ANY.RUN | Cybersecurity Blog
125 FOLLOWERS
ANY.RUN's cybersecurity blog shares insights for malware analysts and researchers. Talking about advanced malicious file detection techniques & guides.
ANY.RUN | Cybersecurity Blog
16h ago
Welcome to ANY.RUN‘s monthly updates, where we share our team’s achievements over the past month. September has been a productive month at ANY.RUN, packed with exciting new features and improvements. We’ve launched Safebrowsing, a powerful tool that lets you safely check suspicious URLs in an isolated browser. In addition to that, we’ve integrated with Splunk, […]
The post Release Notes: Safebrowsing, Private AI Assistant, Splunk Integration, and more appeared first on ANY.RUN's Cybersecurity Blog ..read more
ANY.RUN | Cybersecurity Blog
4d ago
Gathering Indicators of Compromise (IOCs) is key to identifying and responding to threats. IOCs are pieces of forensic data that point to potential malicious activity, helping you detect, investigate, and prevent cyberattacks. With ANY.RUN, you can collect a wide variety of IOCs, giving you a complete picture of any threat. Let’s dive into the types […]
The post How to Collect Indicators of Compromise <br>in the ANY.RUN Sandbox appeared first on ANY.RUN's Cybersecurity Blog ..read more
ANY.RUN | Cybersecurity Blog
1w ago
Often, malware uses platforms like — Telegram and Discord for data exfiltration. Due to its simplicity and the lack of need for building a server architecture, this exfiltration method has gained significant popularity. However, this very simplicity is also its weakness. In this article we’ll show you how to obtain information related to threat actors’ […]
The post How to Intercept Data Exfiltrated by Malware via Telegram and Discord appeared first on ANY.RUN's Cybersecurity Blog ..read more
ANY.RUN | Cybersecurity Blog
1w ago
Current security measures against phishing links focus on automated checks and timely blocking before they reach users. Yet, some links still make it to their targets, leaving them vulnerable as they often have no simple, fast, and reliable tool at hand to check these links at the final stage. To address this security gap, we […]
The post Introducing Safebrowsing: Explore Suspicious Links in a Safe Virtual Browser appeared first on ANY.RUN's Cybersecurity Blog ..read more
ANY.RUN | Cybersecurity Blog
1w ago
Roughly 70% of malware incidents are a result of social engineering, with spearphishing being a common method. Let’s learn more about this phenomenon and discover: What is spearphishing? It is a targeted form of phishing attack where the adversary focuses on a specific individual or organization. Unlike generic phishing, spearphishing is often more sophisticated and […]
The post What is Spearphishing: Definition, Techniques, Real-world Example appeared first on ANY.RUN's Cybersecurity Blog ..read more
ANY.RUN | Cybersecurity Blog
2w ago
ANY.RUN‘s Threat Intelligence Lookup is a valuable resource for security professionals searching for information on the latest cyber threats. One of the key features of Threat Intelligence Lookup is its extensive search capabilities. The service offers over 40 different search parameters that can be combined to form specific queries. These parameters allow you to filter […]
The post How to Collect Threat Intelligence Using Search Parameters in TI Lookup appeared first on ANY.RUN's Cybersecurity Blog ..read more
ANY.RUN | Cybersecurity Blog
3w ago
We have some thrilling news to share with you today. Our team at ANY.RUN is happy to announce the launch of our new integration with Splunk! How this integration benefits you If you’re a Splunk user, you can now leverage ANY.RUN’s Interactive Sandbox and Threat Intelligence Lookup directly from your Splunk SOAR environment. This means […]
The post ANY.RUN Now Integrates with Splunk! appeared first on ANY.RUN's Cybersecurity Blog ..read more
ANY.RUN | Cybersecurity Blog
3w ago
Recently, Eric Parker, a cybersecurity expert and YouTuber, released a new video on ANY.RUN’s interactive sandbox. We recommend you take a look at his tutorial, as it offers a step-by-step guide on how to use the service and save time on reverse engineering. Here’s our overview of the key highlights from the video. About malware […]
The post How to Analyze Malware in ANY.RUN Sandbox: Eric Parker’s Guide appeared first on ANY.RUN's Cybersecurity Blog ..read more
ANY.RUN | Cybersecurity Blog
3w ago
At ANY.RUN, we’ve spent over 8 years tackling cybersecurity industry challenges. We built an interactive sandbox and Threat Intelligence Lookup to streamline malware analysis and investigations for hundreds of thousands of professionals worldwide. Now, we’re launching Security Training Lab to address another critical need: equipping future cybersecurity professionals with the skills they need to succeed. […]
The post Security Training Lab: Educational Program <br>for Universities appeared first on ANY.RUN's Cybersecurity Blog ..read more
ANY.RUN | Cybersecurity Blog
1M ago
Editor’s note: The current article is authored by Mostafa ElSheimy, a malware reverse engineer and threat intelligence analyst. You can find Mostafa on X and LinkedIn. In this malware analysis report, we conduct an in-depth examination of AZORult, a sophisticated credential and payment card information stealer. Our walk-through covers the malware’s evolution, including its transition from Delphi to […]
The post AZORult Malware: Technical Analysis appeared first on ANY.RUN's Cybersecurity Blog ..read more