Blog
Discover a detailed technical analysis of the InvisibleFerret malware that targets businesses across different industries.| ANY.RUN's Cybersecurity Blog
Cybersecurity Blog covers topics for experienced professionals as well as for those new to it.| ANY.RUN's Cybersecurity Blog
Cybersecurity Blog covers topics for experienced professionals as well as for those new to it.| ANY.RUN's Cybersecurity Blog
Cybersecurity Blog covers topics for experienced professionals as well as for those new to it.| ANY.RUN's Cybersecurity Blog
Cybersecurity Blog covers topics for experienced professionals as well as for those new to it.| ANY.RUN's Cybersecurity Blog
Welcome to the Malware Analysis section. We tell you about the principles and approach to the analysis, useful cases and examples, new samples, and analytics.| ANY.RUN's Cybersecurity Blog
See analysis of the distribution campaign of DeerStealer, a malware posing as Google Authenticator, recently discovered by ANY.RUN's team.| ANY.RUN's Cybersecurity Blog
Suricata IDS is one of the most popular intrusion detection systems. Let's talk about it and ANY.RUN use cases to identify malware with it.| ANY.RUN's Cybersecurity Blog