Cybersecurity Lifehacks A Guide to Common Encryption Algorithms in Modern Malware July 10, 2024 5239 views 7 min read
Service Updates Search for Network Threats by Suricata in TI Lookup July 9, 2024 3189 views 3 min read
Service Updates Release notes: Mutexes in TI Lookup, new YARA rules, extractors, and more July 3, 2024 1567 views 3 min read
Service Updates ANY.RUN’s New Vision: A Roadmap Shaped by Experience June 27, 2024 1824 views 5 min read
Malware Analysis Analysis of the Phishing Campaign: Behind the Incident June 26, 2024 17194 views 13 min read
News ANY.RUN Represented at BSides Canada and Cybersec Europe 2024 June 14, 2024 1795 views 3 min read
Service Updates Search for Malware Mutexes in ANY.RUN Threat Intelligence Lookup June 13, 2024 3768 views 3 min read
Cybersecurity Lifehacks How to Write a Comprehensive Malware Analysis Report June 6, 2024 4655 views 5 min read
Cybersecurity Lifehacks What is a Common Use Case for Technical Threat Intelligence June 3, 2024 1976 views 5 min read
Cybersecurity Lifehacks Understand Encryption in Malware: AES (Lu0Bot Example) May 30, 2024 2449 views 7 min read