Malware Analysis Top 3 Cyber Attacks in June 2025: GitHub Abuse, Control Flow Flattening, and More June 25, 2025 46622 views 7 min read
Cybersecurity Lifehacks How to Spot Registry Abuse by Malware: Examples in ANY.RUN Sandbox June 24, 2025 5349 views 9 min read
Service Updates Simplify Threat Analysis and Boost Detection Rate with Detonation Actions June 19, 2025 8074 views 6 min read
Cybersecurity Lifehacks Threat Hunting: Hands-on Tips for SOC Analysts and MSSPs June 18, 2025 2974 views 14 min read
Cybersecurity Lifehacks Why Businesses Are at Risk of Android Malware Attacks and How to Detect Them Early June 17, 2025 1929 views 7 min read
Cybersecurity Lifehacks 5 Key Ways Threat Intelligence Feeds Drive SOC Performance June 11, 2025 1818 views 7 min read
Cybersecurity Lifehacks How SOC Teams Save Time and Effort with ANY.RUN: Action Plan June 10, 2025 1614 views 11 min read
Service Updates Release Notes: TAXII Support for TI Feeds, New Sandbox Onboarding, and 900+ Detection Rules June 4, 2025 5964 views 6 min read
Malware Analysis Cyber Attacks on Government Agencies: Detect and Investigate with ANY.RUN for Fast Response June 4, 2025 12521 views 9 min read
Malware Analysis OtterCookie: Analysis of Lazarus Group Malware Targeting Finance and Tech Professionals June 3, 2025 22266 views 10 min read
Malware Analysis How MSSPs Can Analyze and Investigate Phishing Attacks with ANY.RUN May 28, 2025 18029 views 7 min read
Instructions on ANY.RUN How to Analyze Node.js, Python, Android, and Linux Malware with ANY.RUN May 27, 2025 29971 views 11 min read