Release Notes: Safebrowsing, Private AI Assistant, Splunk Integration, and more
ANY.RUN | Cybersecurity Blog
by ANY.RUN
16h ago
Welcome to ANY.RUN‘s monthly updates, where we share our team’s achievements over the past month.  September has been a productive month at ANY.RUN, packed with exciting new features and improvements. We’ve launched Safebrowsing, a powerful tool that lets you safely check suspicious URLs in an isolated browser.  In addition to that, we’ve integrated with Splunk, […] The post Release Notes: Safebrowsing, Private AI Assistant, Splunk Integration, and more appeared first on ANY.RUN's Cybersecurity Blog ..read more
Visit website
How to Collect Indicators of Compromise in the ANY.RUN Sandbox
ANY.RUN | Cybersecurity Blog
by ANY.RUN
4d ago
Gathering Indicators of Compromise (IOCs) is key to identifying and responding to threats. IOCs are pieces of forensic data that point to potential malicious activity, helping you detect, investigate, and prevent cyberattacks. With ANY.RUN, you can collect a wide variety of IOCs, giving you a complete picture of any threat.  Let’s dive into the types […] The post How to Collect Indicators of Compromise <br>in the ANY.RUN Sandbox appeared first on ANY.RUN's Cybersecurity Blog ..read more
Visit website
How to Intercept Data Exfiltrated by Malware via Telegram and Discord
ANY.RUN | Cybersecurity Blog
by Maksim Mikhailov
1w ago
Often, malware uses platforms like — Telegram and Discord for data exfiltration. Due to its simplicity and the lack of need for building a server architecture, this exfiltration method has gained significant popularity. However, this very simplicity is also its weakness.  In this article we’ll show you how to obtain information related to threat actors’ […] The post How to Intercept Data Exfiltrated by Malware via Telegram and Discord appeared first on ANY.RUN's Cybersecurity Blog ..read more
Visit website
Introducing Safebrowsing: Explore Suspicious Links in a Safe Virtual Browser
ANY.RUN | Cybersecurity Blog
by ANY.RUN
1w ago
Current security measures against phishing links focus on automated checks and timely blocking before they reach users. Yet, some links still make it to their targets, leaving them vulnerable as they often have no simple, fast, and reliable tool at hand to check these links at the final stage.  To address this security gap, we […] The post Introducing Safebrowsing: Explore Suspicious Links in a Safe Virtual Browser appeared first on ANY.RUN's Cybersecurity Blog ..read more
Visit website
What is Spearphishing: Definition, Techniques, Real-world Example 
ANY.RUN | Cybersecurity Blog
by ANY.RUN
1w ago
Roughly 70% of malware incidents are a result of social engineering, with spearphishing being a common method. Let’s learn more about this phenomenon and discover: What is spearphishing?  It is a targeted form of phishing attack where the adversary focuses on a specific individual or organization. Unlike generic phishing, spearphishing is often more sophisticated and […] The post What is Spearphishing: Definition, Techniques, Real-world Example  appeared first on ANY.RUN's Cybersecurity Blog ..read more
Visit website
How to Collect Threat Intelligence Using Search Parameters in TI Lookup
ANY.RUN | Cybersecurity Blog
by Vlad Ananin
2w ago
ANY.RUN‘s Threat Intelligence Lookup is a valuable resource for security professionals searching for information on the latest cyber threats.  One of the key features of Threat Intelligence Lookup is its extensive search capabilities. The service offers over 40 different search parameters that can be combined to form specific queries. These parameters allow you to filter […] The post How to Collect Threat Intelligence Using Search Parameters in TI Lookup appeared first on ANY.RUN's Cybersecurity Blog ..read more
Visit website
ANY.RUN Now Integrates with Splunk!
ANY.RUN | Cybersecurity Blog
by ANY.RUN
3w ago
We have some thrilling news to share with you today. Our team at ANY.RUN is happy to announce the launch of our new integration with Splunk! How this integration benefits you  If you’re a Splunk user, you can now leverage ANY.RUN’s Interactive Sandbox and Threat Intelligence Lookup directly from your Splunk SOAR environment.   This means […] The post ANY.RUN Now Integrates with Splunk! appeared first on ANY.RUN's Cybersecurity Blog ..read more
Visit website
How to Analyze Malware in ANY.RUN Sandbox: Eric Parker’s Guide
ANY.RUN | Cybersecurity Blog
by ANY.RUN
3w ago
Recently, Eric Parker, a cybersecurity expert and YouTuber, released a new video on ANY.RUN’s interactive sandbox. We recommend you take a look at his tutorial, as it offers a step-by-step guide on how to use the service and save time on reverse engineering. Here’s our overview of the key highlights from the video.  About malware […] The post How to Analyze Malware in ANY.RUN Sandbox: Eric Parker’s Guide appeared first on ANY.RUN's Cybersecurity Blog ..read more
Visit website
Security Training Lab: Educational Program for Universities
ANY.RUN | Cybersecurity Blog
by ANY.RUN
3w ago
At ANY.RUN, we’ve spent over 8 years tackling cybersecurity industry challenges. We built an interactive sandbox and Threat Intelligence Lookup to streamline malware analysis and investigations for hundreds of thousands of professionals worldwide. Now, we’re launching Security Training Lab to address another critical need: equipping future cybersecurity professionals with the skills they need to succeed.  […] The post Security Training Lab: Educational Program <br>for Universities appeared first on ANY.RUN's Cybersecurity Blog ..read more
Visit website
AZORult Malware: Technical Analysis
ANY.RUN | Cybersecurity Blog
by Mostafa ElSheimy
1M ago
Editor’s note: The current article is authored by Mostafa ElSheimy, a malware reverse engineer and threat intelligence analyst. You can find Mostafa on X and LinkedIn. In this malware analysis report, we conduct an in-depth examination of AZORult, a sophisticated credential and payment card information stealer. Our walk-through covers the malware’s evolution, including its transition from Delphi to […] The post AZORult Malware: Technical Analysis appeared first on ANY.RUN's Cybersecurity Blog ..read more
Visit website

Follow ANY.RUN | Cybersecurity Blog on FeedSpot

Continue with Google
Continue with Apple
OR