We discuss hot topics, malware behavior, techniques, practices for analyzing malicious files, and of course, we will talk more about our online interactive sandbox.| ANY.RUN's Cybersecurity Blog
Cloud-based malware analysis service. Take your information security to the next level. Analyze suspicious and malicious activities using our innovative tools.| any.run
Stealer malware is a type of malicious software that can steal all sorts of data from your computer, including your passwords, credit card information, and personal files.| Stealer | Malware Trends Tracker
Agent Tesla is a password stealer spyware that can be used by attackers to spy on victims, allowing them to see everything that has been typed in supported programs and web-browsers. Follow live malware statistics of this stealer and get new reports, samples, IOCs, etc.| Agent Tesla | Malware Trends Tracker
See analysis of the distribution campaign of DeerStealer, a malware posing as Google Authenticator, recently discovered by ANY.RUN's team.| ANY.RUN's Cybersecurity Blog
Explore the new YARA Search tool from ANY.RUN. Find relevant malware samples using your own YARA rules and study them in the sandbox.| ANY.RUN's Cybersecurity Blog
Learn how you can integrate ANY.RUN's Threat Intelligence Feeds into your security infrastructure and get access to a free feeds sample.| ANY.RUN's Cybersecurity Blog
See how you can strengthen your security posture by analyzing Linux malware, such as Mirai, and understanding its behavior.| ANY.RUN's Cybersecurity Blog
Learn about Threat Intelligence Lookup — a streamlined platform that makes it easier to find relevant threat data from ANY.RUN sandbox tasks.| ANY.RUN's Cybersecurity Blog
IoCs (Indicators of Compromise) are forensic evidence that point to a specific threat in the network. Let's figure out why its important in cybersecurity.| ANY.RUN's Cybersecurity Blog
Suricata IDS is one of the most popular intrusion detection systems. Let's talk about it and ANY.RUN use cases to identify malware with it.| ANY.RUN's Cybersecurity Blog