Guest Posts Phishing, Cloud Abuse, and Evasion: Advanced OSINT Investigation with ANY.RUN Threat Intelligence October 7, 2025 295 views 9 min read
Malware Analysis FunkSec’s FunkLocker: How AI Is Powering the Next Wave of Ransomware October 1, 2025 3473 views 10 min read
Malware Analysis Fighting Telecom Cyberattacks: Investigating a Campaign Against UK Companies September 24, 2025 6907 views 10 min read
Malware Analysis Lazarus Group Attacks in 2025: Here’s Everything SOC Teams Need to Know September 10, 2025 5896 views 9 min read
Malware Analysis Salty 2FA: Undetected PhaaS from Storm-1575 Hitting US and EU Industries August 19, 2025 33310 views 12 min read
Malware Analysis Major Cyber Attacks in July 2025: Obfuscated .LNK‑Delivered DeerStealer, Fake 7‑Zip, and More July 29, 2025 6096 views 7 min read
Service Updates Free. Powerful. Actionable. Make Smarter Security Decisions with Live Attack Data July 16, 2025 4422 views 8 min read
Cybersecurity Lifehacks How to Spot Registry Abuse by Malware: Examples in ANY.RUN Sandbox June 24, 2025 4122 views 9 min read
Malware Analysis Cyber Attacks on Government Agencies: Detect and Investigate with ANY.RUN for Fast Response June 4, 2025 4747 views 9 min read
Malware Analysis OtterCookie: Analysis of Lazarus Group Malware Targeting Finance and Tech Professionals June 3, 2025 12384 views 10 min read
Malware Analysis How MSSPs Can Analyze and Investigate Phishing Attacks with ANY.RUN May 28, 2025 3764 views 7 min read
Instructions on ANY.RUN How to Analyze Node.js, Python, Android, and Linux Malware with ANY.RUN May 27, 2025 26834 views 11 min read