Cybersecurity Lifehacks How We Process IOCs for ANY.RUN Threat Intelligence Lookup and Feeds March 13, 2024 937 views 5 min read
Malware Analysis How to Set Up a Network Research Laboratory: MonikerLink (CVE-2024-21413) Case Study March 12, 2024 5146 views 7 min read
News LockBit is Back from the Dead. Here’s How to Prepare For its Return March 7, 2024 1195 views 4 min read
Service Updates Release Notes: Threat Intelligence Lookup, RSPAMD, 26 New Signatures, and More March 4, 2024 889 views 5 min read
Cybersecurity Lifehacks How to Create a Sandbox Environment (for Malware Analysis) February 29, 2024 8646 views 9 min read
Cybersecurity Lifehacks Analyzing Linux Malware in ANY.RUN: 3 examples February 22, 2024 2344 views 4 min read
Cybersecurity Lifehacks What is Crypto Malware: Definition and Analysis in ANY.RUN February 21, 2024 936 views 5 min read
Analyst Training Understanding Macros in Malware: Types, Capabilities, Case Study February 20, 2024 2147 views 11 min read