Cybersecurity Lifehacks Threat Intelligence Lookup: Combined Search for Precise Investigations March 19, 2024 1230 views 7 min read
Cybersecurity Lifehacks How We Process IOCs for ANY.RUN Threat Intelligence Lookup and Feeds March 13, 2024 1951 views 5 min read
Malware Analysis How to Set Up a Network Research Laboratory: MonikerLink (CVE-2024-21413) Case Study March 12, 2024 10708 views 7 min read
News LockBit is Back from the Dead. Here’s How to Prepare For its Return March 7, 2024 1968 views 4 min read
Service Updates Release Notes: Threat Intelligence Lookup, RSPAMD, 26 New Signatures, and More March 4, 2024 1397 views 5 min read
Cybersecurity Lifehacks How to Create a Sandbox Environment (for Malware Analysis) February 29, 2024 20132 views 10 min read
Cybersecurity Lifehacks Analyzing Linux Malware in ANY.RUN: 3 examples February 22, 2024 4060 views 4 min read
Cybersecurity Lifehacks What is Crypto Malware: Definition and Analysis in ANY.RUN February 21, 2024 2386 views 6 min read
Analyst Training Understanding Macros in Malware: Types, Capabilities, Case Study February 20, 2024 5084 views 11 min read