Guest Posts TI Lookup: Real-World Use Cases from a Malware Researcher October 2, 2024 3042 views 7 min read
Instructions on ANY.RUN How to Collect Indicators of Compromise in the ANY.RUN Sandbox October 1, 2024 3036 views 4 min read
Malware Analysis How to Intercept Data Exfiltrated by Malware via Telegram and Discord September 25, 2024 10308 views 13 min read
News Kransom Ransomware: New Threat Using DLL-Sideloading to Hijack Popular RPG September 23, 2024 3285 views 4 min read
Cybersecurity Lifehacks What is Spearphishing: Definition, Techniques, Real-world Example September 19, 2024 2579 views 6 min read
Instructions on ANY.RUN How to Collect Threat Intelligence Using Search Parameters in TI Lookup September 18, 2024 5580 views 9 min read
Integrations & connectors ANY.RUN Now Integrates with Splunk! September 12, 2024 3520 views 4 min read
Service Updates Release Notes: New YARA Rules, Signatures, Config Extractors, and More September 3, 2024 2481 views 3 min read
Cybersecurity Lifehacks What is Threat Intelligence? A Beginner’s Guide from ANY.RUN August 22, 2024 4312 views 10 min read