{"id":11946,"date":"2025-03-04T11:10:14","date_gmt":"2025-03-04T11:10:14","guid":{"rendered":"\/cybersecurity-blog\/?p=11946"},"modified":"2025-03-04T11:10:15","modified_gmt":"2025-03-04T11:10:15","slug":"release-notes-february-2025","status":"publish","type":"post","link":"https:\/\/any.run\/cybersecurity-blog\/release-notes-february-2025\/","title":{"rendered":"Release Notes: Threat Intelligence Reports, New Website Design, &amp; Enhanced Detection"},"content":{"rendered":"\n<p>Hey, cybersecurity enthusiasts!&nbsp;<\/p>\n\n\n\n<p>February brought major enhancements to <a href=\"http:\/\/any.run\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release_notes_feb_25&amp;utm_term=040325&amp;utm_content=linktolanding\" target=\"_blank\" rel=\"noreferrer noopener\">ANY.RUN<\/a>, improving threat intelligence, detection capabilities, and overall user experience.&nbsp;<\/p>\n\n\n\n<p>With the launch of <a href=\"https:\/\/any.run\/cybersecurity-blog\/threat-intelligence-reports\/\" target=\"_blank\" rel=\"noreferrer noopener\">Threat Intelligence Reports<\/a>, security professionals now have access to detailed, expert-driven analyses of cyber threats, malware, and <a href=\"https:\/\/any.run\/cybersecurity-blog\/track-advanced-persistent-threats\/\" target=\"_blank\" rel=\"noreferrer noopener\">APT activities<\/a>.<\/p>\n\n\n\n<p>We also introduced a redesigned website, making navigation more intuitive and structured.&nbsp;<\/p>\n\n\n\n<p>On the detection side, we significantly improved our threat-hunting capabilities, adding 314 new <a href=\"https:\/\/any.run\/cybersecurity-blog\/suricata-search\/\" target=\"_blank\" rel=\"noreferrer noopener\">Suricata rules<\/a>, refining behavior signatures, and expanding our <a href=\"https:\/\/any.run\/cybersecurity-blog\/yara-rules-explained\/\" target=\"_blank\" rel=\"noreferrer noopener\">YARA rule database<\/a>. These updates strengthen real-time threat visibility and detection accuracy, helping analysts respond faster to emerging cyber threats.&nbsp;<\/p>\n\n\n\n<p>Let\u2019s take a closer look at February\u2019s updates and how they enhance your malware-hunting workflow.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Product Updates&nbsp;<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\">Threat Intelligence Reports<\/h3>\n\n\n\n<p>In February, ANY.RUN introduced <a href=\"https:\/\/any.run\/cybersecurity-blog\/threat-intelligence-reports\/\" target=\"_blank\" rel=\"noreferrer noopener\">Threat Intelligence Reports<\/a> in <a href=\"https:\/\/any.run\/cybersecurity-blog\/introducing-any-run-threat-intelligence-lookup\/\" target=\"_blank\" rel=\"noreferrer noopener\">TI Lookup<\/a>: detailed research on cyber threats, providing security professionals and decision-makers with actionable insights.\u00a0<\/p>\n\n\n\n<p>Curated by our experts, these reports support threat monitoring, incident response, R&amp;D, and strategic planning, covering malware, ransomware, phishing campaigns, and APTs.&nbsp;&nbsp;<\/p>\n\n\n\n<p>Built on real-world threat data, sources include our Interactive Sandbox, TI Lookup, and community-driven malware analyses.&nbsp;<\/p>\n\n\n\n<p><a href=\"https:\/\/intelligence.any.run\/reports\/67852a72a26244f92be08876\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release_notes_feb_25&amp;utm_term=040325&amp;utm_content=linktolookup\" target=\"_blank\" rel=\"noreferrer noopener\">View sample report on APT41 Attacks&nbsp;<\/a>&nbsp;&nbsp;&nbsp;<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"695\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2025\/03\/image-1024x695.png\" alt=\"\" class=\"wp-image-11960\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/03\/image-1024x695.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/03\/image-300x204.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/03\/image-768x521.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/03\/image-1536x1043.png 1536w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/03\/image-370x251.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/03\/image-270x183.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/03\/image-740x502.png 740w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/03\/image.png 2048w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\"><em>An example of a recent TI report<\/em><\/figcaption><\/figure><\/div>\n\n\n<p><strong>How to access TI Reports<\/strong>&nbsp;<\/p>\n\n\n\n<p>Paid TI Lookup users get full reports, while summaries and select reports are available for free.&nbsp;<\/p>\n\n\n\n<ol start=\"1\" class=\"wp-block-list\">\n<li>Go to <a href=\"https:\/\/intelligence.any.run\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release_notes_feb_25&amp;utm_term=040325&amp;utm_content=linktolookup\" target=\"_blank\" rel=\"noreferrer noopener\">intelligence.any.run<\/a>.&nbsp;<\/li>\n<\/ol>\n\n\n\n<ol start=\"2\" class=\"wp-block-list\">\n<li>Click the TI Reports icon on the left.&nbsp;<\/li>\n<\/ol>\n\n\n\n<ol start=\"3\" class=\"wp-block-list\">\n<li>Select a report from the feed.&nbsp;<\/li>\n<\/ol>\n\n\n\n<p>New reports are marked with a \u201cNew\u201d badge for quick access.&nbsp;<\/p>\n\n\n\n<!-- Regular Banner START -->\n<div class=\"regular-banner\">\n<!-- Text Content -->\n<p class=\"regular-banner__text\">\nTry premium features of <span class=\"highlight\">ANY.RUN<\/span> for free&nbsp;   \n<\/p>\n<!-- CTA Link -->\n<a class=\"regular-banner__link\" id=\"article-banner-regular\" href=\"https:\/\/any.run\/demo\/?utm_source=anyrunblog&#038;utm_medium=article&#038;utm_campaign=release_notes_feb_25&#038;utm_term=040325&#038;utm_content=linktodemo\/\" rel=\"noopener\" target=\"_blank\">\nGet 14-day trial\n<\/a>\n<\/div>\n<!-- Regular Banner END -->\n<!-- Regular Banner Styles START -->\n\n<style>\n.regular-banner {\ndisplay: flex;\ntext-align: center;\nflex-direction: column;\nalign-items: center;\ngap: 1.5rem;\nwidth: 100%;\npadding: 2rem;\nmargin: 1.5rem 0;\nborder-radius: 0.5rem;\nfont-family: 'Catamaran Bold';\nmargin-inline: auto;\nbackground: rgba(32, 168, 241, 0.1);\nborder: 1px solid rgba(75, 174, 227, 0.32);\n}\n\n.regular-banner__text {\nfont-size: 1.5rem;\nmargin: 0;\n}\n\n.highlight {\ncolor: #ea2526;\n}\n\n.regular-banner__link {\npadding: 0.5rem 1.5rem;\nfont-weight: 500;\ntext-decoration: none;\nborder-radius: 0.5rem;\ncolor: #FFFFFF;\nbackground-color: #1491D4;\ntext-align: center;\ntransition: all 0.2s ease-in;\n}\n\n.regular-banner__link:hover {\nbackground-color: #68CBFF;\ncolor: white;\n}\n<\/style>\n<!-- Regular Banner Styles END -->\n\n\n\n<p><strong>What\u2019s inside TI Reports?<\/strong>&nbsp;<\/p>\n\n\n\n<p>Each report provides a detailed threat overview, covering key aspects such as:&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Threat actor or malware profile:<\/strong> Origins, objectives, targeted industries, and regions.&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>TTPs:<\/strong> Methods used by attackers, helping in detection and mitigation.&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong><a href=\"https:\/\/any.run\/cybersecurity-blog\/malconf-in-ti-lookup\/\" target=\"_blank\" rel=\"noreferrer noopener\">IOCs<\/a>, IOBs, IOAs:<\/strong> Critical data for identifying threats in your environment.\u00a0<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>YARA and SIGMA rules:<\/strong> Ready-to-use detection rules for security systems.&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Sandbox analysis links:<\/strong> Direct access to real-world threat samples in action.&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Additional references:<\/strong> Supporting research and external resources for deeper insights.&nbsp;<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">New Website Design: A More User-Friendly Experience&nbsp;<\/h3>\n\n\n\n<p>In February, we introduced a redesigned <a href=\"http:\/\/any.run\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release_notes_feb_25&amp;utm_term=040325&amp;utm_content=linktolanding\" target=\"_blank\" rel=\"noreferrer noopener\">ANY.RUN website<\/a>, making it more intuitive, structured, and easier to navigate. The new design makes sure that all essential cybersecurity resources and solutions are now better organized and easily accessible.&nbsp;<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"583\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2025\/03\/image2-1-1024x583.png\" alt=\"\" class=\"wp-image-11962\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/03\/image2-1-1024x583.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/03\/image2-1-300x171.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/03\/image2-1-768x437.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/03\/image2-1-1536x874.png 1536w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/03\/image2-1-2048x1166.png 2048w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/03\/image2-1-370x211.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/03\/image2-1-270x154.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/03\/image2-1-740x421.png 740w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\"><em>The new redesigned webpage of ANY.RUN<\/em><\/figcaption><\/figure><\/div>\n\n\n<p>Whether you&#8217;re exploring threat intelligence, running sandbox analyses, or researching cybersecurity insights, the updated layout enhances usability for both security experts and new users.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Threat Coverage Updates&nbsp;<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\">Suricata Rules&nbsp;<\/h3>\n\n\n\n<p>In February, we added 314 new Suricata rules, strengthening our network-based threat detection. Notable updates include:&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>A Booking.com phishing rule, designed to detect fraudulent activity targeting users.&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>A rule for Australia Gov phishing attempts, though it covers only partial cases due to dynamic URL changes and regional access restrictions.&nbsp;<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">New Behavior Signatures&nbsp;<\/h3>\n\n\n\n<p>This month, we expanded behavior-based detection, adding new mutex findings, threat detections, and suspicious activity signatures. These updates improve the ability to track malware persistence mechanisms and evasive techniques in real-time.&nbsp;<\/p>\n\n\n\n<p><strong>New Malware &amp; Threat Detections\u00a0<\/strong><\/p>\n\n\n\n<div class=\"wp-block-group\"><div class=\"wp-block-group__inner-container is-layout-grid wp-container-core-group-is-layout-1 wp-block-group-is-layout-grid\">\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/app.any.run\/tasks\/b689c8fa-6126-417a-8abd-26d52e874f92\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release_notes_feb_25&amp;utm_term=040325&amp;utm_content=linktoservice\" target=\"_blank\" rel=\"noreferrer noopener\">ValleyRAT<\/a>&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/app.any.run\/tasks\/90f5f09c-637a-4ca1-82fb-a1fa87a61795\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release_notes_feb_25&amp;utm_term=040325&amp;utm_content=linktoservice\" target=\"_blank\" rel=\"noreferrer noopener\">Legionloader <\/a>&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/app.any.run\/tasks\/213180a2-6fbb-4d9c-a736-a683764cd0cb\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release_notes_feb_25&amp;utm_term=040325&amp;utm_content=linktoservice\" target=\"_blank\" rel=\"noreferrer noopener\">Goldeneye mutex<\/a>&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/app.any.run\/tasks\/b678086f-23ec-430c-b704-fc401f7f7bad\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release_notes_feb_25&amp;utm_term=040325&amp;utm_content=linktoservice\" target=\"_blank\" rel=\"noreferrer noopener\">CelestialRAT mutex<\/a><\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/app.any.run\/tasks\/268ee652-c1c3-4524-9918-ddf2af12c534\" target=\"_blank\" rel=\"noreferrer noopener\">Trigona mutex <\/a>&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/app.any.run\/tasks\/11f66692-6cf7-4672-b6ba-a0095ac4dd3c\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release_notes_feb_25&amp;utm_term=040325&amp;utm_content=linktoservice\" target=\"_blank\" rel=\"noreferrer noopener\">Moisha mutex<\/a>&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/app.any.run\/tasks\/b1edf0ed-dddc-461d-b0ac-480dda3d4a5d\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release_notes_feb_25&amp;utm_term=040325&amp;utm_content=linktoservice\" target=\"_blank\" rel=\"noreferrer noopener\">PE32S<\/a>&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/app.any.run\/tasks\/56148af8-8111-4e1b-87b1-e20776438e97\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release_notes_feb_25&amp;utm_term=040325&amp;utm_content=linktoservice\" target=\"_blank\" rel=\"noreferrer noopener\">Smartloader<\/a>&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/app.any.run\/tasks\/2ec94ede-74bb-4e42-9f3e-db43e14ecab7\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release_notes_feb_25&amp;utm_term=040325&amp;utm_content=linktoservice\" target=\"_blank\" rel=\"noreferrer noopener\">Nailalocker<\/a>&nbsp;<\/li>\n<\/ul>\n<\/div><\/div>\n\n\n\n<p><strong>Suspicious Activities &amp; Evasion Techniques\u00a0<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/app.any.run\/tasks\/75ff26e8-8248-4128-ab57-0dd9543aaa59\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release_notes_feb_25&amp;utm_term=040325&amp;utm_content=linktoservice\" target=\"_blank\" rel=\"noreferrer noopener\">Suspicious data exfiltration via CURL<\/a>&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/app.any.run\/tasks\/390b7936-b32e-4c1c-97a5-6e4617c43950\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release_notes_feb_25&amp;utm_term=040325&amp;utm_content=linktoservice\" target=\"_blank\" rel=\"noreferrer noopener\">Renaming legitimate system utilities<\/a>&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Disabling Windows security features:&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Firewall&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>SmartScreen&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Task Manager&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Command Prompt&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Remote Desktop Access&nbsp;<\/li>\n<\/ul>\n\n\n\n<p><strong>Additional Mutex Detections\u00a0<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Darkside, Crytox, Xtreme, Funlocker, Redlocker, Roblox, Aida64, Smartsteamemu, Processlasso, Cactus, Phobos&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Nitrogen (mutex &amp; detection)&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Various software-related mutex detections, including <a href=\"https:\/\/app.any.run\/tasks\/2cc352c4-a76f-4225-a4f3-69dc00dc1f6a\" target=\"_blank\" rel=\"noreferrer noopener\">COYOTE mutex<\/a>, Proxifier,&nbsp;Wireshark, Java, Adguardvpn, Cheatengine, Opera, Electron Js, Adobeinstaller, Hotbar, Quickdriverupdater, And Pcappstore&nbsp;<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">New YARA Rule Updates&nbsp;<\/h3>\n\n\n\n<p>In February, we expanded our YARA rule database, enhancing malware detection and classification. The latest rules target a variety of stealers, RATs, ransomware, and loaders, improving detection accuracy for emerging threats.&nbsp;<\/p>\n\n\n\n<div class=\"wp-block-group\"><div class=\"wp-block-group__inner-container is-layout-grid wp-container-core-group-is-layout-2 wp-block-group-is-layout-grid\">\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/app.any.run\/tasks\/d29cf9bc-f185-4cd0-8771-ab9209039989\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release_notes_feb_25&amp;utm_term=040325&amp;utm_content=linktoservice\" target=\"_blank\" rel=\"noreferrer noopener\">Menorah<\/a>&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Spearal&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Veaty&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Clipog&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Cerbfyne&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/app.any.run\/tasks\/ea141f55-9ae6-4cb5-ba45-8c3461fbdeb7\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release_notes_feb_25&amp;utm_term=040325&amp;utm_content=linktoservice\" target=\"_blank\" rel=\"noreferrer noopener\">ValleyRAT<\/a>&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Funklocker&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Redlocker&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Cloudscout&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/app.any.run\/tasks\/28a4b5d0-bfd5-4024-aed8-4fec15b15842\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release_notes_feb_25&amp;utm_term=040325&amp;utm_content=linktoservice\" target=\"_blank\" rel=\"noreferrer noopener\">DivulgeStealer<\/a>&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>MillenniumRAT&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/app.any.run\/tasks\/9262f39e-11d6-45d4-bf18-fd4fb3f60b16\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release_notes_feb_25&amp;utm_term=040325&amp;utm_content=linktoservice\" target=\"_blank\" rel=\"noreferrer noopener\">DotStealer<\/a>&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/app.any.run\/tasks\/2e8d59f7-3cc7-4df2-aa2f-333d5be00c89\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release_notes_feb_25&amp;utm_term=040325&amp;utm_content=linktoservice\" target=\"_blank\" rel=\"noreferrer noopener\">Lynx<\/a>&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/app.any.run\/tasks\/e85e1a85-819e-436b-8361-e05f1874b65d\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release_notes_feb_25&amp;utm_term=040325&amp;utm_content=linktoservice\" target=\"_blank\" rel=\"noreferrer noopener\">Mint<\/a>&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>JasonRAT&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Meduza&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>CelestialRAT&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>RansomHub&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/app.any.run\/tasks\/268ee652-c1c3-4524-9918-ddf2af12c534\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release_notes_feb_25&amp;utm_term=040325&amp;utm_content=linktoservice\" target=\"_blank\" rel=\"noreferrer noopener\">Trigona<\/a>&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/app.any.run\/tasks\/0e0800e4-7410-433e-9751-a1ed84a4ebe6\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release_notes_feb_25&amp;utm_term=040325&amp;utm_content=linktoservice\" target=\"_blank\" rel=\"noreferrer noopener\">Cactus<\/a>&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/app.any.run\/tasks\/e8fd1934-a0f9-4f76-8547-da5f57b843ed\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release_notes_feb_25&amp;utm_term=040325&amp;utm_content=linktoservice\" target=\"_blank\" rel=\"noreferrer noopener\">PE32S<\/a>&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Xorist&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Hellcat&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>HKBot&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/app.any.run\/tasks\/5bf304b9-cea2-497e-8775-fc9b786a3334\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release_notes_feb_25&amp;utm_term=040325&amp;utm_content=linktoservice\" target=\"_blank\" rel=\"noreferrer noopener\">DiscordRAT<\/a>&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>MiyaRAT&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/app.any.run\/tasks\/4896654a-418a-4c41-b02e-cf871fd292cd\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release_notes_feb_25&amp;utm_term=040325&amp;utm_content=linktoservice\" target=\"_blank\" rel=\"noreferrer noopener\">SVCStealer<\/a>&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/app.any.run\/tasks\/f05918db-a060-46c5-8aed-3d7e0e6a27fb\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release_notes_feb_25&amp;utm_term=040325&amp;utm_content=linktoservice\" target=\"_blank\" rel=\"noreferrer noopener\">Cring<\/a>&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Zhong&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>DarkTrack&nbsp;<\/li>\n<\/ul>\n<\/div><\/div>\n\n\n\n<!-- CTA Split START -->\n<div class=\"cta-split\">\n<div class=\"cta__split-left\">\n\n<!-- Image -->\n<img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/mcusercontent.com\/663b94f19348582a8dc323efe\/images\/0d88188b-3e89-2314-5a60-cb87e8077326.png\" alt=\"ANY.RUN cloud interactive sandbox interface\" class=\"cta__split-icon\" \/>\n<\/div>\n\n<div class=\"cta__split-right\">\n<div>\n\n<!-- Heading -->\n<h3 class=\"cta__split-heading\"><br>Sandbox for Businesses<\/h3>\n\n<!-- Text -->\n<p class=\"cta__split-text\">\nDiscover all features of the <span class=\"highlight\">Enterprise plan<\/span> designed for businesses and large security teams.\n<br \/>\n<\/p>\n<\/div>\n<!-- CTA Link -->\n<a target=\"_blank\" rel=\"noopener\" id=\"article-banner-split\" href=\"https:\/\/any.run\/cybersecurity-blog\/anyrun-for-enterprises\/\"><div class=\"cta__split-link\">See details<\/div><\/a>\n<\/div>\n<\/div>\n<!-- CTA Split END -->\n<!-- CTA Split Styles START -->\n<style>\n.cta-split {\noverflow: hidden;\nmargin: 3rem 0;\ndisplay: grid;\njustify-items: center;\nborder-radius: 0.5rem;\nwidth: 100%;\nmin-height: 25rem;\ngrid-template-columns: repeat(2, 1fr);\nborder: 1px solid rgba(75, 174, 227, 0.32);\nfont-family: 'Catamaran Bold';\n}\n\n.cta__split-left {\ndisplay: flex;\nalign-items: center;\njustify-content: center;\nheight: 100%;\nwidth: 100%;\nbackground-color: #161c59;\nbackground-position: center center;\nbackground: rgba(32, 168, 241, 0.1);\n}\n\n.cta__split-icon { \nwidth: 100%;\nheight: auto;\nobject-fit: contain;\nmax-width: 100%;\n}\n\n.cta__split-right {\ndisplay: flex;\nflex-direction: column;\njustify-content: space-between;\npadding: 2rem;\n}\n\n.cta__split-heading { font-size: 1.5rem; }\n\n.cta__split-text {\nmargin-top: 1rem;\nfont-family: Lato, Roboto, sans-serif;\n}\n\n.cta__split-link {\npadding: 0.5rem 1rem;\nfont-weight: 500;\ntext-decoration: none;\nborder-radius: 0.5rem;\ncolor: white;\nbackground-color: #1491D4;\ntext-align: center;\ntransition: all 0.2s ease-in;\ndisplay: block;\nz-index: 1000;\nposition: relative;\ncursor: pointer !important;\n}\n\n.cta__split-link:hover {\nbackground-color: #68CBFF;\ncolor: white;\ncursor: pointer;\n}\n\n.highlight { color: #ea2526;}\n\n\n\/* Mobile styles START *\/\n@media only screen and (max-width: 768px) {\n\n.cta-split {\ngrid-template-columns: 1fr;\nmin-height: auto;\n}\n\n.cta__split-left {\nheight: auto;\nmin-height: 10rem;\n}\n\n\n.cta__split-left, .cta__split-right {\nheight: auto;\n}\n\n.cta__split-heading { font-size: 1.2rem; }\n\n.cta__split-text { font-size: 1rem; }\n.cta__split-icon {\nmax-height: auto;\nobject-fit: cover;\n}\n\n}\n\/* Mobile styles END *\/\n<\/style>\n<!-- CTA Split Styles END -->\n\n\n\n<h2 class=\"wp-block-heading\">About ANY.RUN<\/h2>\n\n\n\n<p><a href=\"https:\/\/any.run\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release_notes_feb_25&amp;utm_term=040325&amp;utm_content=linktolanding\" target=\"_blank\" rel=\"noreferrer noopener\">ANY.RUN<\/a> helps more than 500,000 cybersecurity professionals worldwide. Our interactive sandbox simplifies malware analysis of threats that target both Windows and Linux systems. Our threat intelligence products, <a href=\"https:\/\/any.run\/cybersecurity-blog\/introducing-any-run-threat-intelligence-lookup\/\" target=\"_blank\" rel=\"noreferrer noopener\">TI Lookup<\/a>, <a href=\"https:\/\/any.run\/cybersecurity-blog\/yara-search\/\" target=\"_blank\" rel=\"noreferrer noopener\">YARA Search<\/a>, and <a href=\"https:\/\/any.run\/cybersecurity-blog\/threat-intelligence-feeds\/\" target=\"_blank\" rel=\"noreferrer noopener\">Feeds<\/a>, help you find IOCs or files to learn more about the threats and respond to incidents faster.<\/p>\n\n\n\n<p><a href=\"https:\/\/any.run\/demo\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release_notes_feb_25&amp;utm_term=040325&amp;utm_content=linktodemo\" target=\"_blank\" rel=\"noreferrer noopener\">Request free trial of ANY.RUN&#8217;s services \u2192<\/a>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Hey, cybersecurity enthusiasts!&nbsp; February brought major enhancements to ANY.RUN, improving threat intelligence, detection capabilities, and overall user experience.&nbsp; With the launch of Threat Intelligence Reports, security professionals now have access to detailed, expert-driven analyses of cyber threats, malware, and APT activities. We also introduced a redesigned website, making navigation more intuitive and structured.&nbsp; On the [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":7723,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[9],"tags":[57,10,55,56],"class_list":["post-11946","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-service-updates","tag-anyrun","tag-cybersecurity","tag-release","tag-update"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v20.10 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Release Notes: TI Reports, New Website, &amp; Enhanced Detection<\/title>\n<meta name=\"description\" content=\"Discover the latest updates from ANY.RUN, including Threat Intelligence Reports, fresh website design, and new detection rules.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/any.run\/cybersecurity-blog\/release-notes-february-2025\/\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"ANY.RUN\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/release-notes-february-2025\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/release-notes-february-2025\/\"},\"author\":{\"name\":\"ANY.RUN\",\"@id\":\"https:\/\/any.run\/\"},\"headline\":\"Release Notes: Threat Intelligence Reports, New Website Design, &amp; Enhanced Detection\",\"datePublished\":\"2025-03-04T11:10:14+00:00\",\"dateModified\":\"2025-03-04T11:10:15+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/release-notes-february-2025\/\"},\"wordCount\":830,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/any.run\/\"},\"keywords\":[\"ANYRUN\",\"cybersecurity\",\"release\",\"update\"],\"articleSection\":[\"Service Updates\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/any.run\/cybersecurity-blog\/release-notes-february-2025\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/release-notes-february-2025\/\",\"url\":\"https:\/\/any.run\/cybersecurity-blog\/release-notes-february-2025\/\",\"name\":\"Release Notes: TI Reports, New Website, & Enhanced Detection\",\"isPartOf\":{\"@id\":\"https:\/\/any.run\/\"},\"datePublished\":\"2025-03-04T11:10:14+00:00\",\"dateModified\":\"2025-03-04T11:10:15+00:00\",\"description\":\"Discover the latest updates from ANY.RUN, including Threat Intelligence Reports, fresh website design, and new detection rules.\",\"breadcrumb\":{\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/release-notes-february-2025\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/any.run\/cybersecurity-blog\/release-notes-february-2025\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/release-notes-february-2025\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/any.run\/cybersecurity-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Service Updates\",\"item\":\"https:\/\/any.run\/cybersecurity-blog\/category\/service-updates\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Release Notes: Threat Intelligence Reports, New Website Design, &amp; Enhanced Detection\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/any.run\/\",\"url\":\"https:\/\/any.run\/\",\"name\":\"ANY.RUN&#039;s Cybersecurity Blog\",\"description\":\"Cybersecurity Blog covers topics for experienced professionals as well as for those new to it.\",\"publisher\":{\"@id\":\"https:\/\/any.run\/\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/any.run\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/any.run\/\",\"name\":\"ANY.RUN\",\"url\":\"https:\/\/any.run\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/any.run\/\",\"url\":\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg\",\"contentUrl\":\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg\",\"width\":1,\"height\":1,\"caption\":\"ANY.RUN\"},\"image\":{\"@id\":\"https:\/\/any.run\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/www.any.run\/\",\"https:\/\/twitter.com\/anyrun_app\",\"https:\/\/www.linkedin.com\/company\/30692044\",\"https:\/\/www.youtube.com\/channel\/UCOgCPho7lzmH7m6fPNlukrQ\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/any.run\/\",\"name\":\"ANY.RUN\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/any.run\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/c4ce3a6c672056b4a8cd6b0110782215?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/c4ce3a6c672056b4a8cd6b0110782215?s=96&d=mm&r=g\",\"caption\":\"ANY.RUN\"},\"url\":\"https:\/\/any.run\/cybersecurity-blog\/author\/a-bespalova\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Release Notes: TI Reports, New Website, & Enhanced Detection","description":"Discover the latest updates from ANY.RUN, including Threat Intelligence Reports, fresh website design, and new detection rules.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/any.run\/cybersecurity-blog\/release-notes-february-2025\/","twitter_misc":{"Written by":"ANY.RUN","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/any.run\/cybersecurity-blog\/release-notes-february-2025\/#article","isPartOf":{"@id":"https:\/\/any.run\/cybersecurity-blog\/release-notes-february-2025\/"},"author":{"name":"ANY.RUN","@id":"https:\/\/any.run\/"},"headline":"Release Notes: Threat Intelligence Reports, New Website Design, &amp; Enhanced Detection","datePublished":"2025-03-04T11:10:14+00:00","dateModified":"2025-03-04T11:10:15+00:00","mainEntityOfPage":{"@id":"https:\/\/any.run\/cybersecurity-blog\/release-notes-february-2025\/"},"wordCount":830,"commentCount":0,"publisher":{"@id":"https:\/\/any.run\/"},"keywords":["ANYRUN","cybersecurity","release","update"],"articleSection":["Service Updates"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/any.run\/cybersecurity-blog\/release-notes-february-2025\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/any.run\/cybersecurity-blog\/release-notes-february-2025\/","url":"https:\/\/any.run\/cybersecurity-blog\/release-notes-february-2025\/","name":"Release Notes: TI Reports, New Website, & Enhanced Detection","isPartOf":{"@id":"https:\/\/any.run\/"},"datePublished":"2025-03-04T11:10:14+00:00","dateModified":"2025-03-04T11:10:15+00:00","description":"Discover the latest updates from ANY.RUN, including Threat Intelligence Reports, fresh website design, and new detection rules.","breadcrumb":{"@id":"https:\/\/any.run\/cybersecurity-blog\/release-notes-february-2025\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/any.run\/cybersecurity-blog\/release-notes-february-2025\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/any.run\/cybersecurity-blog\/release-notes-february-2025\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/any.run\/cybersecurity-blog\/"},{"@type":"ListItem","position":2,"name":"Service Updates","item":"https:\/\/any.run\/cybersecurity-blog\/category\/service-updates\/"},{"@type":"ListItem","position":3,"name":"Release Notes: Threat Intelligence Reports, New Website Design, &amp; Enhanced Detection"}]},{"@type":"WebSite","@id":"https:\/\/any.run\/","url":"https:\/\/any.run\/","name":"ANY.RUN&#039;s Cybersecurity Blog","description":"Cybersecurity Blog covers topics for experienced professionals as well as for those new to it.","publisher":{"@id":"https:\/\/any.run\/"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/any.run\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/any.run\/","name":"ANY.RUN","url":"https:\/\/any.run\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/any.run\/","url":"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg","contentUrl":"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg","width":1,"height":1,"caption":"ANY.RUN"},"image":{"@id":"https:\/\/any.run\/"},"sameAs":["https:\/\/www.facebook.com\/www.any.run\/","https:\/\/twitter.com\/anyrun_app","https:\/\/www.linkedin.com\/company\/30692044","https:\/\/www.youtube.com\/channel\/UCOgCPho7lzmH7m6fPNlukrQ"]},{"@type":"Person","@id":"https:\/\/any.run\/","name":"ANY.RUN","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/any.run\/","url":"https:\/\/secure.gravatar.com\/avatar\/c4ce3a6c672056b4a8cd6b0110782215?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/c4ce3a6c672056b4a8cd6b0110782215?s=96&d=mm&r=g","caption":"ANY.RUN"},"url":"https:\/\/any.run\/cybersecurity-blog\/author\/a-bespalova\/"}]}},"_links":{"self":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts\/11946"}],"collection":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/comments?post=11946"}],"version-history":[{"count":25,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts\/11946\/revisions"}],"predecessor-version":[{"id":11979,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts\/11946\/revisions\/11979"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/media\/7723"}],"wp:attachment":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/media?parent=11946"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/categories?post=11946"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/tags?post=11946"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}