{"id":12285,"date":"2025-03-20T08:35:32","date_gmt":"2025-03-20T08:35:32","guid":{"rendered":"\/cybersecurity-blog\/?p=12285"},"modified":"2025-07-14T06:17:35","modified_gmt":"2025-07-14T06:17:35","slug":"cybersecurity-excellence-awards-2025","status":"publish","type":"post","link":"https:\/\/any.run\/cybersecurity-blog\/cybersecurity-excellence-awards-2025\/","title":{"rendered":"TI Lookup Named Best Threat Intelligence Service at Cybersecurity Excellence Awards"},"content":{"rendered":"\n<p>It is with great pleasure and gratitude that we announce our victory at the <a href=\"https:\/\/cybersecurity-excellence-awards.com\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Cybersecurity Excellence Awards 2025<\/a>, an annual competition for individuals and companies that stand out in the field of information security held by a major online community Cybersecurity Insiders.&nbsp;<\/p>\n\n\n\n<p>Our service, <a href=\"https:\/\/any.run\/cybersecurity-blog\/how-threat-intelligence-lookup-helps-enterprises\/\" target=\"_blank\" rel=\"noreferrer noopener\">ANY.RUN Threat Intelligence Lookup<\/a>, was named best among leading threat intelligence solutions.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>About ANY.RUN TI Lookup<\/strong>&nbsp;<\/h2>\n\n\n\n<p><a href=\"https:\/\/intelligence.any.run\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=award_best_threat_intelligence&amp;utm_term=200325&amp;utm_content=linktolookup\" target=\"_blank\" rel=\"noreferrer noopener\">TI Lookup<\/a> is a contextual search service available online and through API. Its database contains all information on cyberthreats acquired by ANY.RUN. Users can browse it, analyze millions of public interactive analysis sessions, and gain insight on how to ensure a better security strategy for their company.&nbsp;<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"578\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2025\/03\/TI-lookup-1024x578.png\" alt=\"\" class=\"wp-image-12286\" style=\"width:650px;height:auto\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/03\/TI-lookup-1024x578.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/03\/TI-lookup-300x169.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/03\/TI-lookup-768x434.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/03\/TI-lookup-1536x867.png 1536w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/03\/TI-lookup-2048x1156.png 2048w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/03\/TI-lookup-370x209.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/03\/TI-lookup-270x152.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/03\/TI-lookup-740x418.png 740w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\"><em>Homepage of ANY.RUN Threat Intelligence Lookup&nbsp;<\/em><\/figcaption><\/figure><\/div>\n\n\n<!-- Regular Banner START -->\n<div class=\"regular-banner\">\n<!-- Text Content -->\n<p class=\"regular-banner__text\">\nEquip your team with critical threat intelligence to <span class=\"highlight\">keep your business secure<\/span>   \n<\/p>\n<!-- CTA Link -->\n<a class=\"regular-banner__link\" id=\"article-banner-regular\" href=\"https:\/\/any.run\/demo\/?utm_source=anyrunblog&#038;utm_medium=article&#038;utm_campaign=award_best_threat_intelligence&#038;utm_term=200325&#038;utm_content=linktodemo\" target=\"_blank\" rel=\"noopener\">\nSign up for ANY.RUN now\n<\/a>\n<\/div>\n<!-- Regular Banner END -->\n<!-- Regular Banner Styles START -->\n\n<style>\n.regular-banner {\ndisplay: flex;\ntext-align: center;\nflex-direction: column;\nalign-items: center;\ngap: 1.5rem;\nwidth: 100%;\npadding: 2rem;\nmargin: 1.5rem 0;\nborder-radius: 0.5rem;\nfont-family: 'Catamaran Bold';\nmargin-inline: auto;\nbackground: rgba(32, 168, 241, 0.1);\nborder: 1px solid rgba(75, 174, 227, 0.32);\n}\n\n.regular-banner__text {\nfont-size: 1.5rem;\nmargin: 0;\n}\n\n.highlight {\ncolor: #ea2526;\n}\n\n.regular-banner__link {\npadding: 0.5rem 1.5rem;\nfont-weight: 500;\ntext-decoration: none;\nborder-radius: 0.5rem;\ncolor: #FFFFFF;\nbackground-color: #1491D4;\ntext-align: center;\ntransition: all 0.2s ease-in;\n}\n\n.regular-banner__link:hover {\nbackground-color: #68CBFF;\ncolor: white;\n}\n<\/style>\n<!-- Regular Banner Styles END -->\n\n\n\n<p>Our achievement was made possible thanks to TI Lookup\u2019s unique features. This solution not only helps accelerate and simplify research, as well as gain access to up-to-date information on emerging threats, but also enhances the decision-making process and ensures the security of infrastructures in a resource-saving way.&nbsp;&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>In the words of organizers<\/strong>&nbsp;<\/h2>\n\n\n\n<p>Holger Schulze, founder of Cybersecurity Insiders and organizer of the Cybersecurity Excellence Awards, noted ANY.RUN\u2019s efforts in inspiring the community and providing top-tier solutions:&nbsp;<\/p>\n\n\n\n<p>\u201cWe congratulate ANY.RUN on this outstanding achievement in the \u2018Threat Intelligence\u2019 category of the 2025 Cybersecurity Excellence Awards. As we celebrate 10 years of recognizing excellence in cybersecurity, your innovation, commitment, and leadership set a powerful example for the entire industry.\u201d&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Our win is your win<\/strong>&nbsp;<\/h2>\n\n\n\n<p>We\u2019re happy to share the news with our wonderful audience and thank you for your never-ending support! The victory wouldn\u2019t be possible without our partners, users of ANY.RUN products, and the cybersecurity community in general.&nbsp;<\/p>\n\n\n\n<p>We\u2019ll continue to work towards our common goal of establishing a safe and efficient platform to benefit malware analysts from around the globe.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>About ANY.RUN<\/strong>&nbsp;<\/h2>\n\n\n\n<p><a href=\"https:\/\/any.run\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=award_best_threat_intelligence&amp;utm_term=200325&amp;utm_content=linktolanding\" target=\"_blank\" rel=\"noreferrer noopener\">ANY.RUN<\/a> provides cutting-edge malware analysis services for security teams: ANY.RUN sandbox, <a href=\"https:\/\/any.run\/cybersecurity-blog\/introducing-any-run-threat-intelligence-lookup\/\" target=\"_blank\" rel=\"noreferrer noopener\">TI Lookup<\/a> and <a href=\"https:\/\/any.run\/cybersecurity-blog\/threat-intelligence-feeds\/\" target=\"_blank\" rel=\"noreferrer noopener\">TI Feeds<\/a>. They help speed up the workflow of SOC specialists, prevent financial and reputational damage of businesses, as well as allow analysts to act proactively in order to ensure the security of their networks.&nbsp;<\/p>\n\n\n\n<p><a href=\"https:\/\/any.run\/demo\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=award_best_threat_intelligence&amp;utm_term=200325&amp;utm_content=linktodemo\" target=\"_blank\" rel=\"noreferrer noopener\">Request free trial of ANY.RUN\u2019s services \u2192<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>It is with great pleasure and gratitude that we announce our victory at the Cybersecurity Excellence Awards 2025, an annual competition for individuals and companies that stand out in the field of information security held by a major online community Cybersecurity Insiders.&nbsp; Our service, ANY.RUN Threat Intelligence Lookup, was named best among leading threat intelligence [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":12295,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[60],"tags":[57,10],"class_list":["post-12285","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news","tag-anyrun","tag-cybersecurity"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v20.10 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>ANY.RUN Wins at Cybersecurity Excellence Awards 2025<\/title>\n<meta name=\"description\" content=\"ANY.RUN wins Best Threat Intelligence Service at the Cybersecurity Excellence Awards 2025, recognizing its impact on real-time malware analysis.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/any.run\/cybersecurity-blog\/cybersecurity-excellence-awards-2025\/\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"y.shvetsov\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/cybersecurity-excellence-awards-2025\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/cybersecurity-excellence-awards-2025\/\"},\"author\":{\"name\":\"y.shvetsov\",\"@id\":\"https:\/\/any.run\/\"},\"headline\":\"TI Lookup Named Best Threat Intelligence Service at Cybersecurity Excellence Awards\",\"datePublished\":\"2025-03-20T08:35:32+00:00\",\"dateModified\":\"2025-07-14T06:17:35+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/cybersecurity-excellence-awards-2025\/\"},\"wordCount\":408,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/any.run\/\"},\"keywords\":[\"ANYRUN\",\"cybersecurity\"],\"articleSection\":[\"News\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/any.run\/cybersecurity-blog\/cybersecurity-excellence-awards-2025\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/cybersecurity-excellence-awards-2025\/\",\"url\":\"https:\/\/any.run\/cybersecurity-blog\/cybersecurity-excellence-awards-2025\/\",\"name\":\"ANY.RUN Wins at Cybersecurity Excellence Awards 2025\",\"isPartOf\":{\"@id\":\"https:\/\/any.run\/\"},\"datePublished\":\"2025-03-20T08:35:32+00:00\",\"dateModified\":\"2025-07-14T06:17:35+00:00\",\"description\":\"ANY.RUN wins Best Threat Intelligence Service at the Cybersecurity Excellence Awards 2025, recognizing its impact on real-time malware analysis.\",\"breadcrumb\":{\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/cybersecurity-excellence-awards-2025\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/any.run\/cybersecurity-blog\/cybersecurity-excellence-awards-2025\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/cybersecurity-excellence-awards-2025\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/any.run\/cybersecurity-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"News\",\"item\":\"https:\/\/any.run\/cybersecurity-blog\/category\/news\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"TI Lookup Named Best Threat Intelligence Service at Cybersecurity Excellence Awards\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/any.run\/\",\"url\":\"https:\/\/any.run\/\",\"name\":\"ANY.RUN&#039;s Cybersecurity Blog\",\"description\":\"Cybersecurity Blog covers topics for experienced professionals as well as for those new to it.\",\"publisher\":{\"@id\":\"https:\/\/any.run\/\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/any.run\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/any.run\/\",\"name\":\"ANY.RUN\",\"url\":\"https:\/\/any.run\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/any.run\/\",\"url\":\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg\",\"contentUrl\":\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg\",\"width\":1,\"height\":1,\"caption\":\"ANY.RUN\"},\"image\":{\"@id\":\"https:\/\/any.run\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/www.any.run\/\",\"https:\/\/twitter.com\/anyrun_app\",\"https:\/\/www.linkedin.com\/company\/30692044\",\"https:\/\/www.youtube.com\/channel\/UCOgCPho7lzmH7m6fPNlukrQ\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/any.run\/\",\"name\":\"y.shvetsov\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/any.run\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d0d0a5df59078efed19ba1b45c4fb721?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d0d0a5df59078efed19ba1b45c4fb721?s=96&d=mm&r=g\",\"caption\":\"y.shvetsov\"},\"url\":\"https:\/\/any.run\/cybersecurity-blog\/author\/y-shvetsov\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"ANY.RUN Wins at Cybersecurity Excellence Awards 2025","description":"ANY.RUN wins Best Threat Intelligence Service at the Cybersecurity Excellence Awards 2025, recognizing its impact on real-time malware analysis.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/any.run\/cybersecurity-blog\/cybersecurity-excellence-awards-2025\/","twitter_misc":{"Written by":"y.shvetsov","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/any.run\/cybersecurity-blog\/cybersecurity-excellence-awards-2025\/#article","isPartOf":{"@id":"https:\/\/any.run\/cybersecurity-blog\/cybersecurity-excellence-awards-2025\/"},"author":{"name":"y.shvetsov","@id":"https:\/\/any.run\/"},"headline":"TI Lookup Named Best Threat Intelligence Service at Cybersecurity Excellence Awards","datePublished":"2025-03-20T08:35:32+00:00","dateModified":"2025-07-14T06:17:35+00:00","mainEntityOfPage":{"@id":"https:\/\/any.run\/cybersecurity-blog\/cybersecurity-excellence-awards-2025\/"},"wordCount":408,"commentCount":0,"publisher":{"@id":"https:\/\/any.run\/"},"keywords":["ANYRUN","cybersecurity"],"articleSection":["News"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/any.run\/cybersecurity-blog\/cybersecurity-excellence-awards-2025\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/any.run\/cybersecurity-blog\/cybersecurity-excellence-awards-2025\/","url":"https:\/\/any.run\/cybersecurity-blog\/cybersecurity-excellence-awards-2025\/","name":"ANY.RUN Wins at Cybersecurity Excellence Awards 2025","isPartOf":{"@id":"https:\/\/any.run\/"},"datePublished":"2025-03-20T08:35:32+00:00","dateModified":"2025-07-14T06:17:35+00:00","description":"ANY.RUN wins Best Threat Intelligence Service at the Cybersecurity Excellence Awards 2025, recognizing its impact on real-time malware analysis.","breadcrumb":{"@id":"https:\/\/any.run\/cybersecurity-blog\/cybersecurity-excellence-awards-2025\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/any.run\/cybersecurity-blog\/cybersecurity-excellence-awards-2025\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/any.run\/cybersecurity-blog\/cybersecurity-excellence-awards-2025\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/any.run\/cybersecurity-blog\/"},{"@type":"ListItem","position":2,"name":"News","item":"https:\/\/any.run\/cybersecurity-blog\/category\/news\/"},{"@type":"ListItem","position":3,"name":"TI Lookup Named Best Threat Intelligence Service at Cybersecurity Excellence Awards"}]},{"@type":"WebSite","@id":"https:\/\/any.run\/","url":"https:\/\/any.run\/","name":"ANY.RUN&#039;s Cybersecurity Blog","description":"Cybersecurity Blog covers topics for experienced professionals as well as for those new to it.","publisher":{"@id":"https:\/\/any.run\/"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/any.run\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/any.run\/","name":"ANY.RUN","url":"https:\/\/any.run\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/any.run\/","url":"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg","contentUrl":"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg","width":1,"height":1,"caption":"ANY.RUN"},"image":{"@id":"https:\/\/any.run\/"},"sameAs":["https:\/\/www.facebook.com\/www.any.run\/","https:\/\/twitter.com\/anyrun_app","https:\/\/www.linkedin.com\/company\/30692044","https:\/\/www.youtube.com\/channel\/UCOgCPho7lzmH7m6fPNlukrQ"]},{"@type":"Person","@id":"https:\/\/any.run\/","name":"y.shvetsov","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/any.run\/","url":"https:\/\/secure.gravatar.com\/avatar\/d0d0a5df59078efed19ba1b45c4fb721?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d0d0a5df59078efed19ba1b45c4fb721?s=96&d=mm&r=g","caption":"y.shvetsov"},"url":"https:\/\/any.run\/cybersecurity-blog\/author\/y-shvetsov\/"}]}},"_links":{"self":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts\/12285"}],"collection":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/comments?post=12285"}],"version-history":[{"count":8,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts\/12285\/revisions"}],"predecessor-version":[{"id":14706,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts\/12285\/revisions\/14706"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/media\/12295"}],"wp:attachment":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/media?parent=12285"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/categories?post=12285"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/tags?post=12285"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}