{"id":10691,"date":"2025-01-08T07:48:48","date_gmt":"2025-01-08T07:48:48","guid":{"rendered":"\/cybersecurity-blog\/?p=10691"},"modified":"2025-11-13T08:49:10","modified_gmt":"2025-11-13T08:49:10","slug":"annual-report-2024","status":"publish","type":"post","link":"https:\/\/any.run\/cybersecurity-blog\/annual-report-2024\/","title":{"rendered":"2024 Wrapped: A Year of Growth, Innovation, and Community at ANY.RUN\u00a0"},"content":{"rendered":"\n<p>As we wrap up 2024, let\u2019s take a moment to reflect on what an incredible year it\u2019s been for <a href=\"https:\/\/any.run\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=annual-report-2024&amp;utm_term=080125&amp;utm_content=linktolanding\" target=\"_blank\" rel=\"noreferrer noopener\">ANY.RUN<\/a>. Together, we\u2019ve achieved so much: breaking barriers, improving tools, and working side by side with you, our amazing community of cybersecurity heroes.&nbsp;<\/p>\n\n\n\n<p>From big product launches to small tweaks that make a huge difference, everything we\u2019ve done this year has been with one goal in mind: to make your fight against cyber threats easier, smarter, and faster.&nbsp;<\/p>\n\n\n\n<p>Let\u2019s take a look back at some of the highlights that made this year unforgettable!&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Interactive Sandbox&nbsp;<\/h2>\n\n\n\n<p>This year, we took significant strides to enhance your experience with the ANY.RUN sandbox, introducing new features and upgrades to help you combat cyber threats more effectively.&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Linux OS Support for In-Depth Malware Analysis&nbsp;<\/h3>\n\n\n\n<p>For the first time, our sandbox <a href=\"https:\/\/any.run\/cybersecurity-blog\/linux-malware-analysis-sandbox\/\" target=\"_blank\" rel=\"noreferrer noopener\">extended its capabilities beyond Windows<\/a>, making it possible for malware analysts, SOC teams, and DFIR experts to analyze Linux-based samples in a secure and interactive cloud environment.&nbsp;<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"580\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2024\/12\/image-13-1024x580.png\" alt=\"\" class=\"wp-image-10696\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/12\/image-13-1024x580.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/12\/image-13-300x170.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/12\/image-13-768x435.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/12\/image-13-1536x870.png 1536w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/12\/image-13-2048x1160.png 2048w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/12\/image-13-370x210.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/12\/image-13-270x153.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/12\/image-13-740x419.png 740w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\"><em>Analyzing malware inside secure Linux environment<\/em>&nbsp;<\/figcaption><\/figure><\/div>\n\n\n<p>With real-time monitoring of suspicious activities, detailed reports featuring the&nbsp;MITRE ATT&amp;CK Matrix,&nbsp;Process Graphs, and&nbsp;IOCs, you can now uncover threats on Linux systems with the same precision and speed you\u2019ve come to expect from ANY.RUN.&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Universal Windows 10 x64 Access&nbsp;<\/h3>\n\n\n\n<p>In 2024, we <a href=\"https:\/\/any.run\/cybersecurity-blog\/windows-10-sandbox\/\" target=\"_blank\" rel=\"noreferrer noopener\">made&nbsp;Windows 10 (64-bit) VMs&nbsp;available to all users<\/a>, including those on the Community plan!&nbsp;<\/p>\n\n\n\n<p>Everyone can analyze malware and phishing threats in a modern Windows environment, leveling the playing field for cybersecurity investigations.&nbsp;<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"797\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2024\/12\/image2-5-1024x797.png\" alt=\"\" class=\"wp-image-10698\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/12\/image2-5-1024x797.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/12\/image2-5-300x233.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/12\/image2-5-768x598.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/12\/image2-5-1536x1195.png 1536w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/12\/image2-5-370x288.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/12\/image2-5-270x210.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/12\/image2-5-385x300.png 385w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/12\/image2-5-740x576.png 740w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/12\/image2-5.png 1668w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\"><em>WIndows 10 (64 bit) available to everyone<\/em>, <em>including on free plan<\/em><\/figcaption><\/figure><\/div>\n\n\n<p>This update ensures everyone can access powerful threat analysis tools and helps improve threat detection for the entire ANY.RUN community.&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Automated Interactivity: Smarter and Faster Malware Detonation&nbsp;<\/h3>\n\n\n\n<p>With&nbsp;<a href=\"https:\/\/any.run\/cybersecurity-blog\/automated-interactivity-stage-two\/\" target=\"_blank\" rel=\"noreferrer noopener\">Stage 2 Automated Interactivity<\/a>, ANY.RUN\u2019s Interactive Sandbox now handles even more complex malware and phishing scenarios automatically. From extracting URLs in QR codes to detonating payloads in email attachments and navigating long redirect chains, it\u2019s all done without user input.&nbsp;<\/p>\n\n\n\n<figure class=\"wp-block-video aligncenter\"><video controls src=\"\/cybersecurity-blog\/wp-content\/uploads\/2024\/11\/formbook_2.mp4\"><\/video><figcaption class=\"wp-element-caption\"><em>Automated Interactivity<\/em> <em>quickly<\/em> <em>identifies and detonates Formbook inside an archive attached to an email<\/em><\/figcaption><\/figure>\n\n\n\n<p>Our analyst team continuously adds new attack scenarios, ensuring your sandbox stays one step ahead of evolving threats!&nbsp;<\/p>\n\n\n\n<!-- Regular Banner START -->\n<div class=\"regular-banner\">\n<!-- Text Content -->\n<p class=\"regular-banner__text\">\nTry <span class=\"highlight\">Automated Interactivity<\/span> and other PRO features <br>of the ANY.RUN Sandbox for free&nbsp;   \n<\/p>\n<!-- CTA Link -->\n<a class=\"regular-banner__link\" id=\"article-banner-regular\" href=\"https:\/\/any.run\/demo\/?utm_source=anyrunblog&#038;utm_medium=article&#038;utm_campaign=annual-report-2024&#038;utm_term=080125&#038;utm_content=linktodemo\/\" rel=\"noopener\" target=\"_blank\">\nRequest 14-day trial\n<\/a>\n<\/div>\n<!-- Regular Banner END -->\n<!-- Regular Banner Styles START -->\n\n<style>\n.regular-banner {\ndisplay: flex;\ntext-align: center;\nflex-direction: column;\nalign-items: center;\ngap: 1.5rem;\nwidth: 100%;\npadding: 2rem;\nmargin: 1.5rem 0;\nborder-radius: 0.5rem;\nfont-family: 'Catamaran Bold';\nmargin-inline: auto;\nbackground: rgba(32, 168, 241, 0.1);\nborder: 1px solid rgba(75, 174, 227, 0.32);\n}\n\n.regular-banner__text {\nfont-size: 1.5rem;\nmargin: 0;\n}\n\n.highlight {\ncolor: #ea2526;\n}\n\n.regular-banner__link {\npadding: 0.5rem 1.5rem;\nfont-weight: 500;\ntext-decoration: none;\nborder-radius: 0.5rem;\ncolor: #FFFFFF;\nbackground-color: #1491D4;\ntext-align: center;\ntransition: all 0.2s ease-in;\n}\n\n.regular-banner__link:hover {\nbackground-color: #68CBFF;\ncolor: white;\n}\n<\/style>\n<!-- Regular Banner Styles END -->\n\n\n\n<h3 class=\"wp-block-heading\">A New Look at Network Threats: Redesigned Details Window&nbsp;<\/h3>\n\n\n\n<p>IIn 2024, we <a href=\"https:\/\/any.run\/cybersecurity-blog\/new-threat-details-window\/\" target=\"_blank\" rel=\"noreferrer noopener\">revamped the&nbsp;Threat details window<\/a>&nbsp;to give you a clearer view of malware activity. Now, you can access all key intel, like source data, IP addresses, ports, and protocols, in one streamlined view.&nbsp;<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"566\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2024\/12\/image3-4-1024x566.png\" alt=\"\" class=\"wp-image-10701\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/12\/image3-4-1024x566.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/12\/image3-4-300x166.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/12\/image3-4-768x425.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/12\/image3-4-1536x850.png 1536w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/12\/image3-4-370x205.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/12\/image3-4-270x149.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/12\/image3-4-740x409.png 740w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/12\/image3-4.png 1828w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\"><em>Hunter and Enterprise subscribers can look inside Suricata rules<\/em>&nbsp;<\/figcaption><\/figure><\/div>\n\n\n<p>And for&nbsp;Hunter&nbsp;and&nbsp;Enterprise&nbsp;users, the new&nbsp;<a href=\"https:\/\/any.run\/cybersecurity-blog\/detection-with-suricata-ids\/\" target=\"_blank\" rel=\"noreferrer noopener\"><em>Suricata rule<\/em> tab<\/a>&nbsp;opens the door to the signatures behind the detections.&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">PowerShell Support in Script Tracer&nbsp;<\/h3>\n\n\n\n<p>This year, we supercharged our&nbsp;Script Tracer&nbsp;by <a href=\"https:\/\/any.run\/cybersecurity-blog\/powershell-script-tracer\/\" target=\"_blank\" rel=\"noreferrer noopener\">adding&nbsp;PowerShell support<\/a>&nbsp;to its arsenal, alongside JScript, VB Script, VBA, and Macro 4.0.&nbsp;<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"603\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2024\/12\/image4-5-1024x603.png\" alt=\"\" class=\"wp-image-10702\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/12\/image4-5-1024x603.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/12\/image4-5-300x177.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/12\/image4-5-768x452.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/12\/image4-5-1536x904.png 1536w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/12\/image4-5-370x218.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/12\/image4-5-270x159.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/12\/image4-5-740x435.png 740w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/12\/image4-5.png 1966w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\"><em>Example of PowerShell script in ANY.RUN\u2019s Tracer<\/em>&nbsp;<\/figcaption><\/figure><\/div>\n\n\n<p>Now, you can follow PowerShell scripts step by step, making it easier to analyze and counter malware leveraging persistence, lateral movement, or payload execution.&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Your Private AI Assistant: Smarter, Safer, and Always There to Help&nbsp;<\/h3>\n\n\n\n<p>This year, we introduced a&nbsp;<a href=\"https:\/\/any.run\/cybersecurity-blog\/private-ai-for-malware-analysis\/\" target=\"_blank\" rel=\"noreferrer noopener\">private AI model<\/a>&nbsp;inside ANY.RUN\u2019s sandbox. &nbsp;<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"542\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2024\/12\/image5-5-1024x542.png\" alt=\"\" class=\"wp-image-10704\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/12\/image5-5-1024x542.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/12\/image5-5-300x159.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/12\/image5-5-768x407.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/12\/image5-5-1536x813.png 1536w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/12\/image5-5-2048x1084.png 2048w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/12\/image5-5-370x196.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/12\/image5-5-270x143.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/12\/image5-5-740x392.png 740w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\"><em>AI assistance inside ANY.RUN\u2019s sandbox<\/em>&nbsp;<\/figcaption><\/figure><\/div>\n\n\n<p>Now, you can get fast, AI-powered explanations in both public and private sessions, without worrying about data leaving your hands.&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Phishing Detection with <\/strong>RSPAMD<\/h3>\n\n\n\n<p>In 2024, we leveled up our phishing detection game with the integration of&nbsp;<a href=\"https:\/\/any.run\/cybersecurity-blog\/rspamd-email-analysis\/\" target=\"_blank\" rel=\"noreferrer noopener\">RSPAMD<\/a>, an open-source email filtering system, into ANY.RUN\u2019s Static Discovering module.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"625\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2024\/02\/1-3-1024x625.png\" alt=\"\" class=\"wp-image-7038\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/02\/1-3-1024x625.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/02\/1-3-300x183.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/02\/1-3-768x469.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/02\/1-3-1536x937.png 1536w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/02\/1-3-2048x1249.png 2048w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/02\/1-3-370x226.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/02\/1-3-270x165.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/02\/1-3-740x451.png 740w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\"><em>RSPAMD analysis inside the ANY.RUN sandbox<\/em><\/figcaption><\/figure><\/div>\n\n\n<p>With features like&nbsp;Score,&nbsp;Content, and&nbsp;Header Descriptions, you can dive deep into email analysis.&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>STIX Reports<\/strong>&nbsp;<\/h3>\n\n\n\n<p>We added the ability to export threat data in the&nbsp;<a href=\"https:\/\/any.run\/cybersecurity-blog\/malware-analysis-report\/#3-stix-reports-2690\" target=\"_blank\" rel=\"noreferrer noopener\">STIX format<\/a>, a standardized language for sharing cyber threat intelligence. The report contains the link to the sandbox session, hashes, network traffic details, file system modifications, TTPs, and more.&nbsp;<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"918\" height=\"838\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2024\/12\/image-12.png\" alt=\"\" class=\"wp-image-10692\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/12\/image-12.png 918w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/12\/image-12-300x274.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/12\/image-12-768x701.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/12\/image-12-370x338.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/12\/image-12-270x246.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/12\/image-12-740x676.png 740w\" sizes=\"(max-width: 918px) 100vw, 918px\" \/><figcaption class=\"wp-element-caption\"><em>Click&nbsp;Export \u2192 STIX&nbsp;to download threat data<\/em>&nbsp;<\/figcaption><\/figure><\/div>\n\n\n<h3 class=\"wp-block-heading\">A Fresh Look for Faster Analysis: Sandbox Home Screen Redesign&nbsp;<\/h3>\n\n\n\n<p>We gave the&nbsp;<a href=\"https:\/\/app.any.run\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=annual-report-2024&amp;utm_term=080125&amp;utm_content=linktoregistration#register\/\" target=\"_blank\" rel=\"noreferrer noopener\">ANY.RUN Sandbox home screen<\/a>&nbsp;a sleek makeover to make navigation easier and faster.&nbsp;<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"580\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2024\/12\/image7-3-1024x580.png\" alt=\"\" class=\"wp-image-10706\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/12\/image7-3-1024x580.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/12\/image7-3-300x170.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/12\/image7-3-768x435.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/12\/image7-3-1536x871.png 1536w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/12\/image7-3-2048x1161.png 2048w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/12\/image7-3-370x210.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/12\/image7-3-270x153.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/12\/image7-3-740x419.png 740w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\"><em>ANY.RUN sandbox has a new home page<\/em>&nbsp;<\/figcaption><\/figure><\/div>\n\n\n<p>New&nbsp;shortcut buttons&nbsp;let you launch analysis sessions in just a click&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Tag It Your Way: Custom Tags via API&nbsp;<\/h3>\n\n\n\n<p>Now you can set custom tags&nbsp;to sandbox sessions directly through the API, adding to the flexibility of the web interface. Organize and categorize your analyses your way, with more control than ever before!&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Teamwork Upgrades&nbsp;<\/h3>\n\n\n\n<p>This year, we made significant upgrades to&nbsp;the <a href=\"https:\/\/any.run\/cybersecurity-blog\/anyrun-for-enterprises\/\" target=\"_blank\" rel=\"noreferrer noopener\">Teamwork functionality<\/a> of the ANY.RUN sandbox. Some of the key changes include:&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Single Sign-On (SSO): <\/strong>We\u2019ve tackled key issues like fixing the logout process and resolving setup problems. Plus, you now can log in not just through our authorization window but also using third-party services.&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Exporting team history: <\/strong>Enterprise users can now export structured lists of their team\u2019s sandbox sessions in&nbsp;JSON format. &nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Mutli-admin support<\/strong>: Team owners can now appoint <a href=\"https:\/\/any.run\/cybersecurity-blog\/release-notes-december-2024\/\" target=\"_blank\" rel=\"noreferrer noopener\">multiple admins<\/a> to manage their teams more effectively. Admins have the ability to enable and disable SSO, invite or remove team members, and manage licenses, including Threat Intelligence (TI) licenses.&nbsp;<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">Threat Intelligence Lookup&nbsp;<\/h2>\n\n\n\n<p>In 2024, we introduced&nbsp;<a href=\"https:\/\/intelligence.any.run\/analysis\/lookup\/\" target=\"_blank\" rel=\"noreferrer noopener\">Threat Intelligence Lookup<\/a>, a tool designed to give you access to a centralized repository of millions of Indicators of Compromise (IOCs), Indicators of Attack (IOAs), and Indicators of Behavior (IOBs). <\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"606\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2024\/12\/image8-2-1024x606.png\" alt=\"\" class=\"wp-image-10711\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/12\/image8-2-1024x606.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/12\/image8-2-300x178.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/12\/image8-2-768x455.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/12\/image8-2-1536x909.png 1536w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/12\/image8-2-2048x1212.png 2048w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/12\/image8-2-370x219.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/12\/image8-2-270x160.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/12\/image8-2-740x438.png 740w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\"><em>TI Lookup released in 2024<\/em>&nbsp;<\/figcaption><\/figure><\/div>\n\n\n<p>This powerful service allows you to build precise queries, use them to search across threat data from sandbox sessions, and enrich your threat intelligence with additional context, connecting isolated IOCs to broader malware campaigns, all in one place.&nbsp;<\/p>\n\n\n\n<!-- Regular Banner START -->\n<div class=\"regular-banner\">\n<!-- Text Content -->\n<p class=\"regular-banner__text\">\nGet <span class=\"highlight\">50 free requests<\/span> to test TI Lookup&nbsp;   \n<\/p>\n<!-- CTA Link -->\n<a class=\"regular-banner__link\" id=\"article-banner-regular\" href=\"https:\/\/intelligence.any.run\/plans\/?utm_source=anyrunblog&#038;utm_medium=article&#038;utm_campaign=annual-report-2024&#038;utm_term=080125&#038;utm_content=linktotiplans\/\" rel=\"noopener\" target=\"_blank\">\nContact us\n<\/a>\n<\/div>\n<!-- Regular Banner END -->\n<!-- Regular Banner Styles START -->\n\n<style>\n.regular-banner {\ndisplay: flex;\ntext-align: center;\nflex-direction: column;\nalign-items: center;\ngap: 1.5rem;\nwidth: 100%;\npadding: 2rem;\nmargin: 1.5rem 0;\nborder-radius: 0.5rem;\nfont-family: 'Catamaran Bold';\nmargin-inline: auto;\nbackground: rgba(32, 168, 241, 0.1);\nborder: 1px solid rgba(75, 174, 227, 0.32);\n}\n\n.regular-banner__text {\nfont-size: 1.5rem;\nmargin: 0;\n}\n\n.highlight {\ncolor: #ea2526;\n}\n\n.regular-banner__link {\npadding: 0.5rem 1.5rem;\nfont-weight: 500;\ntext-decoration: none;\nborder-radius: 0.5rem;\ncolor: #FFFFFF;\nbackground-color: #1491D4;\ntext-align: center;\ntransition: all 0.2s ease-in;\n}\n\n.regular-banner__link:hover {\nbackground-color: #68CBFF;\ncolor: white;\n}\n<\/style>\n<!-- Regular Banner Styles END -->\n\n\n\n<p>But we didn\u2019t stop there!&nbsp;<\/p>\n\n\n\n<p>Throughout the year, we worked hard to refine TI Lookup, adding new features and capabilities to make it even better for security teams and professionals. &nbsp;<\/p>\n\n\n\n<p>Here\u2019s how we\u2019ve enhanced it:&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">YARA Search: Your Custom Threat-Hunting Tool&nbsp;<\/h3>\n\n\n\n<p>This year, we expanded our Threat Intelligence suite with&nbsp;<a href=\"https:\/\/any.run\/cybersecurity-blog\/yara-search-guide\/\" target=\"_blank\" rel=\"noreferrer noopener\">YARA Search<\/a>, giving users the power to scan ANY.RUN\u2019s extensive database using custom YARA rules.&nbsp;<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"321\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2024\/12\/image9-3-1024x321.png\" alt=\"\" class=\"wp-image-10712\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/12\/image9-3-1024x321.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/12\/image9-3-300x94.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/12\/image9-3-768x241.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/12\/image9-3-1536x481.png 1536w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/12\/image9-3-2048x641.png 2048w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/12\/image9-3-370x116.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/12\/image9-3-270x85.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/12\/image9-3-740x232.png 740w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\"><em>YARA search inside TI Lookup<\/em>&nbsp;<\/figcaption><\/figure><\/div>\n\n\n<p>With a built-in editor, you can easily write, edit, test, and manage your rules. Once matching malicious files are identified, dive deeper by analyzing their behavior directly in the sandbox.&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Mutex Search: Precision Meets Speed in TI Lookup&nbsp;<\/h3>\n\n\n\n<p>We\u2019ve enhanced&nbsp;Threat Intelligence Lookup&nbsp;with a <a href=\"https:\/\/any.run\/cybersecurity-blog\/mutex-search-in-ti-lookup\/\" target=\"_blank\" rel=\"noreferrer noopener\">powerful&nbsp;Mutex Search&nbsp;feature<\/a>, designed to make your investigations faster and more precise.&nbsp;<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"566\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2024\/12\/imagea-3-1024x566.png\" alt=\"\" class=\"wp-image-10714\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/12\/imagea-3-1024x566.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/12\/imagea-3-300x166.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/12\/imagea-3-768x425.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/12\/imagea-3-1536x850.png 1536w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/12\/imagea-3-2048x1133.png 2048w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/12\/imagea-3-370x205.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/12\/imagea-3-270x149.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/12\/imagea-3-740x409.png 740w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\"><em>List of DCRat mutexes<\/em>&nbsp;<\/figcaption><\/figure><\/div>\n\n\n<p>Using queries like&nbsp;SyncObjectName:&#8221;[name of the malware]&#8221;, you can quickly locate relevant sandbox analysis sessions tied to specific mutexes.&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Suricata Search: Deeper Dive into Network Threats&nbsp;<\/h3>\n\n\n\n<p>The&nbsp;Threat Intelligence Lookup&nbsp;now includes&nbsp;<a href=\"https:\/\/any.run\/cybersecurity-blog\/suricata-search\/\" target=\"_blank\" rel=\"noreferrer noopener\">Suricata search fields<\/a>, making it easier to pinpoint specific network threats.&nbsp;<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"682\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2024\/12\/imageb-5-1024x682.png\" alt=\"\" class=\"wp-image-10716\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/12\/imageb-5-1024x682.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/12\/imageb-5-300x200.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/12\/imageb-5-768x511.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/12\/imageb-5-1536x1022.png 1536w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/12\/imageb-5-370x246.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/12\/imageb-5-270x180.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/12\/imageb-5-740x493.png 740w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/12\/imageb-5.png 1705w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\"><em>Suricata search inside TI Lookup<\/em>&nbsp;<\/figcaption><\/figure><\/div>\n\n\n<p>Search using fields like&nbsp;SuricataClass,&nbsp;SuricataMessage,&nbsp;SuricataThreatLevel, and&nbsp;SuricataID&nbsp;to uncover detailed information about network activity. &nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Malware Config Insights: Unlocking Hidden IOCs&nbsp;<\/h3>\n\n\n\n<p>We\u2019ve expanded&nbsp;Threat Intelligence Lookup&nbsp;to <a href=\"https:\/\/any.run\/cybersecurity-blog\/malconf-in-ti-lookup\/\" target=\"_blank\" rel=\"noreferrer noopener\">include&nbsp;IOCs from malware configurations<\/a>, manually extracted from reverse-engineered samples.&nbsp;<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"576\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2024\/07\/1-1024x576.png\" alt=\"\" class=\"wp-image-8429\" style=\"width:650px;height:auto\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/07\/1-1024x576.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/07\/1-300x169.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/07\/1-768x432.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/07\/1-370x208.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/07\/1-270x152.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/07\/1-740x416.png 740w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/07\/1.png 1395w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\"><em>&#8220;malconf&#8221; domains<\/em> <em>in TI Lookup<\/em><\/figcaption><\/figure><\/div>\n\n\n<p>Currently covering&nbsp;79 malware families, these config-based IOCs are tagged with \u201cmalconf\u201d for easy identification. This feature gives you a clearer understanding of malware behavior and helps you uncover actionable insights faster than ever.&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Notifications&nbsp;<\/h3>\n\n\n\n<p>Threat Intelligence Lookup has also been upgraded with the new&nbsp;<a href=\"https:\/\/any.run\/cybersecurity-blog\/ti-lookup-notifications\/\" target=\"_blank\" rel=\"noreferrer noopener\">Notifications&nbsp;feature<\/a>.&nbsp;<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"503\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2024\/12\/imagec-3-1024x503.png\" alt=\"\" class=\"wp-image-10719\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/12\/imagec-3-1024x503.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/12\/imagec-3-300x147.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/12\/imagec-3-768x377.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/12\/imagec-3-1536x754.png 1536w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/12\/imagec-3-370x182.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/12\/imagec-3-270x133.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/12\/imagec-3-740x363.png 740w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/12\/imagec-3.png 1846w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\"><em>Notifications in TI Lookup<\/em>&nbsp;<\/figcaption><\/figure><\/div>\n\n\n<p>Subscribe to specific search queries and receive alerts on new&nbsp;IOCs,&nbsp;IOAs, and&nbsp;IOBs&nbsp;directly in your dashboard. New results are clearly highlighted, making it easier to stay on top of emerging threats and act quickly.&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Redesigned Home Screen with Interactive MITRE ATT&amp;CK Matrix&nbsp;<\/h3>\n\n\n\n<p>In 2024, we took the time to give the&nbsp;<a href=\"https:\/\/intelligence.any.run\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=annual-report-2024&amp;utm_term=080125&amp;utm_content=linktoti\" target=\"_blank\" rel=\"noreferrer noopener\">Threat Intelligence home screen<\/a>&nbsp;a thoughtful upgrade, making it more user-friendly and packed with valuable features.&nbsp;<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"576\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2024\/12\/imaged-2-1024x576.png\" alt=\"\" class=\"wp-image-10721\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/12\/imaged-2-1024x576.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/12\/imaged-2-300x169.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/12\/imaged-2-768x432.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/12\/imaged-2-1536x864.png 1536w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/12\/imaged-2-370x208.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/12\/imaged-2-270x152.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/12\/imaged-2-740x416.png 740w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/12\/imaged-2.png 1920w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\"><em>Updated version of the Threat Intelligence home page<\/em>&nbsp;<em>lets you explore samples with specific TTPs<\/em><\/figcaption><\/figure><\/div>\n\n\n<p>The new design offers a clearer, more intuitive view of the threat landscape. We\u2019ve added a&nbsp;MITRE ATT&amp;CK matrix with refined techniques and tactics, along with real-world examples of malware and phishing threats analyzed in the ANY.RUN sandbox.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">TI Feeds&nbsp;<\/h2>\n\n\n\n<p>Our&nbsp;<a href=\"https:\/\/intelligence.any.run\/feeds\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=annual-report-2024&amp;utm_term=080125&amp;utm_content=linktotifeeds\" target=\"_blank\" rel=\"noreferrer noopener\">Threat Intelligence Feeds<\/a>&nbsp;provide actionable data on malicious IPs, URLs, and domains, collected from analysis sessions created by over&nbsp;500,000 researchers&nbsp;in the ANY.RUN sandbox.&nbsp;<\/p>\n\n\n\n<p>This year, we further improved TI Feeds by introducing <a href=\"https:\/\/any.run\/cybersecurity-blog\/inside-cyber-threat-intelligence-feeds\/\" target=\"_blank\" rel=\"noreferrer noopener\">STIX<\/a> and <a href=\"https:\/\/any.run\/cybersecurity-blog\/misp-integration\/\" target=\"_blank\" rel=\"noreferrer noopener\">MISP<\/a> formats.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"576\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2024\/12\/imagee-3-1024x576.png\" alt=\"\" class=\"wp-image-10723\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/12\/imagee-3-1024x576.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/12\/imagee-3-300x169.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/12\/imagee-3-768x432.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/12\/imagee-3-1536x864.png 1536w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/12\/imagee-3-2048x1152.png 2048w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/12\/imagee-3-370x208.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/12\/imagee-3-270x152.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/12\/imagee-3-740x416.png 740w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\"><em>You can test demo TI Feeds for free<\/em>&nbsp;<\/figcaption><\/figure><\/div>\n\n\n<p>We also introduced demo samples of our feeds that any user can try for free via API.&nbsp;<\/p>\n\n\n\n<!-- Regular Banner START -->\n<div class=\"regular-banner\">\n<!-- Text Content -->\n<p class=\"regular-banner__text\">\nTry <span class=\"highlight\">TI Feeds demo sample<\/span> via API&nbsp;   \n<\/p>\n<!-- CTA Link -->\n<a class=\"regular-banner__link\" id=\"article-banner-regular\" href=\"https:\/\/intelligence.any.run\/feeds\/?utm_source=anyrunblog&#038;utm_medium=article&#038;utm_campaign=automated_interactivity_stage_two&#038;utm_term=141124&#038;utm_content=linktofeeds\/\" rel=\"noopener\" target=\"_blank\">\nIntegrate now\n<\/a>\n<\/div>\n<!-- Regular Banner END -->\n<!-- Regular Banner Styles START -->\n\n<style>\n.regular-banner {\ndisplay: flex;\ntext-align: center;\nflex-direction: column;\nalign-items: center;\ngap: 1.5rem;\nwidth: 100%;\npadding: 2rem;\nmargin: 1.5rem 0;\nborder-radius: 0.5rem;\nfont-family: 'Catamaran Bold';\nmargin-inline: auto;\nbackground: rgba(32, 168, 241, 0.1);\nborder: 1px solid rgba(75, 174, 227, 0.32);\n}\n\n.regular-banner__text {\nfont-size: 1.5rem;\nmargin: 0;\n}\n\n.highlight {\ncolor: #ea2526;\n}\n\n.regular-banner__link {\npadding: 0.5rem 1.5rem;\nfont-weight: 500;\ntext-decoration: none;\nborder-radius: 0.5rem;\ncolor: #FFFFFF;\nbackground-color: #1491D4;\ntext-align: center;\ntransition: all 0.2s ease-in;\n}\n\n.regular-banner__link:hover {\nbackground-color: #68CBFF;\ncolor: white;\n}\n<\/style>\n<!-- Regular Banner Styles END -->\n\n\n\n<h2 class=\"wp-block-heading\">Safebrowsing&nbsp;<\/h2>\n\n\n\n<p>In 2024, we brought you&nbsp;<a href=\"https:\/\/any.run\/cybersecurity-blog\/safebrowsing\/\" target=\"_blank\" rel=\"noreferrer noopener\">Safebrowsing<\/a>, a new tool designed for faster and simpler threat analysis.&nbsp;<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"576\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2024\/09\/interface_sb-1024x576.png\" alt=\"\" class=\"wp-image-8892\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/09\/interface_sb-1024x576.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/09\/interface_sb-300x169.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/09\/interface_sb-768x432.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/09\/interface_sb-1536x864.png 1536w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/09\/interface_sb-370x208.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/09\/interface_sb-270x152.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/09\/interface_sb-740x416.png 740w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/09\/interface_sb.png 1920w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\"><em>You are free to interact with websites just like in a standard browser<\/em><\/figcaption><\/figure><\/div>\n\n\n<p>With Safebrowsing, you can safely analyze suspicious URLs in a fully interactive, isolated browser environment. It\u2019s a quick and secure way to explore websites, verify malicious content, and protect your local system from risk.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Browser Extension&nbsp;<\/h2>\n\n\n\n<p>We made malware analysis even easier with the launch of the&nbsp;<a href=\"https:\/\/chromewebstore.google.com\/detail\/anyrun-sandbox\/lgklkhgljfifnnpgkblckolmaafmkikk\" target=\"_blank\" rel=\"noreferrer noopener\">ANY.RUN Browser Extension<\/a>&nbsp;for Chromium-based browsers.&nbsp;<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"900\" height=\"662\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2024\/12\/updated-extension-img-2.png\" alt=\"\" class=\"wp-image-10708\" style=\"width:650px;height:auto\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/12\/updated-extension-img-2.png 900w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/12\/updated-extension-img-2-300x221.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/12\/updated-extension-img-2-768x565.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/12\/updated-extension-img-2-370x272.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/12\/updated-extension-img-2-270x199.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/12\/updated-extension-img-2-740x544.png 740w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/12\/updated-extension-img-2-80x60.png 80w\" sizes=\"(max-width: 900px) 100vw, 900px\" \/><figcaption class=\"wp-element-caption\"><em>ANY.RUN&#8217;s browser extension can be used for streamlining threat analysis<\/em><\/figcaption><\/figure><\/div>\n\n\n<p>With this extension, you can start analysis sessions directly from your browser and view results instantly, either in the extension or in the sandbox for deeper investigation. It\u2019s fast, simple, and designed to save you valuable time.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Integrations&nbsp;<\/h2>\n\n\n\n<p>At ANY.RUN, we know how important integrations are for streamlining your threat analysis workflows. &nbsp;<\/p>\n\n\n\n<p>That\u2019s why in 2024 we focused on expanding our connectivity with industry-leading platforms to make your investigations faster and more efficient.&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Integration with OpenCTI&nbsp;<\/h3>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"556\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2024\/03\/1-2-1024x556.png\" alt=\"\" class=\"wp-image-7238\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/03\/1-2-1024x556.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/03\/1-2-300x163.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/03\/1-2-768x417.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/03\/1-2-1536x834.png 1536w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/03\/1-2-2048x1112.png 2048w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/03\/1-2-370x201.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/03\/1-2-270x147.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/03\/1-2-740x402.png 740w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\">OpenCTI interface&nbsp;<\/figcaption><\/figure><\/div>\n\n\n<p>We <a href=\"https:\/\/any.run\/cybersecurity-blog\/opencti-integration\/\" target=\"_blank\" rel=\"noreferrer noopener\">integrated with&nbsp;<strong>OpenCTI<\/strong><\/a>, allowing users to enrich their threat intelligence with data from ANY.RUN. Malware labels, malicious scores, TTPs, file hashes, and IP addresses are now transferred into OpenCTI, eliminating manual work and centralizing your analysis.&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Integration with Splunk&nbsp;<\/h3>\n\n\n\n<p>We also launched an <a href=\"https:\/\/any.run\/cybersecurity-blog\/splunk-integration\/\" target=\"_blank\" rel=\"noreferrer noopener\">integration with&nbsp;<strong>Splunk<\/strong><\/a>, bringing our Interactive Sandbox and Threat Intelligence Lookup directly into the Splunk SOAR environment.&nbsp;<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"793\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2024\/09\/image7-1024x793.png\" alt=\"\" class=\"wp-image-8819\" style=\"width:640px;height:496px\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/09\/image7-1024x793.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/09\/image7-300x232.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/09\/image7-768x595.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/09\/image7-1536x1189.png 1536w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/09\/image7-370x287.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/09\/image7-270x209.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/09\/image7-740x573.png 740w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/09\/image7.png 1844w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\"><em>Official page of ANY.RUN\u2019s connector for Splunk<\/em><\/figcaption><\/figure><\/div>\n\n\n<p>It lets you analyze malicious files and URLs, and enrich your investigations with comprehensive threat intelligence, all without leaving your familiar Splunk environment.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Cyber Threat Research from ANY.RUN Team<\/h2>\n\n\n\n<p>In 2024, ANY.RUN&#8217;s team of malware analysts continued to <a href=\"https:\/\/any.run\/cybersecurity-blog\/category\/malware-analysis\/\" target=\"_blank\" rel=\"noreferrer noopener\">share their research<\/a> on new and emerging threats, helping the cybersecurity community stay informed. Take a look at some of the article published by our team throughout the year:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/any.run\/cybersecurity-blog\/corrupted-files-attack\/\" target=\"_blank\" rel=\"noreferrer noopener\">Zero-day Attack Uses Corrupted Files to Bypass Detection: Technical Analysis<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/any.run\/cybersecurity-blog\/psloramyra-malware-technical-analysis\/\">PSLoramyra: Technical Analysis of Fileless Malware Loade<\/a><a href=\"https:\/\/any.run\/cybersecurity-blog\/psloramyra-malware-technical-analysis\/\" target=\"_blank\" rel=\"noreferrer noopener\">r<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/any.run\/cybersecurity-blog\/phantomloader-and-ssload-analysis\/\" target=\"_blank\" rel=\"noreferrer noopener\">New PhantomLoader Malware Distributes SSLoad: Technical Analysis<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/any.run\/cybersecurity-blog\/deerstealer-campaign-analysis\/\" target=\"_blank\" rel=\"noreferrer noopener\">Brief Overview of the DeerStealer Distribution Campaign<\/a><\/li>\n<\/ul>\n\n\n\n<p>Make sure to subscribe to us <a href=\"https:\/\/x.com\/anyrun_app\" target=\"_blank\" rel=\"noreferrer noopener\">on X<\/a> and other social media to get quick rundowns on active malware and phishing campaigns.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">ANY.RUN\u2019s Top Awards in 2024&nbsp;<\/h2>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"341\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2024\/12\/image12-2-1024x341.png\" alt=\"\" class=\"wp-image-10727\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/12\/image12-2-1024x341.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/12\/image12-2-300x100.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/12\/image12-2-768x256.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/12\/image12-2-370x123.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/12\/image12-2-270x90.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/12\/image12-2-740x247.png 740w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/12\/image12-2.png 1320w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\"><em>Awards won by ANY.RUN in 2024<\/em><\/figcaption><\/figure><\/div>\n\n\n<p>In 2024, ANY.RUN\u2019s commitment to innovation and excellence in cybersecurity was recognized with <a href=\"https:\/\/any.run\/cybersecurity-blog\/cybersecurity-awards-2024\/\" target=\"_blank\" rel=\"noreferrer noopener\">prestigious industry awards<\/a>. They reflect the hard work of our team and the impact of our tools on the global cybersecurity community:&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Cybersecurity excellence awards<\/strong>&#8211; Winner in the&nbsp;Threat Hunting&nbsp;category, highlighting our impact and commitment to excellence.&nbsp;<\/li>\n\n\n\n<li><strong>Best security solution<\/strong>&#8211; Our platform was named the&nbsp;Best Threat Intelligence &amp; Interactive Malware Analysis Platform, praised for its innovation and user-friendly design.&nbsp;<\/li>\n\n\n\n<li><strong>Top 150 cybersecurity vendors<\/strong>&#8211; ANY.RUN earned a spot on IT-Harvest\u2019s&nbsp;Top 150 Vendors, a global benchmark in the cybersecurity field.&nbsp;<\/li>\n\n\n\n<li><strong>Best in behavior analytics<\/strong>&#8211; The&nbsp;CyberSecurity Breakthrough Awards&nbsp;recognized our behavior analytics and the advanced&nbsp;Automated Interactivity&nbsp;feature.&nbsp;<\/li>\n<\/ul>\n\n\n\n<p>We\u2019re proud of these achievements and look forward to raising the bar even higher in 2025!&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Stronger Together: Collaboration with the ANY.RUN Community&nbsp;<\/h2>\n\n\n\n<p>We were closer than ever with the incredible&nbsp;ANY.RUN community. Together, we uncovered new threats, presented cutting-edge technical analyses, and pushed the boundaries of what\u2019s possible in malware research.&nbsp;<\/p>\n\n\n\n<p>Your active engagement has been at the heart of our success. We can\u2019t thank you enough for your support and collaboration throughout the year.&nbsp;<\/p>\n\n\n\n<p>As we look ahead to 2025, we\u2019re excited to bring even more opportunities for mutual collaboration. &nbsp;<\/p>\n\n\n\n<p>Let\u2019s continue to grow, learn, and tackle cyber threats together!&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">More to Come in 2025&nbsp;<\/h2>\n\n\n\n<p>As we celebrate these milestones, we\u2019re already looking ahead to 2025. With exciting projects on the horizon, new features in development, and your continued support, we\u2019re confident that the best is yet to come.&nbsp;<\/p>\n\n\n\n<p>To every researcher, analyst, and team who trusted ANY.RUN this year: thank you. You are the reason we do what we do. Here\u2019s to another year of fighting cybercrime.&nbsp;<\/p>\n\n\n\n<p>Happy New Year,&nbsp;<br>The ANY.RUN Team<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">About ANY.RUN&nbsp;&nbsp;<\/h2>\n\n\n\n<p>ANY.RUN helps more than 500,000 cybersecurity professionals worldwide. Our&nbsp;<a href=\"https:\/\/any.run\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=psloramyra&amp;utm_term=271124&amp;utm_content=linktolanding\" target=\"_blank\" rel=\"noreferrer noopener\">intera<\/a><a href=\"https:\/\/any.run\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=dfir_use_cases&amp;utm_term=181224&amp;utm_content=linktolanding\" target=\"_blank\" rel=\"noreferrer noopener\">c<\/a><a href=\"https:\/\/any.run\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=annual-report-2024&amp;utm_term=080125&amp;utm_content=linktolanding\" target=\"_blank\" rel=\"noreferrer noopener\">tive sandbox<\/a>&nbsp;simplifies malware analysis of threats that target both Windows and&nbsp;<a href=\"https:\/\/any.run\/cybersecurity-blog\/linux-malware-analysis-cases\/\" target=\"_blank\" rel=\"noreferrer noopener\">Linux<\/a>&nbsp;systems. Our threat intelligence products,&nbsp;<a href=\"https:\/\/any.run\/cybersecurity-blog\/introducing-any-run-threat-intelligence-lookup\/\" target=\"_blank\" rel=\"noreferrer noopener\">TI Lookup<\/a>,&nbsp;<a href=\"https:\/\/any.run\/cybersecurity-blog\/yara-search\/\" target=\"_blank\" rel=\"noreferrer noopener\">YARA Search<\/a>&nbsp;and&nbsp;<a href=\"https:\/\/any.run\/cybersecurity-blog\/ti-feeds-integration\/\" target=\"_blank\" rel=\"noreferrer noopener\">Feeds<\/a>, help you find&nbsp;<a href=\"https:\/\/any.run\/cybersecurity-blog\/indicators-of-compromise\/\" target=\"_blank\" rel=\"noreferrer noopener\">IOCs<\/a>&nbsp;or files to learn more about the threats and respond to incidents faster.&nbsp;&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>As we wrap up 2024, let\u2019s take a moment to reflect on what an incredible year it\u2019s been for ANY.RUN. Together, we\u2019ve achieved so much: breaking barriers, improving tools, and working side by side with you, our amazing community of cybersecurity heroes.&nbsp; From big product launches to small tweaks that make a huge difference, everything [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":10779,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[60],"tags":[],"class_list":["post-10691","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v20.10 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>2024: A Year of Growth, Innovation, and Community at ANY.RUN\u00a0<\/title>\n<meta name=\"description\" content=\"Explore the annual report from ANY.RUN to see all the products, features, and updates released throughout 2024.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/any.run\/cybersecurity-blog\/annual-report-2024\/\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"ANY.RUN\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"14 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/annual-report-2024\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/annual-report-2024\/\"},\"author\":{\"name\":\"ANY.RUN\",\"@id\":\"https:\/\/any.run\/\"},\"headline\":\"2024 Wrapped: A Year of Growth, Innovation, and Community at ANY.RUN\u00a0\",\"datePublished\":\"2025-01-08T07:48:48+00:00\",\"dateModified\":\"2025-11-13T08:49:10+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/annual-report-2024\/\"},\"wordCount\":2384,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/any.run\/\"},\"articleSection\":[\"News\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/any.run\/cybersecurity-blog\/annual-report-2024\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/annual-report-2024\/\",\"url\":\"https:\/\/any.run\/cybersecurity-blog\/annual-report-2024\/\",\"name\":\"2024: A Year of Growth, Innovation, and Community at ANY.RUN\u00a0\",\"isPartOf\":{\"@id\":\"https:\/\/any.run\/\"},\"datePublished\":\"2025-01-08T07:48:48+00:00\",\"dateModified\":\"2025-11-13T08:49:10+00:00\",\"description\":\"Explore the annual report from ANY.RUN to see all the products, features, and updates released throughout 2024.\",\"breadcrumb\":{\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/annual-report-2024\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/any.run\/cybersecurity-blog\/annual-report-2024\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/annual-report-2024\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/any.run\/cybersecurity-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"News\",\"item\":\"https:\/\/any.run\/cybersecurity-blog\/category\/news\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"2024 Wrapped: A Year of Growth, Innovation, and Community at ANY.RUN\u00a0\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/any.run\/\",\"url\":\"https:\/\/any.run\/\",\"name\":\"ANY.RUN&#039;s Cybersecurity Blog\",\"description\":\"Cybersecurity Blog covers topics for experienced professionals as well as for those new to it.\",\"publisher\":{\"@id\":\"https:\/\/any.run\/\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/any.run\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/any.run\/\",\"name\":\"ANY.RUN\",\"url\":\"https:\/\/any.run\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/any.run\/\",\"url\":\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg\",\"contentUrl\":\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg\",\"width\":1,\"height\":1,\"caption\":\"ANY.RUN\"},\"image\":{\"@id\":\"https:\/\/any.run\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/www.any.run\/\",\"https:\/\/twitter.com\/anyrun_app\",\"https:\/\/www.linkedin.com\/company\/30692044\",\"https:\/\/www.youtube.com\/channel\/UCOgCPho7lzmH7m6fPNlukrQ\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/any.run\/\",\"name\":\"ANY.RUN\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/any.run\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/c4ce3a6c672056b4a8cd6b0110782215?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/c4ce3a6c672056b4a8cd6b0110782215?s=96&d=mm&r=g\",\"caption\":\"ANY.RUN\"},\"url\":\"https:\/\/any.run\/cybersecurity-blog\/author\/a-bespalova\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"2024: A Year of Growth, Innovation, and Community at ANY.RUN\u00a0","description":"Explore the annual report from ANY.RUN to see all the products, features, and updates released throughout 2024.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/any.run\/cybersecurity-blog\/annual-report-2024\/","twitter_misc":{"Written by":"ANY.RUN","Est. reading time":"14 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/any.run\/cybersecurity-blog\/annual-report-2024\/#article","isPartOf":{"@id":"https:\/\/any.run\/cybersecurity-blog\/annual-report-2024\/"},"author":{"name":"ANY.RUN","@id":"https:\/\/any.run\/"},"headline":"2024 Wrapped: A Year of Growth, Innovation, and Community at ANY.RUN\u00a0","datePublished":"2025-01-08T07:48:48+00:00","dateModified":"2025-11-13T08:49:10+00:00","mainEntityOfPage":{"@id":"https:\/\/any.run\/cybersecurity-blog\/annual-report-2024\/"},"wordCount":2384,"commentCount":0,"publisher":{"@id":"https:\/\/any.run\/"},"articleSection":["News"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/any.run\/cybersecurity-blog\/annual-report-2024\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/any.run\/cybersecurity-blog\/annual-report-2024\/","url":"https:\/\/any.run\/cybersecurity-blog\/annual-report-2024\/","name":"2024: A Year of Growth, Innovation, and Community at ANY.RUN\u00a0","isPartOf":{"@id":"https:\/\/any.run\/"},"datePublished":"2025-01-08T07:48:48+00:00","dateModified":"2025-11-13T08:49:10+00:00","description":"Explore the annual report from ANY.RUN to see all the products, features, and updates released throughout 2024.","breadcrumb":{"@id":"https:\/\/any.run\/cybersecurity-blog\/annual-report-2024\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/any.run\/cybersecurity-blog\/annual-report-2024\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/any.run\/cybersecurity-blog\/annual-report-2024\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/any.run\/cybersecurity-blog\/"},{"@type":"ListItem","position":2,"name":"News","item":"https:\/\/any.run\/cybersecurity-blog\/category\/news\/"},{"@type":"ListItem","position":3,"name":"2024 Wrapped: A Year of Growth, Innovation, and Community at ANY.RUN\u00a0"}]},{"@type":"WebSite","@id":"https:\/\/any.run\/","url":"https:\/\/any.run\/","name":"ANY.RUN&#039;s Cybersecurity Blog","description":"Cybersecurity Blog covers topics for experienced professionals as well as for those new to it.","publisher":{"@id":"https:\/\/any.run\/"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/any.run\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/any.run\/","name":"ANY.RUN","url":"https:\/\/any.run\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/any.run\/","url":"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg","contentUrl":"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg","width":1,"height":1,"caption":"ANY.RUN"},"image":{"@id":"https:\/\/any.run\/"},"sameAs":["https:\/\/www.facebook.com\/www.any.run\/","https:\/\/twitter.com\/anyrun_app","https:\/\/www.linkedin.com\/company\/30692044","https:\/\/www.youtube.com\/channel\/UCOgCPho7lzmH7m6fPNlukrQ"]},{"@type":"Person","@id":"https:\/\/any.run\/","name":"ANY.RUN","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/any.run\/","url":"https:\/\/secure.gravatar.com\/avatar\/c4ce3a6c672056b4a8cd6b0110782215?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/c4ce3a6c672056b4a8cd6b0110782215?s=96&d=mm&r=g","caption":"ANY.RUN"},"url":"https:\/\/any.run\/cybersecurity-blog\/author\/a-bespalova\/"}]}},"_links":{"self":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts\/10691"}],"collection":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/comments?post=10691"}],"version-history":[{"count":76,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts\/10691\/revisions"}],"predecessor-version":[{"id":16760,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts\/10691\/revisions\/16760"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/media\/10779"}],"wp:attachment":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/media?parent=10691"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/categories?post=10691"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/tags?post=10691"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}