Explore in-depth technical analysis of OtterCookie, a new North Korean Lazarus APT malware that steals victims' crypto and credentials.| ANY.RUN's Cybersecurity Blog
Learn to hunt for Linux malware with ANY.RUN's Threat Intelligence Lookup and see how you can use it together with the Interactive Sandbox.| ANY.RUN's Cybersecurity Blog
Read technical analysis of PE32, a new ransomware strain that demands ransom for both decryption and not leaking stolen data.| ANY.RUN's Cybersecurity Blog
Learn how SOC teams use Indicators of Compromise (IOCs), Attack (IOAs), and Behavior (IOBs) for threat detection.| ANY.RUN's Cybersecurity Blog
See technical analysis PSLoramyra, an advanced malware that leverages PowerShell, VBS, and BAT scripts to execute directly in memory.| ANY.RUN's Cybersecurity Blog
See how you can expand your threat detection capabilities with fresh IOCs from ANY.RUN's Cyber Threat Intelligence Feeds.| ANY.RUN's Cybersecurity Blog
See technical analysis of a zero-day attack that uses corrupted malicious files to bypass detection by advanced security systems.| ANY.RUN's Cybersecurity Blog
Explore obfuscation tactics in malware. We'll break down how they work and discuss strategies for detection and mitigation.| ANY.RUN's Cybersecurity Blog
Learn how you can integrate ANY.RUN's Threat Intelligence Feeds into your security infrastructure and get access to a free feeds sample.| ANY.RUN's Cybersecurity Blog
IoCs (Indicators of Compromise) are forensic evidence that point to a specific threat in the network. Let's figure out why its important in cybersecurity.| ANY.RUN's Cybersecurity Blog