Cybersecurity Lifehacks How to Spot Registry Abuse by Malware: Examples in ANY.RUN Sandbox June 24, 2025 4126 views 9 min read
Cybersecurity Lifehacks Threat Hunting: Hands-on Tips for SOC Analysts and MSSPs June 18, 2025 2195 views 14 min read
Cybersecurity Lifehacks Why Businesses Are at Risk of Android Malware Attacks and How to Detect Them Early June 17, 2025 1349 views 7 min read
Malware Analysis Cyber Attacks on Government Agencies: Detect and Investigate with ANY.RUN for Fast Response June 4, 2025 4774 views 9 min read
Malware Analysis OtterCookie: Analysis of Lazarus Group Malware Targeting Finance and Tech Professionals June 3, 2025 12407 views 10 min read
Malware Analysis How MSSPs Can Analyze and Investigate Phishing Attacks with ANY.RUN May 28, 2025 3784 views 7 min read
Instructions on ANY.RUN How to Analyze Node.js, Python, Android, and Linux Malware with ANY.RUN May 27, 2025 26922 views 11 min read
News DBatLoader Delivers Remcos via .pif Files and UAC Bypass in New Phishing Campaign May 22, 2025 2842 views 4 min read
Malware Analysis Evolution of Tycoon 2FA Defense Evasion Mechanisms: Analysis and Timeline May 13, 2025 7813 views 18 min read
Malware Analysis Nitrogen Ransomware Exposed: How ANY.RUN Helps Uncover Threats to Finance May 7, 2025 27994 views 6 min read
Malware Analysis Mamona: Technical Analysis of a New Ransomware Strain May 6, 2025 7780 views 10 min read
Malware Analysis Pentagon Stealer: Go and Python Malware with Crypto Theft Capabilities April 29, 2025 28908 views 13 min read