{"id":10667,"date":"2025-01-02T12:52:00","date_gmt":"2025-01-02T12:52:00","guid":{"rendered":"\/cybersecurity-blog\/?p=10667"},"modified":"2025-11-12T11:27:00","modified_gmt":"2025-11-12T11:27:00","slug":"release-notes-december-2024","status":"publish","type":"post","link":"https:\/\/any.run\/cybersecurity-blog\/release-notes-december-2024\/","title":{"rendered":"Release Notes: New Search Operators in TI Lookup, Multi-admin Support\u00a0"},"content":{"rendered":"\n<p>As we wrap up 2024, we\u2019re excited to share the final release notes of the year, and they\u2019re packed with updates you\u2019re going to love!&nbsp;<\/p>\n\n\n\n<p>This December, we&#8217;ve shared some great news with our <a href=\"https:\/\/any.run\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release_notes_dec_24&amp;utm_term=020125&amp;utm_content=linktolanding\" target=\"_blank\" rel=\"noreferrer noopener\">ANY.RUN<\/a> community. From new wildcards and search operators in <a href=\"https:\/\/intelligence.any.run\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release_notes_dec_24&amp;utm_term=020125&amp;utm_content=linktoti\" target=\"_blank\" rel=\"noreferrer noopener\">TI Lookup<\/a> to the upgraded <a href=\"https:\/\/any.run\/cybersecurity-blog\/anyrun-for-enterprises\/\" target=\"_blank\" rel=\"noreferrer noopener\">Teamwork<\/a> feature, we\u2019ve been working to make your workflows smoother and more collaborative.\u00a0\u00a0<\/p>\n\n\n\n<p>And of course, we\u2019ve expanded our threat coverage to ensure you\u2019re ready to tackle whatever comes next.&nbsp;&nbsp;<\/p>\n\n\n\n<p>Let\u2019s dive in!&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">New Wildcards and Search Operators in ANY.RUN\u2019s TI Lookup&nbsp;<\/h2>\n\n\n\n<p>Searching through massive amounts of cyber threat data isn\u2019t exactly fun. It can be frustrating when small variations in domain names or IP addresses make it hard to connect the dots. That\u2019s why we\u2019ve updated <a href=\"https:\/\/intelligence.any.run\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release_notes_dec_24&amp;utm_term=020125&amp;utm_content=linktoti\" target=\"_blank\" rel=\"noreferrer noopener\">Threat Intelligence Lookup<\/a> (TI Lookup) with <a href=\"https:\/\/any.run\/cybersecurity-blog\/search-operators-and-wildcards-in-ti-lookup\/\" target=\"_blank\" rel=\"noreferrer noopener\">new wildcards and search operators<\/a> to give you more control and flexibility when crafting queries.&nbsp;<\/p>\n\n\n\n<p>Before this update, TI Lookup allowed you to use the basic operators <strong>AND<\/strong> along the wildcard <strong>*<\/strong>, which work great for flexible searches.&nbsp;&nbsp;<\/p>\n\n\n\n<p>In December, we\u2019ve expanded this functionality by adding new wildcards and operators to make threat intelligence even more versatile.&nbsp;<\/p>\n\n\n\n<p>What\u2019s new?&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>OR:<\/strong> The OR operator broadens your search by including results where at least one of the specified conditions is met. &nbsp;<\/li>\n<\/ul>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"605\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2024\/12\/image-11-1024x605.png\" alt=\"\" class=\"wp-image-10668\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/12\/image-11-1024x605.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/12\/image-11-300x177.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/12\/image-11-768x454.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/12\/image-11-1536x907.png 1536w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/12\/image-11-370x219.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/12\/image-11-270x159.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/12\/image-11-740x437.png 740w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/12\/image-11.png 1600w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\"><em>Example of a query with OR search operator inside TI Lookup<\/em>&nbsp;<\/figcaption><\/figure><\/div>\n\n\n<p><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>NOT:<\/strong> The NOT operator excludes results matching specific conditions, narrowing your search to focus on relevant entries.&nbsp;<\/li>\n\n\n\n<li><strong>Parentheses ()<\/strong>: They group conditions to ensure your query processes operators in the correct order, enabling precise, complex searches.&nbsp;<\/li>\n\n\n\n<li><strong>Question mark (?):<\/strong> Acts as a placeholder for a single character or none, making it perfect for handling variable strings.&nbsp;<\/li>\n\n\n\n<li><strong>Dollar sign ($)<\/strong>: Ensures your search term appears at the end of a string, useful for pinpointing entries with specific endings.&nbsp;<\/li>\n\n\n\n<li><strong>Caret (^)<\/strong>: Makes sure your search term appears at the beginning of a string, ideal for narrowing searches to items starting with specific patterns.&nbsp;<\/li>\n<\/ul>\n\n\n\n<p>For more details, check out the <a href=\"https:\/\/any.run\/cybersecurity-blog\/search-operators-and-wildcards-in-ti-lookup\/\" target=\"_blank\" rel=\"noreferrer noopener\">guide to using wildcards and operators<\/a>.&nbsp;<\/p>\n\n\n\n<!-- Regular Banner START -->\n<div class=\"regular-banner\">\n<!-- Text Content -->\n<p class=\"regular-banner__text\">\n\nGet <span class=\"highlight\">50 free requests<\/span> in TI Lookup <br>to enrich your threat investigations&nbsp;\n<\/p>\n<!-- CTA Link -->\n<a class=\"regular-banner__link\" id=\"article-banner-regular\" href=\"https:\/\/intelligence.any.run\/plans\/?utm_source=anyrunblog&#038;utm_medium=article&#038;utm_campaign=release_notes_dec_24&#038;utm_term=020125&#038;utm_content=linktotiplans\/\" rel=\"noopener\" target=\"_blank\">\nContact us\n<\/a>\n<\/div>\n<!-- Regular Banner END -->\n<!-- Regular Banner Styles START -->\n\n<style>\n.regular-banner {\ndisplay: flex;\ntext-align: center;\nflex-direction: column;\nalign-items: center;\ngap: 1.5rem;\nwidth: 100%;\npadding: 2rem;\nmargin: 1.5rem 0;\nborder-radius: 0.5rem;\nfont-family: 'Catamaran Bold';\nmargin-inline: auto;\nbackground: rgba(32, 168, 241, 0.1);\nborder: 1px solid rgba(75, 174, 227, 0.32);\n}\n\n.regular-banner__text {\nfont-size: 1.5rem;\nmargin: 0;\n}\n\n.highlight {\ncolor: #ea2526;\n}\n\n.regular-banner__link {\npadding: 0.5rem 1.5rem;\nfont-weight: 500;\ntext-decoration: none;\nborder-radius: 0.5rem;\ncolor: #FFFFFF;\nbackground-color: #1491D4;\ntext-align: center;\ntransition: all 0.2s ease-in;\n}\n\n.regular-banner__link:hover {\nbackground-color: #68CBFF;\ncolor: white;\n}\n<\/style>\n<!-- Regular Banner Styles END -->\n\n\n\n<h2 class=\"wp-block-heading\"><\/h2>\n\n\n\n<h2 class=\"wp-block-heading\">New Teamwork Feature: Multiple Admin Support&nbsp;&nbsp;<\/h2>\n\n\n\n<p>We\u2019re excited to announce a powerful December update to ANY.RUN\u2019s Teamwork feature, designed to simplify team management and improve collaboration for organizations of all sizes.&nbsp;<\/p>\n\n\n\n<p>Team owners can now assign admin roles to team members, with no limits on the number of admins.&nbsp;&nbsp;<\/p>\n\n\n\n<p>Admins have the following capabilities:&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Enable or disable Single Sign-On (SSO) for the team.&nbsp;<\/li>\n\n\n\n<li>Invite or remove team members as needed.&nbsp;<\/li>\n\n\n\n<li>Manage licenses for team members, including access to features like TI Lookup.&nbsp;<\/li>\n<\/ul>\n\n\n\n<p>Besides, admins can assign or revoke admin rights, ensuring flexible and efficient management.&nbsp;<\/p>\n\n\n\n<p>This update was driven by feedback from our customers, who needed a way to share responsibilities within their teams. Here\u2019s how it can help:&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Delegation<\/strong>: If a team owner is unavailable (e.g., on vacation), responsibilities can easily be handed over to admins.&nbsp;<\/li>\n\n\n\n<li><strong>Time zone flexibility<\/strong>: Large teams operating in different time zones can now have admins based in various regions, improving responsiveness and workflow efficiency.&nbsp;<\/li>\n<\/ul>\n\n\n\n<p><strong>How to start using this feature <\/strong>&nbsp;<\/p>\n\n\n\n<p>Team owners can assign admin roles in the <strong>Teamwork<\/strong> section under <strong>Licenses<\/strong>. Once set up, admins can immediately start managing the team and sharing responsibilities.&nbsp;<\/p>\n\n\n\n<!-- CTA Split START -->\n<div class=\"cta-split\">\n<div class=\"cta__split-left\">\n\n<!-- Image -->\n<img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/mcusercontent.com\/663b94f19348582a8dc323efe\/images\/0d88188b-3e89-2314-5a60-cb87e8077326.png\" alt=\"ANY.RUN cloud interactive sandbox interface\" class=\"cta__split-icon\" \/>\n<\/div>\n\n<div class=\"cta__split-right\">\n<div>\n\n<!-- Heading -->\n<h3 class=\"cta__split-heading\"><br>What is Enterprise plan?<\/h3>\n\n<!-- Text -->\n<p class=\"cta__split-text\">\nDiscover all features of the <span class=\"highlight\">Enterprise plan<\/span> <br>and learn about its Team Management capabilities\n<br \/>\n<\/p>\n<\/div>\n<!-- CTA Link -->\n<a target=\"_blank\" rel=\"noopener\" id=\"article-banner-split\" href=\"https:\/\/any.run\/cybersecurity-blog\/anyrun-for-enterprises\/\"><div class=\"cta__split-link\">See details<\/div><\/a>\n<\/div>\n<\/div>\n<!-- CTA Split END -->\n<!-- CTA Split Styles START -->\n<style>\n.cta-split {\noverflow: hidden;\nmargin: 3rem 0;\ndisplay: grid;\njustify-items: center;\nborder-radius: 0.5rem;\nwidth: 100%;\nmin-height: 25rem;\ngrid-template-columns: repeat(2, 1fr);\nborder: 1px solid rgba(75, 174, 227, 0.32);\nfont-family: 'Catamaran Bold';\n}\n\n.cta__split-left {\ndisplay: flex;\nalign-items: center;\njustify-content: center;\nheight: 100%;\nwidth: 100%;\nbackground-color: #161c59;\nbackground-position: center center;\nbackground: rgba(32, 168, 241, 0.1);\n}\n\n.cta__split-icon { \nwidth: 100%;\nheight: auto;\nobject-fit: contain;\nmax-width: 100%;\n}\n\n.cta__split-right {\ndisplay: flex;\nflex-direction: column;\njustify-content: space-between;\npadding: 2rem;\n}\n\n.cta__split-heading { font-size: 1.5rem; }\n\n.cta__split-text {\nmargin-top: 1rem;\nfont-family: Lato, Roboto, sans-serif;\n}\n\n.cta__split-link {\npadding: 0.5rem 1rem;\nfont-weight: 500;\ntext-decoration: none;\nborder-radius: 0.5rem;\ncolor: white;\nbackground-color: #1491D4;\ntext-align: center;\ntransition: all 0.2s ease-in;\ndisplay: block;\nz-index: 1000;\nposition: relative;\ncursor: pointer !important;\n}\n\n.cta__split-link:hover {\nbackground-color: #68CBFF;\ncolor: white;\ncursor: pointer;\n}\n\n.highlight { color: #ea2526;}\n\n\n\/* Mobile styles START *\/\n@media only screen and (max-width: 768px) {\n\n.cta-split {\ngrid-template-columns: 1fr;\nmin-height: auto;\n}\n\n.cta__split-left {\nheight: auto;\nmin-height: 10rem;\n}\n\n\n.cta__split-left, .cta__split-right {\nheight: auto;\n}\n\n.cta__split-heading { font-size: 1.2rem; }\n\n.cta__split-text { font-size: 1rem; }\n.cta__split-icon {\nmax-height: auto;\nobject-fit: cover;\n}\n\n}\n\/* Mobile styles END *\/\n<\/style>\n<!-- CTA Split Styles END -->\n\n\n\n<h2 class=\"wp-block-heading\">Threat Coverage Updates<\/h2>\n\n\n\n<p>In December, we expanded our detection capabilities, adding 58 new malware signatures, introducing advanced YARA rules, and further improving our machine learning (ML) models to keep up with evolving threats.&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Signatures&nbsp;<\/h3>\n\n\n\n<p>We\u2019ve introduced 58 new signatures targeting a diverse range of malware families. Here are some of them:&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/app.any.run\/tasks\/386919da-dbf4-4e3c-afe9-433eb2aad682\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release_notes_dec_24&amp;utm_term=020125&amp;utm_content=linktoservice\" target=\"_blank\" rel=\"noreferrer noopener\">Omani<\/a> &nbsp;<\/li>\n\n\n\n<li><a href=\"https:\/\/app.any.run\/tasks\/a917c856-1ec1-48aa-9519-7616378f3fc5\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release_notes_dec_24&amp;utm_term=020125&amp;utm_content=linktoservice\" target=\"_blank\" rel=\"noreferrer noopener\">Kunwoo<\/a> &nbsp;<\/li>\n\n\n\n<li><a href=\"https:\/\/app.any.run\/tasks\/6bc9ac8f-a31d-41d5-b8bc-f598dfe82ccc\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release_notes_dec_24&amp;utm_term=020125&amp;utm_content=linktoservice\" target=\"_blank\" rel=\"noreferrer noopener\">Ludbaruma<\/a> &nbsp;<\/li>\n\n\n\n<li><a href=\"https:\/\/app.any.run\/tasks\/b011f053-643a-439d-bad3-b52f1d00a6ce\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release_notes_dec_24&amp;utm_term=020125&amp;utm_content=linktoservice\" target=\"_blank\" rel=\"noreferrer noopener\">Trik<\/a> &nbsp;<\/li>\n\n\n\n<li><a href=\"https:\/\/app.any.run\/tasks\/c4480006-017f-4e14-a977-efd3c09ca608\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release_notes_dec_24&amp;utm_term=020125&amp;utm_content=linktoservice\" target=\"_blank\" rel=\"noreferrer noopener\">Sainbox<\/a> &nbsp;<\/li>\n\n\n\n<li><a href=\"https:\/\/app.any.run\/tasks\/3cf18b63-a132-4cc7-826e-03b8f66ac47d\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release_notes_dec_24&amp;utm_term=020125&amp;utm_content=linktoservice\" target=\"_blank\" rel=\"noreferrer noopener\">Expiro<\/a> &nbsp;<\/li>\n\n\n\n<li><a href=\"https:\/\/app.any.run\/tasks\/dafb51b9-053b-4c45-9d03-2a771a4c3d37\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release_notes_dec_24&amp;utm_term=020125&amp;utm_content=linktoservice\" target=\"_blank\" rel=\"noreferrer noopener\">Trickbot<\/a>&nbsp;<\/li>\n\n\n\n<li>Vidar&nbsp;<\/li>\n\n\n\n<li>Lumma&nbsp;<\/li>\n\n\n\n<li>Sonic&nbsp;<\/li>\n\n\n\n<li>Pinegrove&nbsp;<\/li>\n\n\n\n<li>Dusttrap&nbsp;<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">APT Detection Updates&nbsp;<\/h3>\n\n\n\n<p>We\u2019ve enhanced our detection capabilities for several known APT attacks:&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>SimpleHelp, BugSleep, and PortStarter are now comprehensively monitored.&nbsp;<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">New YARA Rules&nbsp;<\/h3>\n\n\n\n<p>5 new YARA rules were added this month for more precise detection:&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/app.any.run\/tasks\/58b788e3-2828-4b6b-abcb-146609ee603b\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release_notes_dec_24&amp;utm_term=020125&amp;utm_content=linktoservice\" target=\"_blank\" rel=\"noreferrer noopener\">Fog Ransom<\/a> &nbsp;<\/li>\n\n\n\n<li><a href=\"https:\/\/app.any.run\/tasks\/412f000d-e166-4755-8b20-251115659c10\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release_notes_dec_24&amp;utm_term=020125&amp;utm_content=linktoservice\" target=\"_blank\" rel=\"noreferrer noopener\">ArechClient2<\/a> &nbsp;<\/li>\n\n\n\n<li><a href=\"https:\/\/app.any.run\/tasks\/eac41640-45c2-4bc0-9fcb-819930dda904\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release_notes_dec_24&amp;utm_term=020125&amp;utm_content=linktoservice\" target=\"_blank\" rel=\"noreferrer noopener\">Dusttrap<\/a> &nbsp;<\/li>\n\n\n\n<li><a href=\"https:\/\/app.any.run\/tasks\/2d2b8f1a-6079-44b7-9e56-f480ef4fa7a2\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release_notes_dec_24&amp;utm_term=020125&amp;utm_content=linktoservice\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2024-38213<\/a>&nbsp;<\/li>\n\n\n\n<li>Umbral&nbsp;<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">Suricata Rule Updates&nbsp;<\/h3>\n\n\n\n<p>This month, we\u2019ve significantly expanded our Suricata rule collection by adding 5,159 new rules, enhancing our detection accuracy across a variety of threats.&nbsp;&nbsp;<\/p>\n\n\n\n<p>These updates include focused detections for phishing kits, such as:&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/app.any.run\/tasks\/ee23a17f-0201-4ba4-97b1-22c601235cf2\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release_notes_dec_24&amp;utm_term=020125&amp;utm_content=linktoservice\" target=\"_blank\" rel=\"noreferrer noopener\">Gabagool<\/a> &nbsp;<\/li>\n\n\n\n<li><a href=\"https:\/\/app.any.run\/tasks\/5ffb0701-66aa-48bb-86f3-c6783f4351ee\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release_notes_dec_24&amp;utm_term=020125&amp;utm_content=linktoservice\" target=\"_blank\" rel=\"noreferrer noopener\">WikiKit<\/a> &nbsp;<\/li>\n\n\n\n<li><a href=\"https:\/\/app.any.run\/tasks\/d08c73c8-21b9-4a3d-be5b-5af99dfc7187\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release_notes_dec_24&amp;utm_term=020125&amp;utm_content=linktoservice\" target=\"_blank\" rel=\"noreferrer noopener\">LogoKit<\/a> &nbsp;<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">Automated Interactivity Enhancements&nbsp;<\/h3>\n\n\n\n<p>We\u2019ve fine-tuned our automated interactivity clicker, making it smarter. These updates mean it\u2019s now even better at interacting with malware samples, accurately simulating how real users might behave.&nbsp;<\/p>\n\n\n\n<p>With these improvements, detecting complex threats just got easier. We made sure you get even more reliable results for your investigations.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">About ANY.RUN&nbsp;&nbsp;<\/h2>\n\n\n\n<p>ANY.RUN is a leading provider of a cloud-based malware analysis sandbox for effective threat hunting. Our service lets users safely and quickly analyze malware without the need for on-premises infrastructure. ANY.RUN is used by organizations of all sizes, including Fortune 500 companies, government agencies, and educational institutions.<\/p>\n\n\n\n<p><strong>With ANY.RUN you can:<\/strong>&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Detect malware in seconds<\/li>\n\n\n\n<li>Interact with samples in real time<\/li>\n\n\n\n<li>Save time and money on sandbox setup and maintenance<\/li>\n\n\n\n<li>Record and study all aspects of malware behavior<\/li>\n\n\n\n<li>Collaborate with your team&nbsp;<\/li>\n\n\n\n<li>Scale as you need<\/li>\n<\/ul>\n\n\n\n<p><a href=\"https:\/\/any.run\/demo\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release_notes_dec_24&amp;utm_term=020125&amp;utm_content=linktodemo\" target=\"_blank\" rel=\"noreferrer noopener\">Get a 14-day free trial of ANY.RUN&#8217;s Interactive Sandbox \u2192<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>As we wrap up 2024, we\u2019re excited to share the final release notes of the year, and they\u2019re packed with updates you\u2019re going to love!&nbsp; This December, we&#8217;ve shared some great news with our ANY.RUN community. From new wildcards and search operators in TI Lookup to the upgraded Teamwork feature, we\u2019ve been working to make [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":7723,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[9],"tags":[57,10,54,40,55,56],"class_list":["post-10667","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-service-updates","tag-anyrun","tag-cybersecurity","tag-features","tag-malware-behavior","tag-release","tag-update"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v20.10 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Release Notes: Upgrades in TI Lookup and More<\/title>\n<meta name=\"description\" content=\"New search operators in TI Lookup, multi-admin support, and expanded threat coverage in December 2024 updates from ANY.RUN.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/any.run\/cybersecurity-blog\/release-notes-december-2024\/\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"ANY.RUN\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/release-notes-december-2024\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/release-notes-december-2024\/\"},\"author\":{\"name\":\"ANY.RUN\",\"@id\":\"https:\/\/any.run\/\"},\"headline\":\"Release Notes: New Search Operators in TI Lookup, Multi-admin Support\u00a0\",\"datePublished\":\"2025-01-02T12:52:00+00:00\",\"dateModified\":\"2025-11-12T11:27:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/release-notes-december-2024\/\"},\"wordCount\":956,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/any.run\/\"},\"keywords\":[\"ANYRUN\",\"cybersecurity\",\"features\",\"malware behavior\",\"release\",\"update\"],\"articleSection\":[\"Service Updates\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/any.run\/cybersecurity-blog\/release-notes-december-2024\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/release-notes-december-2024\/\",\"url\":\"https:\/\/any.run\/cybersecurity-blog\/release-notes-december-2024\/\",\"name\":\"Release Notes: Upgrades in TI Lookup and More\",\"isPartOf\":{\"@id\":\"https:\/\/any.run\/\"},\"datePublished\":\"2025-01-02T12:52:00+00:00\",\"dateModified\":\"2025-11-12T11:27:00+00:00\",\"description\":\"New search operators in TI Lookup, multi-admin support, and expanded threat coverage in December 2024 updates from ANY.RUN.\",\"breadcrumb\":{\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/release-notes-december-2024\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/any.run\/cybersecurity-blog\/release-notes-december-2024\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/release-notes-december-2024\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/any.run\/cybersecurity-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Service Updates\",\"item\":\"https:\/\/any.run\/cybersecurity-blog\/category\/service-updates\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Release Notes: New Search Operators in TI Lookup, Multi-admin Support\u00a0\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/any.run\/\",\"url\":\"https:\/\/any.run\/\",\"name\":\"ANY.RUN&#039;s Cybersecurity Blog\",\"description\":\"Cybersecurity Blog covers topics for experienced professionals as well as for those new to it.\",\"publisher\":{\"@id\":\"https:\/\/any.run\/\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/any.run\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/any.run\/\",\"name\":\"ANY.RUN\",\"url\":\"https:\/\/any.run\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/any.run\/\",\"url\":\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg\",\"contentUrl\":\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg\",\"width\":1,\"height\":1,\"caption\":\"ANY.RUN\"},\"image\":{\"@id\":\"https:\/\/any.run\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/www.any.run\/\",\"https:\/\/twitter.com\/anyrun_app\",\"https:\/\/www.linkedin.com\/company\/30692044\",\"https:\/\/www.youtube.com\/channel\/UCOgCPho7lzmH7m6fPNlukrQ\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/any.run\/\",\"name\":\"ANY.RUN\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/any.run\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/c4ce3a6c672056b4a8cd6b0110782215?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/c4ce3a6c672056b4a8cd6b0110782215?s=96&d=mm&r=g\",\"caption\":\"ANY.RUN\"},\"url\":\"https:\/\/any.run\/cybersecurity-blog\/author\/a-bespalova\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Release Notes: Upgrades in TI Lookup and More","description":"New search operators in TI Lookup, multi-admin support, and expanded threat coverage in December 2024 updates from ANY.RUN.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/any.run\/cybersecurity-blog\/release-notes-december-2024\/","twitter_misc":{"Written by":"ANY.RUN","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/any.run\/cybersecurity-blog\/release-notes-december-2024\/#article","isPartOf":{"@id":"https:\/\/any.run\/cybersecurity-blog\/release-notes-december-2024\/"},"author":{"name":"ANY.RUN","@id":"https:\/\/any.run\/"},"headline":"Release Notes: New Search Operators in TI Lookup, Multi-admin Support\u00a0","datePublished":"2025-01-02T12:52:00+00:00","dateModified":"2025-11-12T11:27:00+00:00","mainEntityOfPage":{"@id":"https:\/\/any.run\/cybersecurity-blog\/release-notes-december-2024\/"},"wordCount":956,"commentCount":0,"publisher":{"@id":"https:\/\/any.run\/"},"keywords":["ANYRUN","cybersecurity","features","malware behavior","release","update"],"articleSection":["Service Updates"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/any.run\/cybersecurity-blog\/release-notes-december-2024\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/any.run\/cybersecurity-blog\/release-notes-december-2024\/","url":"https:\/\/any.run\/cybersecurity-blog\/release-notes-december-2024\/","name":"Release Notes: Upgrades in TI Lookup and More","isPartOf":{"@id":"https:\/\/any.run\/"},"datePublished":"2025-01-02T12:52:00+00:00","dateModified":"2025-11-12T11:27:00+00:00","description":"New search operators in TI Lookup, multi-admin support, and expanded threat coverage in December 2024 updates from ANY.RUN.","breadcrumb":{"@id":"https:\/\/any.run\/cybersecurity-blog\/release-notes-december-2024\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/any.run\/cybersecurity-blog\/release-notes-december-2024\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/any.run\/cybersecurity-blog\/release-notes-december-2024\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/any.run\/cybersecurity-blog\/"},{"@type":"ListItem","position":2,"name":"Service Updates","item":"https:\/\/any.run\/cybersecurity-blog\/category\/service-updates\/"},{"@type":"ListItem","position":3,"name":"Release Notes: New Search Operators in TI Lookup, Multi-admin Support\u00a0"}]},{"@type":"WebSite","@id":"https:\/\/any.run\/","url":"https:\/\/any.run\/","name":"ANY.RUN&#039;s Cybersecurity Blog","description":"Cybersecurity Blog covers topics for experienced professionals as well as for those new to it.","publisher":{"@id":"https:\/\/any.run\/"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/any.run\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/any.run\/","name":"ANY.RUN","url":"https:\/\/any.run\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/any.run\/","url":"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg","contentUrl":"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg","width":1,"height":1,"caption":"ANY.RUN"},"image":{"@id":"https:\/\/any.run\/"},"sameAs":["https:\/\/www.facebook.com\/www.any.run\/","https:\/\/twitter.com\/anyrun_app","https:\/\/www.linkedin.com\/company\/30692044","https:\/\/www.youtube.com\/channel\/UCOgCPho7lzmH7m6fPNlukrQ"]},{"@type":"Person","@id":"https:\/\/any.run\/","name":"ANY.RUN","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/any.run\/","url":"https:\/\/secure.gravatar.com\/avatar\/c4ce3a6c672056b4a8cd6b0110782215?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/c4ce3a6c672056b4a8cd6b0110782215?s=96&d=mm&r=g","caption":"ANY.RUN"},"url":"https:\/\/any.run\/cybersecurity-blog\/author\/a-bespalova\/"}]}},"_links":{"self":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts\/10667"}],"collection":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/comments?post=10667"}],"version-history":[{"count":14,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts\/10667\/revisions"}],"predecessor-version":[{"id":16751,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts\/10667\/revisions\/16751"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/media\/7723"}],"wp:attachment":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/media?parent=10667"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/categories?post=10667"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/tags?post=10667"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}