Instructions on ANY.RUN Tools and Technologies ANY.RUN Uses to Protect Privacy of Enterprise Clients May 7, 2024 3435 views 7 min read
Service Updates Release Notes: YARA Search, New Rules, Config Extractors, and More May 2, 2024 1779 views 5 min read
Service Updates Find Malware by File Contents with YARA Search: Our New Threat Intelligence Service April 25, 2024 7607 views 6 min read
News Cybercriminals Exploit Google Ads to Spread IP Scanner with Concealed Backdoor April 23, 2024 2369 views 5 min read
Service Updates New PowerShell Script Tracer: Analyze PowerShell Execution April 18, 2024 4997 views 8 min read
Interviews Dmitry Marinov: ANY.RUN’s CTO on TI Lookup, Security Best Practices, how AI impacts Security Industry April 17, 2024 1895 views 7 min read
Cybersecurity Lifehacks Understand Encryption in Malware: From Basics to XOR April 11, 2024 4247 views 3 min read
Malware Analysis Client-Side Exploitation: abusing WebDAV+URL+LNK to Deliver Malicious Payloads April 8, 2024 11205 views 2 min read
Cybersecurity Lifehacks How to Use Cyber Threat Intelligence: the Basics April 5, 2024 1580 views 7 min read
Instructions on ANY.RUN Quickly Check if a Sample is Malicious with ANY.RUN’s Process Tree April 4, 2024 3769 views 7 min read