See how your SOC can achieve faster incident resolution, reduced alert fatigue, and proactive threat detection in MS Defender.| ANY.RUN's Cybersecurity Blog
You can now easily integrate Threat Intelligence Feeds with fresh actionable zero-false-positive IOCs into your cybersecurity infrastructure without extra costs via ANY.RUN IBM App.| ANY.RUN's Cybersecurity Blog
Explore how top attacks like Tycoon2FA, Rhadamanthys and Salty2FA unraveled in August 2025 and what insights SOC teams can take away.| ANY.RUN's Cybersecurity Blog
Dive deeper into malware analysis of a PhaaS framework discovered by ANY.RUN's experts: Salty2FA, targeting industries in the USA and EU.| ANY.RUN's Cybersecurity Blog
Find crucial steps to take as a CISO to empower your SOC operations with threat intelligence to mitigate risks and improve key metrics.| ANY.RUN's Cybersecurity Blog
Discover analysis of PyLangGhost RAT, the newest Lazarus Group malware targeting finance and tech professionals.| ANY.RUN's Cybersecurity Blog
Ingest fresh IOCs from 15K SOCs into your Microsoft Sentinel SIEM to expand threat coverage and increase detection rate.| ANY.RUN's Cybersecurity Blog
See actionable steps that your SOC can take to reduce alert fatigue, increase detection rate, and cut MTTR.| ANY.RUN's Cybersecurity Blog
Discover detailed breakdown of top cyberattacks in July 2025, from DeerStealer with LNK and LOLBin abuse to Remote Access Tools exploits.| ANY.RUN's Cybersecurity Blog
Power up IBM QRadar SOAR with ANY.RUN's Interactive Sandbox and Threat Intelligence Lookup to detect threats faster and reduce workload.| ANY.RUN's Cybersecurity Blog
Discover the key insights into the current threat landscape with ANY.RUN's Q2 2025 report to ensure effective security planning.| ANY.RUN's Cybersecurity Blog
Learn actionable threat hunting techniques to proactively identify malware hidden inside your infrastructure and enrich your defense with fresh IOCs.| ANY.RUN's Cybersecurity Blog
ANY.RUN now offers a new pre-installed development software set, giving analysts advanced tools for deeper malware investigation.| ANY.RUN's Cybersecurity Blog
Analyze Android malware in real time with ANY.RUN sandbox. Detect threats in an ARM-based environment available to all users, including Free!| ANY.RUN's Cybersecurity Blog
Learn to hunt for Linux malware with ANY.RUN's Threat Intelligence Lookup and see how you can use it together with the Interactive Sandbox.| ANY.RUN's Cybersecurity Blog
Learn how to use wildcards and operators in TI Lookup to create effective search queries for collecting intelligence on cyber threats.| ANY.RUN's Cybersecurity Blog
Read technical analysis of PE32, a new ransomware strain that demands ransom for both decryption and not leaking stolen data.| ANY.RUN's Cybersecurity Blog
Learn how SOC teams use Indicators of Compromise (IOCs), Attack (IOAs), and Behavior (IOBs) for threat detection.| ANY.RUN's Cybersecurity Blog
Discover how ANY.RUN provides cyber threat intelligence enriched by the IOCs and IOBs from the latest malware analyzed by 15,000 companies.| ANY.RUN's Cybersecurity Blog
See how ANY.RUN sources unique indicators of compromise for Threat Intelligence Feeds, helping businesses detect cyber threats.| ANY.RUN's Cybersecurity Blog
See how you can use Threat Intelligence Lookup to identify emerging cyber threats using over 40 different search parameters.| ANY.RUN's Cybersecurity Blog
See how to use process trees in malware analysis and discover what insights you can gain from a superficial investigation of a malware sample.| ANY.RUN's Cybersecurity Blog
See technical analysis PSLoramyra, an advanced malware that leverages PowerShell, VBS, and BAT scripts to execute directly in memory.| ANY.RUN's Cybersecurity Blog
See how you can expand your threat detection capabilities with fresh IOCs from ANY.RUN's Cyber Threat Intelligence Feeds.| ANY.RUN's Cybersecurity Blog
See technical analysis of a zero-day attack that uses corrupted malicious files to bypass detection by advanced security systems.| ANY.RUN's Cybersecurity Blog
Here you will find information on updates to our service. The latest news about release notes, reviews of new functionality, and much more.| ANY.RUN's Cybersecurity Blog
Learn actionable tips for analyzing malware's network traffic and see real-world examples investigated in the ANY.RUN sandbox.| ANY.RUN's Cybersecurity Blog
Explore obfuscation tactics in malware. We'll break down how they work and discuss strategies for detection and mitigation.| ANY.RUN's Cybersecurity Blog
Take a look at the major cybesecurity awards won by ANY.RUN in 2024 and discover the products recognized by leading experts in the industry.| ANY.RUN's Cybersecurity Blog
Here you will find a lot of information about how to detect malware and analyze it. Various tricks to help speed up the workflow and a lot of other useful information.| ANY.RUN's Cybersecurity Blog
Welcome to Instructions on ANY.RUN section. Here we talk about the various features of our interactive sandbox and how we can make it easier for you to analyze malware using our service.| ANY.RUN's Cybersecurity Blog
Get fresh Threat Intelligence reports on the latest cyber attacks and persistent APTs to enrich your company's security.| ANY.RUN's Cybersecurity Blog
Learn how TI Lookup from ANY.RUN helps businesses collect intelligence on active Advanced Persistent Threats to prevent cyber attacks.| ANY.RUN's Cybersecurity Blog
Discover a detailed technical analysis of the InvisibleFerret malware that targets businesses across different industries.| ANY.RUN's Cybersecurity Blog
Discover how YARA detection rules work and see real-world examples of rules used in ANY.RUN's Interactive Sandbox.| ANY.RUN's Cybersecurity Blog
Cybersecurity Blog covers topics for experienced professionals as well as for those new to it.| ANY.RUN's Cybersecurity Blog
Cybersecurity Blog covers topics for experienced professionals as well as for those new to it.| ANY.RUN's Cybersecurity Blog
Cybersecurity Blog covers topics for experienced professionals as well as for those new to it.| ANY.RUN's Cybersecurity Blog
Welcome to analyst training section, here are collected materials for Cybersecurity education. Various techniques and approaches for malware analysis and research.| ANY.RUN's Cybersecurity Blog
Cybersecurity Blog covers topics for experienced professionals as well as for those new to it.| ANY.RUN's Cybersecurity Blog
Cybersecurity Blog covers topics for experienced professionals as well as for those new to it.| ANY.RUN's Cybersecurity Blog
Welcome to the Malware Analysis section. We tell you about the principles and approach to the analysis, useful cases and examples, new samples, and analytics.| ANY.RUN's Cybersecurity Blog