{"id":11458,"date":"2025-02-06T11:51:03","date_gmt":"2025-02-06T11:51:03","guid":{"rendered":"\/cybersecurity-blog\/?p=11458"},"modified":"2025-03-03T06:31:43","modified_gmt":"2025-03-03T06:31:43","slug":"safebrowsing-extension","status":"publish","type":"post","link":"https:\/\/any.run\/cybersecurity-blog\/safebrowsing-extension\/","title":{"rendered":"Instant URL Analysis: Use Safebrowsing via ANY.RUN\u2019s Extension"},"content":{"rendered":"\n<p>Phishing attempts, malicious redirects, and hidden malware can lurk in seemingly harmless links, putting your company\u2019s data and systems at risk. To streamline threat detection and response,&nbsp;ANY.RUN has upgraded its browser extension, making the&nbsp;Safebrowsing feature free&nbsp;for all users.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">How Safebrowsing Works in ANY.RUN\u2019s Extension&nbsp;<\/h2>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"640\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2025\/02\/image-1024x640.png\" alt=\"\" class=\"wp-image-11466\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/02\/image-1024x640.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/02\/image-300x188.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/02\/image-768x480.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/02\/image-370x231.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/02\/image-270x169.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/02\/image-740x463.png 740w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/02\/image.png 1280w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\"><em>The Welcome screen of ANY.RUN\u2019s browser extension<\/em>&nbsp;<\/figcaption><\/figure><\/div>\n\n\n<p>Safebrowsing from ANY.RUN provides a fully functional browser, allowing users to interact with potential threats safely. This is especially useful for investigating&nbsp;multi-stage phishing attacks and CAPTCHA-based fraud. &nbsp;<\/p>\n\n\n\n<p>Now, security teams can quickly analyze&nbsp;suspicious URLs&nbsp;without extra steps and launch analysis in <a href=\"https:\/\/app.any.run\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=safebrowsing_extension&amp;utm_term=060225&amp;utm_content=linktoregistration#register\/\" target=\"_blank\" rel=\"noreferrer noopener\">ANY.RUN\u2019s Safebrowsing<\/a> instantly. This eliminates the hassle of copying and pasting links into the platform manually, making security investigations faster and more efficient!&nbsp;<\/p>\n\n\n\n<p>Most importantly, it\u2019s completely free!&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">How to Use Safebrowsing for Free&nbsp;<\/h2>\n\n\n\n<p>ANY.RUN\u2019s Safebrowsing feature is now available for all users at no cost\u2014all you need is a <a href=\"https:\/\/app.any.run\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=safebrowsing_extension&amp;utm_term=060225&amp;utm_content=linktoregistration#register\/\" target=\"_blank\" rel=\"noreferrer noopener\">registered account<\/a> to start analyzing suspicious links instantly.&nbsp;<\/p>\n\n\n\n<ol start=\"1\" class=\"wp-block-list\">\n<li><a href=\"https:\/\/chromewebstore.google.com\/detail\/anyrun-sandbox\/lgklkhgljfifnnpgkblckolmaafmkikk\" target=\"_blank\" rel=\"noreferrer noopener\">Install the ANY.RUN browser extension<\/a>&nbsp;<\/li>\n<\/ol>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"640\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2025\/02\/image2-1-1024x640.png\" alt=\"\" class=\"wp-image-11468\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/02\/image2-1-1024x640.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/02\/image2-1-300x188.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/02\/image2-1-768x480.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/02\/image2-1-370x231.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/02\/image2-1-270x169.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/02\/image2-1-740x463.png 740w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/02\/image2-1.png 1280w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\"><em>Safebrowsing extension inside the right-click menu<\/em>&nbsp;<\/figcaption><\/figure><\/div>\n\n\n<ol start=\"2\" class=\"wp-block-list\">\n<li>Right-click on any suspicious link&nbsp;<\/li>\n<\/ol>\n\n\n\n<ol start=\"3\" class=\"wp-block-list\">\n<li>Select &#8220;Safebrowsing&#8221; to launch an instant analysis&nbsp;<\/li>\n<\/ol>\n\n\n\n<h2 class=\"wp-block-heading\">How Safebrowsing Helps Agasinst Cyber Attacks&nbsp;<\/h2>\n\n\n\n<p>With the updated extension, businesses can take advantage of Safebrowsing\u2019s capabilities to:&nbsp;<\/p>\n\n\n\n<p><strong>Check suspicious links with a single click: <\/strong>No need to manually copy and paste URLs into the sandbox. Simply use the&nbsp;Safebrowsing option from your browser\u2019s right-click menu, and the link will open in an isolated environment.&nbsp;<\/p>\n\n\n\n<p><strong>Speed up threat analysis: <\/strong>The extension&nbsp;streamlines the process, allowing security teams to quickly assess a link\u2019s behavior in a full-size&nbsp;virtual browser&nbsp;without interacting with the page on their own system.&nbsp;<\/p>\n\n\n\n<p><strong>Ensure safe link browsing for employees: <\/strong>By testing unknown URLs in an isolated virtual browser before opening them on company devices, businesses can&nbsp;prevent malware infections, credential theft, and phishing attacks.&nbsp;<\/p>\n\n\n\n<!-- Regular Banner START -->\n<div class=\"regular-banner\">\n<!-- Text Content -->\n<p class=\"regular-banner__text\">\nEquip your security team with instant URL analysis\u00a0<br>Install<span class=\"highlight\"> ANY.RUN&#8217;s browser extension<\/span>&nbsp;   \n<\/p>\n<!-- CTA Link -->\n<a class=\"regular-banner__link\" id=\"article-banner-regular\" href=\"https:\/\/chromewebstore.google.com\/detail\/anyrun-sandbox\/lgklkhgljfifnnpgkblckolmaafmkikk\" rel=\"noopener\" target=\"_blank\">\nTry it now\n<\/a>\n<\/div>\n<!-- Regular Banner END -->\n<!-- Regular Banner Styles START -->\n\n<style>\n.regular-banner {\ndisplay: flex;\ntext-align: center;\nflex-direction: column;\nalign-items: center;\ngap: 1.5rem;\nwidth: 100%;\npadding: 2rem;\nmargin: 1.5rem 0;\nborder-radius: 0.5rem;\nfont-family: 'Catamaran Bold';\nmargin-inline: auto;\nbackground: rgba(32, 168, 241, 0.1);\nborder: 1px solid rgba(75, 174, 227, 0.32);\n}\n\n.regular-banner__text {\nfont-size: 1.5rem;\nmargin: 0;\n}\n\n.highlight {\ncolor: #ea2526;\n}\n\n.regular-banner__link {\npadding: 0.5rem 1.5rem;\nfont-weight: 500;\ntext-decoration: none;\nborder-radius: 0.5rem;\ncolor: #FFFFFF;\nbackground-color: #1491D4;\ntext-align: center;\ntransition: all 0.2s ease-in;\n}\n\n.regular-banner__link:hover {\nbackground-color: #68CBFF;\ncolor: white;\n}\n<\/style>\n<!-- Regular Banner Styles END -->\n\n\n\n<p>Don&#8217;t have an ANY.RUN account yet? <a href=\"https:\/\/app.any.run\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=safebrowsing_extension&amp;utm_term=060225&amp;utm_content=linktoregistration#register\/\" target=\"_blank\" rel=\"noreferrer noopener\">Sign up now<\/a>.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Use Cases for Safebrowsing&nbsp;<\/h2>\n\n\n\n<p>With Safebrowsing, security analysts can&nbsp;interact with the entire attack chain, observe network activity, and uncover hidden threats in a controlled environment.&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Multi-Stage Phishing Analysis&nbsp;<\/h3>\n\n\n\n<p>In the following&nbsp;Safebrowsing example, we analyze a&nbsp;phishing attempt disguised as a TransferNow link \u2014 a free file transfer service that allows sending large documents up to 250GB.&nbsp;<\/p>\n\n\n\n<p><a href=\"https:\/\/app.any.run\/browses\/4b98f749-6eb6-4994-85ab-84492309bf27\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=safebrowsing_extension&amp;utm_term=060225&amp;utm_content=linktoservice\" target=\"_blank\" rel=\"noreferrer noopener\">View Safebrowsing analysis session<\/a>&nbsp;<\/p>\n\n\n\n<p>Right-clicking on the suspicious link instantly opens it in ANY.RUN&#8217;s&nbsp;isolated browser, eliminating the need to copy and paste URLs manually.&nbsp;<\/p>\n\n\n\n<p>The link leads to a&nbsp;fake TransferNow page, appearing to offer a free document download. After clicking the download file button, a&nbsp;PDF file opens instead.&nbsp;<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"573\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2025\/02\/image3-1-1024x573.png\" alt=\"\" class=\"wp-image-11482\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/02\/image3-1-1024x573.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/02\/image3-1-300x168.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/02\/image3-1-768x430.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/02\/image3-1-1536x860.png 1536w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/02\/image3-1-2048x1146.png 2048w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/02\/image3-1-370x207.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/02\/image3-1-270x151.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/02\/image3-1-740x414.png 740w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\"><em>Transfernow page with malicious file<\/em>&nbsp;<\/figcaption><\/figure><\/div>\n\n\n<p>The PDF mimics a&nbsp;SharePoint document, prompting the user to download yet another file. This staged approach is&nbsp;a common tactic in phishing schemes, forcing users into a series of seemingly harmless steps to lower suspicion.&nbsp;<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"574\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2025\/02\/image4-1024x574.png\" alt=\"\" class=\"wp-image-11470\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/02\/image4-1024x574.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/02\/image4-300x168.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/02\/image4-768x430.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/02\/image4-1536x861.png 1536w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/02\/image4-2048x1148.png 2048w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/02\/image4-370x207.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/02\/image4-270x151.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/02\/image4-740x415.png 740w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\"><em>Malicious document displayed inside Safebrowsing<\/em>&nbsp;<\/figcaption><\/figure><\/div>\n\n\n<p>Once the second file is downloaded, a&nbsp;Microsoft sign-in page appears. However, after closer inspection, we see that the URL&nbsp;has no connection to Microsoft. This is a clear indicator of a fraudulent attempt to steal login credentials.&nbsp;<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"569\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2025\/02\/image5-1024x569.png\" alt=\"\" class=\"wp-image-11471\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/02\/image5-1024x569.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/02\/image5-300x167.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/02\/image5-768x427.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/02\/image5-1536x854.png 1536w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/02\/image5-2048x1138.png 2048w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/02\/image5-370x206.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/02\/image5-270x150.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/02\/image5-740x411.png 740w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\"><em>Fake Microsoft login page<\/em>&nbsp;<\/figcaption><\/figure><\/div>\n\n\n<p>Additional red flags include a&nbsp;<strong>broken favicon<\/strong>, which often signals a hastily put-together phishing page lacking proper hosting configurations.&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">CAPTCHA-Based Fraud Investigation&nbsp;<\/h3>\n\n\n\n<p>Cybercriminals use CAPTCHA barriers to block automated scanners while still targeting real users. Safebrowsing lets you&nbsp;bypass these obstacles with automated interactivity and analyze what\u2019s behind the CAPTCHA wall.&nbsp;<\/p>\n\n\n\n<p><a href=\"https:\/\/app.any.run\/browses\/ee851e7d-caab-49e4-9267-2cead8654c31\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=safebrowsing_extension&amp;utm_term=060225&amp;utm_content=linktoservice\" target=\"_blank\" rel=\"noreferrer noopener\">View attack analysis inside Safebrowsing<\/a>&nbsp;<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"573\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2025\/02\/image6-1024x573.png\" alt=\"\" class=\"wp-image-11483\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/02\/image6-1024x573.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/02\/image6-300x168.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/02\/image6-768x430.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/02\/image6-1536x859.png 1536w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/02\/image6-2048x1146.png 2048w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/02\/image6-370x207.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/02\/image6-270x151.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/02\/image6-740x414.png 740w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\"><em>Suspicious link opening inside ANY.RUN\u2019s Safebrowsing<\/em>&nbsp;<\/figcaption><\/figure><\/div>\n\n\n<p>For this example, a suspicious link is right-clicked, and the&nbsp;&#8220;Safebrowsing&#8221;&nbsp;option is selected. The link&nbsp;automatically opens inside the Safebrowsing service, saving time and streamlining the investigation.&nbsp;<\/p>\n\n\n\n<p>The link initially loads a&nbsp;Cloudflare &#8220;Verify You&#8217;re Human&#8221; CAPTCHA page, a tactic often used to evade automated scanning tools.&nbsp;<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"559\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2025\/02\/image7-1024x559.png\" alt=\"\" class=\"wp-image-11473\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/02\/image7-1024x559.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/02\/image7-300x164.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/02\/image7-768x419.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/02\/image7-1536x838.png 1536w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/02\/image7-2048x1117.png 2048w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/02\/image7-370x202.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/02\/image7-270x147.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/02\/image7-740x404.png 740w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\"><em>Cloudflare verification required to proceed<\/em>&nbsp;<\/figcaption><\/figure><\/div>\n\n\n<p>After passing the CAPTCHA, the page&nbsp;redirects to what appears to be a Google login page. However, upon closer inspection, the&nbsp;URL is fake, having no connection to Google.&nbsp;<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"556\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2025\/02\/image8-1024x556.png\" alt=\"\" class=\"wp-image-11475\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/02\/image8-1024x556.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/02\/image8-300x163.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/02\/image8-768x417.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/02\/image8-1536x834.png 1536w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/02\/image8-2048x1113.png 2048w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/02\/image8-370x201.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/02\/image8-270x147.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/02\/image8-740x402.png 740w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\"><em>Fake Google login page inside Safebrowsing<\/em>&nbsp;<\/figcaption><\/figure><\/div>\n\n\n<p>Another major red flag is the&nbsp;broken Google favicon, a common sign of a poorly cloned phishing site. Legitimate websites rarely have favicon issues, making this a simple yet effective phishing indicator.&nbsp;<\/p>\n\n\n\n<p>The&nbsp;Network Inspector, located in Safebrowsing\u2019s upper-right corner of the screen, provides a detailed view of network connections, HTTP requests, and potential threats triggered by&nbsp;Suricata rules. &nbsp;<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"494\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2025\/02\/image9-1-1024x494.png\" alt=\"\" class=\"wp-image-11478\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/02\/image9-1-1024x494.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/02\/image9-1-300x145.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/02\/image9-1-768x370.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/02\/image9-1-1536x741.png 1536w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/02\/image9-1-2048x988.png 2048w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/02\/image9-1-370x178.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/02\/image9-1-270x130.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/02\/image9-1-740x357.png 740w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\"><em>Network Inspector inside Safebrowsing<\/em>&nbsp;<\/figcaption><\/figure><\/div>\n\n\n<p>This feature allows analysts to&nbsp;monitor outgoing and incoming traffic, inspect request headers and payloads, and identify malicious activity in real time. &nbsp;<\/p>\n\n\n\n<p>By using Suricata-based detection, security teams can&nbsp;quickly spot anomalies, detect exploit attempts, and track threat actor infrastructure, making network analysis faster and more effective.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"583\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2025\/02\/imagea-1024x583.png\" alt=\"\" class=\"wp-image-11479\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/02\/imagea-1024x583.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/02\/imagea-300x171.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/02\/imagea-768x437.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/02\/imagea-1536x875.png 1536w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/02\/imagea-370x211.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/02\/imagea-270x154.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/02\/imagea-740x421.png 740w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/02\/imagea.png 1542w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\"><em>Phishing domain triggered by Suricata rule<\/em>&nbsp;<\/figcaption><\/figure><\/div>\n\n\n<p>These cases demonstrate how Safebrowsing allows businesses to&nbsp;quickly expose phishing schemes, track multiple attack stages, and analyze network behavior, all without putting corporate infrastructure at risk.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Sandbox Analysis with the Extension&nbsp;<\/h2>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"640\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2025\/02\/Screen-3-1024x640.png\" alt=\"\" class=\"wp-image-11496\" style=\"width:650px;height:auto\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/02\/Screen-3-1024x640.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/02\/Screen-3-300x188.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/02\/Screen-3-768x480.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/02\/Screen-3-370x231.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/02\/Screen-3-270x169.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/02\/Screen-3-740x463.png 740w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/02\/Screen-3.png 1280w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\"><em>Full version of ANY.RUN&#8217;s browser extension lets you launch sandbox analysis sessions<\/em><\/figcaption><\/figure><\/div>\n\n\n<p>For businesses and security teams, the full version of the extension offers even more powerful capabilities. Beyond Safebrowsing, users can launch analysis sessions inside ANY.RUN&#8217;s <a href=\"https:\/\/any.run\/cybersecurity-blog\/interactive-malware-sandbox\/\" target=\"_blank\" rel=\"noreferrer noopener\">Interactive Sandbox<\/a> to access:&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>File and Link Analysis:<\/strong> Analyze files and links on fully interactive Windows (7-11 version) cloud virtual machines (VMs).&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Comprehensive Threat Reports:<\/strong> Generate detailed threat reports in JSON, MISP, and HTML formats, including IOCs and malware configurations.&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Malicious Behavior Monitoring:<\/strong> Observe samples&#8217; malicious behavior and study tactics, techniques, and procedures (TTPs) using the MITRE ATT&amp;CK Matrix.&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Customizable Settings: <\/strong>Adjust settings for system reboot, locale selection, and network features like MITM proxy and FakeNET.&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Extended Analysis: <\/strong>Run VMs for up to 1200 seconds for in-depth analysis.&nbsp;<\/li>\n<\/ul>\n\n\n\n<p>To utilize the sandbox functionality via the extension, you will need an active <a href=\"https:\/\/any.run\/cybersecurity-blog\/subscriptions-hunter-plan\/\" target=\"_blank\" rel=\"noreferrer noopener\">Hunter<\/a> or <a href=\"https:\/\/any.run\/cybersecurity-blog\/anyrun-for-enterprises\/\" target=\"_blank\" rel=\"noreferrer noopener\">Enterprise<\/a> subscription. Each analysis session launched through the extension counts towards your API quota.&nbsp;<\/p>\n\n\n\n<!-- Regular Banner START -->\n<div class=\"regular-banner\">\n<!-- Text Content -->\n<p class=\"regular-banner__text\">\nAccess all features of ANY.RUN&#8217;s <span class=\"highlight\">Interactive Sandbox<\/span>&nbsp;   \n<\/p>\n<!-- CTA Link -->\n<a class=\"regular-banner__link\" id=\"article-banner-regular\" href=\"https:\/\/any.run\/demo\/?utm_source=anyrunblog&#038;utm_medium=article&#038;utm_campaign=safebrowsing_extension&#038;utm_term=060225&#038;utm_content=linktodemo\" rel=\"noopener\" target=\"_blank\">\nGet 14-day free trial\n<\/a>\n<\/div>\n<!-- Regular Banner END -->\n<!-- Regular Banner Styles START -->\n\n<style>\n.regular-banner {\ndisplay: flex;\ntext-align: center;\nflex-direction: column;\nalign-items: center;\ngap: 1.5rem;\nwidth: 100%;\npadding: 2rem;\nmargin: 1.5rem 0;\nborder-radius: 0.5rem;\nfont-family: 'Catamaran Bold';\nmargin-inline: auto;\nbackground: rgba(32, 168, 241, 0.1);\nborder: 1px solid rgba(75, 174, 227, 0.32);\n}\n\n.regular-banner__text {\nfont-size: 1.5rem;\nmargin: 0;\n}\n\n.highlight {\ncolor: #ea2526;\n}\n\n.regular-banner__link {\npadding: 0.5rem 1.5rem;\nfont-weight: 500;\ntext-decoration: none;\nborder-radius: 0.5rem;\ncolor: #FFFFFF;\nbackground-color: #1491D4;\ntext-align: center;\ntransition: all 0.2s ease-in;\n}\n\n.regular-banner__link:hover {\nbackground-color: #68CBFF;\ncolor: white;\n}\n<\/style>\n<!-- Regular Banner Styles END -->\n\n\n\n<h2 class=\"wp-block-heading\">Conclusion&nbsp;<\/h2>\n\n\n\n<p>With these enhanced features, security teams can streamline their workflow, uncover hidden threats, and improve detection accuracy, all from within their browser. Install ANY.RUN\u2019s extension now to try it right away!&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">About ANY.RUN<\/h2>\n\n\n\n<p><a href=\"https:\/\/any.run\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=safebrowsing_extension&amp;utm_term=060225&amp;utm_content=linktolanding\" target=\"_blank\" rel=\"noreferrer noopener\">ANY.RUN<\/a> helps more than 500,000 cybersecurity professionals worldwide. Our interactive sandbox simplifies malware analysis of threats that target both Windows and Linux systems. Our threat intelligence products, <a href=\"https:\/\/any.run\/cybersecurity-blog\/introducing-any-run-threat-intelligence-lookup\/\" target=\"_blank\" rel=\"noreferrer noopener\">TI Lookup<\/a>, <a href=\"https:\/\/any.run\/cybersecurity-blog\/yara-search\/\" target=\"_blank\" rel=\"noreferrer noopener\">YARA Search<\/a>, and <a href=\"https:\/\/any.run\/cybersecurity-blog\/threat-intelligence-feeds\/\" target=\"_blank\" rel=\"noreferrer noopener\">Feeds<\/a>, help you find IOCs or files to learn more about the threats and respond to incidents faster.<\/p>\n\n\n\n<p><a href=\"https:\/\/any.run\/demo\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=safebrowsing_extension&amp;utm_term=060225&amp;utm_content=linktodemo\" target=\"_blank\" rel=\"noreferrer noopener\">Request free trial of ANY.RUN&#8217;s services \u2192<\/a>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Phishing attempts, malicious redirects, and hidden malware can lurk in seemingly harmless links, putting your company\u2019s data and systems at risk. To streamline threat detection and response,&nbsp;ANY.RUN has upgraded its browser extension, making the&nbsp;Safebrowsing feature free&nbsp;for all users.&nbsp; How Safebrowsing Works in ANY.RUN\u2019s Extension&nbsp; Safebrowsing from ANY.RUN provides a fully functional browser, allowing users to [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":11461,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[9],"tags":[57,10,54,34,40,55,56],"class_list":["post-11458","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-service-updates","tag-anyrun","tag-cybersecurity","tag-features","tag-malware-analysis","tag-malware-behavior","tag-release","tag-update"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v20.10 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Instant URL Analysis: Use Safebrowsing in ANY.RUN\u2019s Extension<\/title>\n<meta name=\"description\" content=\"See how you can launch analysis of suspicious URLs in Safebrowsing via ANY.RUN&#039;s browser extension in just two clicks.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/any.run\/cybersecurity-blog\/safebrowsing-extension\/\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"ANY.RUN\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/safebrowsing-extension\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/safebrowsing-extension\/\"},\"author\":{\"name\":\"ANY.RUN\",\"@id\":\"https:\/\/any.run\/\"},\"headline\":\"Instant URL Analysis: Use Safebrowsing via ANY.RUN\u2019s Extension\",\"datePublished\":\"2025-02-06T11:51:03+00:00\",\"dateModified\":\"2025-03-03T06:31:43+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/safebrowsing-extension\/\"},\"wordCount\":1212,\"commentCount\":2,\"publisher\":{\"@id\":\"https:\/\/any.run\/\"},\"keywords\":[\"ANYRUN\",\"cybersecurity\",\"features\",\"malware analysis\",\"malware behavior\",\"release\",\"update\"],\"articleSection\":[\"Service Updates\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/any.run\/cybersecurity-blog\/safebrowsing-extension\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/safebrowsing-extension\/\",\"url\":\"https:\/\/any.run\/cybersecurity-blog\/safebrowsing-extension\/\",\"name\":\"Instant URL Analysis: Use Safebrowsing in ANY.RUN\u2019s Extension\",\"isPartOf\":{\"@id\":\"https:\/\/any.run\/\"},\"datePublished\":\"2025-02-06T11:51:03+00:00\",\"dateModified\":\"2025-03-03T06:31:43+00:00\",\"description\":\"See how you can launch analysis of suspicious URLs in Safebrowsing via ANY.RUN's browser extension in just two clicks.\",\"breadcrumb\":{\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/safebrowsing-extension\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/any.run\/cybersecurity-blog\/safebrowsing-extension\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/safebrowsing-extension\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/any.run\/cybersecurity-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Service Updates\",\"item\":\"https:\/\/any.run\/cybersecurity-blog\/category\/service-updates\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Instant URL Analysis: Use Safebrowsing via ANY.RUN\u2019s Extension\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/any.run\/\",\"url\":\"https:\/\/any.run\/\",\"name\":\"ANY.RUN&#039;s Cybersecurity Blog\",\"description\":\"Cybersecurity Blog covers topics for experienced professionals as well as for those new to it.\",\"publisher\":{\"@id\":\"https:\/\/any.run\/\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/any.run\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/any.run\/\",\"name\":\"ANY.RUN\",\"url\":\"https:\/\/any.run\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/any.run\/\",\"url\":\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg\",\"contentUrl\":\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg\",\"width\":1,\"height\":1,\"caption\":\"ANY.RUN\"},\"image\":{\"@id\":\"https:\/\/any.run\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/www.any.run\/\",\"https:\/\/twitter.com\/anyrun_app\",\"https:\/\/www.linkedin.com\/company\/30692044\",\"https:\/\/www.youtube.com\/channel\/UCOgCPho7lzmH7m6fPNlukrQ\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/any.run\/\",\"name\":\"ANY.RUN\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/any.run\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/c4ce3a6c672056b4a8cd6b0110782215?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/c4ce3a6c672056b4a8cd6b0110782215?s=96&d=mm&r=g\",\"caption\":\"ANY.RUN\"},\"url\":\"https:\/\/any.run\/cybersecurity-blog\/author\/a-bespalova\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Instant URL Analysis: Use Safebrowsing in ANY.RUN\u2019s Extension","description":"See how you can launch analysis of suspicious URLs in Safebrowsing via ANY.RUN's browser extension in just two clicks.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/any.run\/cybersecurity-blog\/safebrowsing-extension\/","twitter_misc":{"Written by":"ANY.RUN","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/any.run\/cybersecurity-blog\/safebrowsing-extension\/#article","isPartOf":{"@id":"https:\/\/any.run\/cybersecurity-blog\/safebrowsing-extension\/"},"author":{"name":"ANY.RUN","@id":"https:\/\/any.run\/"},"headline":"Instant URL Analysis: Use Safebrowsing via ANY.RUN\u2019s Extension","datePublished":"2025-02-06T11:51:03+00:00","dateModified":"2025-03-03T06:31:43+00:00","mainEntityOfPage":{"@id":"https:\/\/any.run\/cybersecurity-blog\/safebrowsing-extension\/"},"wordCount":1212,"commentCount":2,"publisher":{"@id":"https:\/\/any.run\/"},"keywords":["ANYRUN","cybersecurity","features","malware analysis","malware behavior","release","update"],"articleSection":["Service Updates"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/any.run\/cybersecurity-blog\/safebrowsing-extension\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/any.run\/cybersecurity-blog\/safebrowsing-extension\/","url":"https:\/\/any.run\/cybersecurity-blog\/safebrowsing-extension\/","name":"Instant URL Analysis: Use Safebrowsing in ANY.RUN\u2019s Extension","isPartOf":{"@id":"https:\/\/any.run\/"},"datePublished":"2025-02-06T11:51:03+00:00","dateModified":"2025-03-03T06:31:43+00:00","description":"See how you can launch analysis of suspicious URLs in Safebrowsing via ANY.RUN's browser extension in just two clicks.","breadcrumb":{"@id":"https:\/\/any.run\/cybersecurity-blog\/safebrowsing-extension\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/any.run\/cybersecurity-blog\/safebrowsing-extension\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/any.run\/cybersecurity-blog\/safebrowsing-extension\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/any.run\/cybersecurity-blog\/"},{"@type":"ListItem","position":2,"name":"Service Updates","item":"https:\/\/any.run\/cybersecurity-blog\/category\/service-updates\/"},{"@type":"ListItem","position":3,"name":"Instant URL Analysis: Use Safebrowsing via ANY.RUN\u2019s Extension"}]},{"@type":"WebSite","@id":"https:\/\/any.run\/","url":"https:\/\/any.run\/","name":"ANY.RUN&#039;s Cybersecurity Blog","description":"Cybersecurity Blog covers topics for experienced professionals as well as for those new to it.","publisher":{"@id":"https:\/\/any.run\/"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/any.run\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/any.run\/","name":"ANY.RUN","url":"https:\/\/any.run\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/any.run\/","url":"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg","contentUrl":"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg","width":1,"height":1,"caption":"ANY.RUN"},"image":{"@id":"https:\/\/any.run\/"},"sameAs":["https:\/\/www.facebook.com\/www.any.run\/","https:\/\/twitter.com\/anyrun_app","https:\/\/www.linkedin.com\/company\/30692044","https:\/\/www.youtube.com\/channel\/UCOgCPho7lzmH7m6fPNlukrQ"]},{"@type":"Person","@id":"https:\/\/any.run\/","name":"ANY.RUN","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/any.run\/","url":"https:\/\/secure.gravatar.com\/avatar\/c4ce3a6c672056b4a8cd6b0110782215?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/c4ce3a6c672056b4a8cd6b0110782215?s=96&d=mm&r=g","caption":"ANY.RUN"},"url":"https:\/\/any.run\/cybersecurity-blog\/author\/a-bespalova\/"}]}},"_links":{"self":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts\/11458"}],"collection":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/comments?post=11458"}],"version-history":[{"count":20,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts\/11458\/revisions"}],"predecessor-version":[{"id":11498,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts\/11458\/revisions\/11498"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/media\/11461"}],"wp:attachment":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/media?parent=11458"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/categories?post=11458"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/tags?post=11458"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}