Find crucial steps to take as a CISO to empower your SOC operations with threat intelligence to mitigate risks and improve key metrics.| ANY.RUN's Cybersecurity Blog
Power up IBM QRadar SOAR with ANY.RUN's Interactive Sandbox and Threat Intelligence Lookup to detect threats faster and reduce workload.| ANY.RUN's Cybersecurity Blog
Read a technical analysis of the Ducex packer used by Android malware like Triada for obfuscation and analysis evasion.| ANY.RUN's Cybersecurity Blog
Learn actionable threat hunting techniques to proactively identify malware hidden inside your infrastructure and enrich your defense with fresh IOCs.| ANY.RUN's Cybersecurity Blog
Explore in-depth technical analysis of OtterCookie, a new North Korean Lazarus APT malware that steals victims' crypto and credentials.| ANY.RUN's Cybersecurity Blog
ANY.RUN now offers a new pre-installed development software set, giving analysts advanced tools for deeper malware investigation.| ANY.RUN's Cybersecurity Blog
Analyze Android malware in real time with ANY.RUN sandbox. Detect threats in an ARM-based environment available to all users, including Free!| ANY.RUN's Cybersecurity Blog
Learn to hunt for Linux malware with ANY.RUN's Threat Intelligence Lookup and see how you can use it together with the Interactive Sandbox.| ANY.RUN's Cybersecurity Blog
Learn how to use wildcards and operators in TI Lookup to create effective search queries for collecting intelligence on cyber threats.| ANY.RUN's Cybersecurity Blog
Read technical analysis of PE32, a new ransomware strain that demands ransom for both decryption and not leaking stolen data.| ANY.RUN's Cybersecurity Blog
Learn how SOC teams use Indicators of Compromise (IOCs), Attack (IOAs), and Behavior (IOBs) for threat detection.| ANY.RUN's Cybersecurity Blog
Discover how ANY.RUN provides cyber threat intelligence enriched by the IOCs and IOBs from the latest malware analyzed by 15,000 companies.| ANY.RUN's Cybersecurity Blog
See how ANY.RUN sources unique indicators of compromise for Threat Intelligence Feeds, helping businesses detect cyber threats.| ANY.RUN's Cybersecurity Blog
See how you can use Threat Intelligence Lookup to identify emerging cyber threats using over 40 different search parameters.| ANY.RUN's Cybersecurity Blog
See how to use process trees in malware analysis and discover what insights you can gain from a superficial investigation of a malware sample.| ANY.RUN's Cybersecurity Blog
See technical analysis PSLoramyra, an advanced malware that leverages PowerShell, VBS, and BAT scripts to execute directly in memory.| ANY.RUN's Cybersecurity Blog
See how you can expand your threat detection capabilities with fresh IOCs from ANY.RUN's Cyber Threat Intelligence Feeds.| ANY.RUN's Cybersecurity Blog
See technical analysis of a zero-day attack that uses corrupted malicious files to bypass detection by advanced security systems.| ANY.RUN's Cybersecurity Blog
Learn actionable tips for analyzing malware's network traffic and see real-world examples investigated in the ANY.RUN sandbox.| ANY.RUN's Cybersecurity Blog
Get fresh Threat Intelligence reports on the latest cyber attacks and persistent APTs to enrich your company's security.| ANY.RUN's Cybersecurity Blog
Learn how TI Lookup from ANY.RUN helps businesses collect intelligence on active Advanced Persistent Threats to prevent cyber attacks.| ANY.RUN's Cybersecurity Blog
Discover a detailed technical analysis of the InvisibleFerret malware that targets businesses across different industries.| ANY.RUN's Cybersecurity Blog
Discover how YARA detection rules work and see real-world examples of rules used in ANY.RUN's Interactive Sandbox.| ANY.RUN's Cybersecurity Blog
See analysis of the distribution campaign of DeerStealer, a malware posing as Google Authenticator, recently discovered by ANY.RUN's team.| ANY.RUN's Cybersecurity Blog
Explore the new YARA Search tool from ANY.RUN. Find relevant malware samples using your own YARA rules and study them in the sandbox.| ANY.RUN's Cybersecurity Blog
Learn how you can integrate ANY.RUN's Threat Intelligence Feeds into your security infrastructure and get access to a free feeds sample.| ANY.RUN's Cybersecurity Blog
See how you can strengthen your security posture by analyzing Linux malware, such as Mirai, and understanding its behavior.| ANY.RUN's Cybersecurity Blog
Learn about Threat Intelligence Lookup — a streamlined platform that makes it easier to find relevant threat data from ANY.RUN sandbox tasks.| ANY.RUN's Cybersecurity Blog
Suricata IDS is one of the most popular intrusion detection systems. Let's talk about it and ANY.RUN use cases to identify malware with it.| ANY.RUN's Cybersecurity Blog