{"id":13245,"date":"2025-04-30T11:07:47","date_gmt":"2025-04-30T11:07:47","guid":{"rendered":"\/cybersecurity-blog\/?p=13245"},"modified":"2025-04-30T12:56:49","modified_gmt":"2025-04-30T12:56:49","slug":"release-notes-april-2025","status":"publish","type":"post","link":"https:\/\/any.run\/cybersecurity-blog\/release-notes-april-2025\/","title":{"rendered":"Release Notes: SDK Integration, Notifications, 1,000+ Detection Rules, and APT Reports\u00a0"},"content":{"rendered":"\n<p>April was another busy month for the <a href=\"http:\/\/any.run\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release_notes_apr_25&amp;utm_term=300425&amp;utm_content=linktolanding\" target=\"_blank\" rel=\"noreferrer noopener\">ANY.RUN<\/a> team!&nbsp;<br>We continued improving our malware detection capabilities, expanded our behavior signatures, and sharpened threat intelligence, all to make your investigations faster, deeper, and even more precise.&nbsp;<\/p>\n\n\n\n<p>From adding fresh <a href=\"https:\/\/any.run\/cybersecurity-blog\/detection-with-suricata-ids\/\" target=\"_blank\" rel=\"noreferrer noopener\">Suricata rules<\/a> and <a href=\"https:\/\/any.run\/cybersecurity-blog\/yara-rules-explained\/\" target=\"_blank\" rel=\"noreferrer noopener\">YARA signatures<\/a> to detecting new malware behaviors, here\u2019s what\u2019s new at ANY.RUN this month.&nbsp;<\/p>\n\n\n\n<p>Let\u2019s dive in!&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Product Updates&nbsp;<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\">Integration of ANY.RUN Services with Your Security Systems via SDK&nbsp;<\/h3>\n\n\n\n<p>In April, we\u2019ve announced the release of the <a href=\"https:\/\/any.run\/cybersecurity-blog\/sdk-integration\/\" target=\"_blank\" rel=\"noreferrer noopener\">ANY.RUN SDK<\/a>, making it easier than ever to integrate our products directly into your infrastructure.&nbsp;<\/p>\n\n\n\n<p>Security teams can now automate submissions, accelerate workflows, and tailor ANY.RUN\u2019s solutions to fit their existing systems like SIEM, SOAR, or XDR.&nbsp;<br>This gives them faster investigations, fewer manual tasks, and more resources freed up for critical analysis.&nbsp;<\/p>\n\n\n\n<p>By integrating ANY.RUN\u2019s products into the security infrastructure via SDK, you can:&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Automatically submit files and URLs to the <a href=\"https:\/\/any.run\/cybersecurity-blog\/how-to-use-interactivity-in-a-malware-sandbox\/\" target=\"_blank\" rel=\"noreferrer noopener\">Interactive Sandbox<\/a>&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Search IOCs, IOBs, and IOAs across our threat database via <a href=\"https:\/\/any.run\/cybersecurity-blog\/introducing-any-run-threat-intelligence-lookup\/\" target=\"_blank\" rel=\"noreferrer noopener\">TI Lookup<\/a>&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Receive and process network-based IOCs with <a href=\"https:\/\/any.run\/cybersecurity-blog\/ti-feeds-integration\/\" target=\"_blank\" rel=\"noreferrer noopener\">TI Feeds<\/a>&nbsp;<\/li>\n<\/ul>\n\n\n\n<p>The SDK is available for users with the <a href=\"https:\/\/any.run\/cybersecurity-blog\/subscriptions-hunter-plan\/\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>Hunter<\/strong><\/a> and <a href=\"https:\/\/any.run\/cybersecurity-blog\/anyrun-enterprise-plan\/\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>Enterprise<\/strong><\/a> plans.&nbsp;<\/p>\n\n\n\n<p>With the help of this simple integration, we want to make sure that organizations reduce incident response time, improve detection rates, and build a stronger, more resilient security posture.&nbsp;<\/p>\n\n\n\n<p><strong>How to get started: <\/strong>The SDK is Python-based and includes documentation, libraries, and ready-to-use code samples. Find full instructions on <a href=\"https:\/\/github.com\/anyrun\/anyrun-python-sdk\" target=\"_blank\" rel=\"noreferrer noopener\">GitHub<\/a> and <a href=\"https:\/\/pypi.org\/project\/anyrun-sdk\/\" target=\"_blank\" rel=\"noreferrer noopener\">PyPI<\/a>.&nbsp;&nbsp;<\/p>\n\n\n\n<p>Contributions and suggestions from other developers are also welcome! For more info on how to contribute, see <a href=\"https:\/\/github.com\/anyrun\/anyrun-sdk\/blob\/main\/CONTRIBUTING.md\" target=\"_blank\" rel=\"noreferrer noopener\">our guide<\/a>.&nbsp;<\/p>\n\n\n\n<!-- Regular Banner START -->\n<div class=\"regular-banner\">\n<!-- Text Content -->\n<p class=\"regular-banner__text\">\nTest <span class=\"highlight\">ANY.RUN&#8217;s services<\/span> with 14-day trial<br>to see how they can strengthen your company&#8217;s security&nbsp;   \n<\/p>\n<!-- CTA Link -->\n<a class=\"regular-banner__link\" id=\"article-banner-regular\" href=\"https:\/\/any.run\/demo\/?utm_source=anyrunblog&#038;utm_medium=article&#038;utm_campaign=release_notes_apr_25&#038;utm_term=300425&#038;utm_content=linktodemo\" rel=\"noopener\" target=\"_blank\">\nGet 14-day trial\n<\/a>\n<\/div>\n<!-- Regular Banner END -->\n<!-- Regular Banner Styles START -->\n\n<style>\n.regular-banner {\ndisplay: flex;\ntext-align: center;\nflex-direction: column;\nalign-items: center;\ngap: 1.5rem;\nwidth: 100%;\npadding: 2rem;\nmargin: 1.5rem 0;\nborder-radius: 0.5rem;\nfont-family: 'Catamaran Bold';\nmargin-inline: auto;\nbackground: rgba(32, 168, 241, 0.1);\nborder: 1px solid rgba(75, 174, 227, 0.32);\n}\n\n.regular-banner__text {\nfont-size: 1.5rem;\nmargin: 0;\n}\n\n.highlight {\ncolor: #ea2526;\n}\n\n.regular-banner__link {\npadding: 0.5rem 1.5rem;\nfont-weight: 500;\ntext-decoration: none;\nborder-radius: 0.5rem;\ncolor: #FFFFFF;\nbackground-color: #1491D4;\ntext-align: center;\ntransition: all 0.2s ease-in;\n}\n\n.regular-banner__link:hover {\nbackground-color: #68CBFF;\ncolor: white;\n}\n<\/style>\n<!-- Regular Banner Styles END -->\n\n\n\n<h3 class=\"wp-block-heading\">Stay Informed with the New Notifications Window&nbsp;<\/h3>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"565\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2025\/04\/image-17-1024x565.png\" alt=\"\" class=\"wp-image-13255\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/04\/image-17-1024x565.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/04\/image-17-300x165.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/04\/image-17-768x423.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/04\/image-17-1536x847.png 1536w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/04\/image-17-2048x1129.png 2048w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/04\/image-17-370x204.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/04\/image-17-270x149.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/04\/image-17-740x408.png 740w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\"><em>New Notifications section displayed inside ANY.RUN<\/em>&nbsp;<\/figcaption><\/figure><\/div>\n\n\n<p>ANY.RUN users will now have access to Notifications directly from the platform interface.&nbsp;<\/p>\n\n\n\n<p>This section is built to keep you informed about the most important updates without cluttering your workflow.&nbsp;<\/p>\n\n\n\n<p>With quick access to key information, your security team can easily stay on top of new capabilities, detection improvements, and emerging threats.&nbsp;<\/p>\n\n\n\n<p>Notifications are short, clear, and actionable, so you can stay focused on your investigations while staying in the loop.&nbsp;<\/p>\n\n\n\n<p>Inside the Notifications section, you\u2019ll find:&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Key product updates and new feature announcements&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Alerts about critical service improvements&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Links to major research reports and threat analyses&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Important security advisories from our team&nbsp;<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">Threat Coverage Updates&nbsp;<\/h2>\n\n\n\n<p>In April, we expanded our detection coverage across Android, Windows, and Linux environments with updated rules, behavior signatures, and threat intelligence to support more precise, faster investigations.&nbsp;<\/p>\n\n\n\n<p>Here\u2019s a quick look at what\u2019s been updated:&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">New Suricata Rules&nbsp;<\/h3>\n\n\n\n<p>We added <strong>902 new Suricata rules<\/strong> in April to improve visibility into network-based threats, including malicious domains, phishing infrastructure, and C2 traffic.&nbsp;<\/p>\n\n\n\n<p>These updates enhance detection coverage for various malware families, including miners, stealers, and ransomware.&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Behavior Signatures&nbsp;<\/h3>\n\n\n\n<p>We introduced <strong>91 new behavior-based signatures<\/strong> to improve detection for malware samples across platforms. These updates include:&nbsp;<\/p>\n\n\n\n<p><strong>Android:<\/strong>&nbsp;<\/p>\n\n\n\n<div class=\"wp-block-group\"><div class=\"wp-block-group__inner-container is-layout-grid wp-container-core-group-is-layout-1 wp-block-group-is-layout-grid\">\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/app.any.run\/tasks\/f05ecd09-ac64-46d2-ab82-fd08bb6b51ee\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release_notes_apr_25&amp;utm_term=300425&amp;utm_content=linktoservice\" target=\"_blank\" rel=\"noreferrer noopener\">ANUBIS<\/a>&nbsp;&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/app.any.run\/tasks\/8989d031-6260-412e-aa19-30f1f87acfa9\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release_notes_apr_25&amp;utm_term=300425&amp;utm_content=linktoservice\" target=\"_blank\" rel=\"noreferrer noopener\">AUROTUN<\/a>&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/app.any.run\/tasks\/4bf33fc2-8bb9-47f6-b68e-9a530267ee1c\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release_notes_apr_25&amp;utm_term=300425&amp;utm_content=linktoservice\" target=\"_blank\" rel=\"noreferrer noopener\">BTMOB<\/a>&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/app.any.run\/tasks\/2f0eef30-a1ba-4c62-b0b9-62bab5a3df56\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release_notes_apr_25&amp;utm_term=300425&amp;utm_content=linktoservice\" target=\"_blank\" rel=\"noreferrer noopener\">COPYBARA<\/a>&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/app.any.run\/tasks\/960bba20-5e05-4eec-bef1-bfb99a1e2849\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release_notes_apr_25&amp;utm_term=300425&amp;utm_content=linktoservice\" target=\"_blank\" rel=\"noreferrer noopener\">GORILLA<\/a>&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/app.any.run\/tasks\/fe800ccb-fccc-42a6-a11d-a3d2b6e89edf\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release_notes_apr_25&amp;utm_term=300425&amp;utm_content=linktoservice\" target=\"_blank\" rel=\"noreferrer noopener\">SALVADOR<\/a>&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/app.any.run\/tasks\/ffb88753-9937-4f1d-ab48-6b4d57f2b49a\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release_notes_apr_25&amp;utm_term=300425&amp;utm_content=linktoservice\" target=\"_blank\" rel=\"noreferrer noopener\">XENOMORPH<\/a>&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>CHAMELEON&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>TGTOXIC&nbsp;<\/li>\n<\/ul>\n<\/div><\/div>\n\n\n\n<p><strong>Windows:<\/strong>&nbsp;<\/p>\n\n\n\n<div class=\"wp-block-group\"><div class=\"wp-block-group__inner-container is-layout-grid wp-container-core-group-is-layout-2 wp-block-group-is-layout-grid\">\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/app.any.run\/tasks\/e8e19d03-a001-4e60-bd03-a9f3886577b6\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release_notes_apr_25&amp;utm_term=300425&amp;utm_content=linktoservice\" target=\"_blank\" rel=\"noreferrer noopener\">GREMLIN<\/a>&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/app.any.run\/tasks\/871b7d6f-4908-45a1-baa2-b53e94c7a310\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release_notes_apr_25&amp;utm_term=300425&amp;utm_content=linktoservice\" target=\"_blank\" rel=\"noreferrer noopener\">OCTALYN<\/a>&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/app.any.run\/tasks\/be34cc19-787b-440c-955c-c34cc06631cb\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release_notes_apr_25&amp;utm_term=300425&amp;utm_content=linktoservice\" target=\"_blank\" rel=\"noreferrer noopener\">DUVETSTEALER<\/a>&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/app.any.run\/tasks\/85600451-90b1-400a-9eb9-5a3ac5cb06bc\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release_notes_apr_25&amp;utm_term=300425&amp;utm_content=linktoservice\" target=\"_blank\" rel=\"noreferrer noopener\">CHSTEALER<\/a>&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>SOSANO&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>HELLOKITTY&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/app.any.run\/tasks\/f5f35961-9e96-4a85-a6eb-1d3ee9905c47\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release_notes_apr_25&amp;utm_term=300425&amp;utm_content=linktoservice\" target=\"_blank\" rel=\"noreferrer noopener\">BRBOT<\/a>&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/app.any.run\/tasks\/d157389b-712d-4269-982d-e63509383626\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release_notes_apr_25&amp;utm_term=300425&amp;utm_content=linktoservice\" target=\"_blank\" rel=\"noreferrer noopener\">CRAZYHUNTER<\/a>&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/app.any.run\/tasks\/d6428642-c030-4590-ba15-e0959105da46\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release_notes_apr_25&amp;utm_term=300425&amp;utm_content=linktoservice\" target=\"_blank\" rel=\"noreferrer noopener\">STEALC<\/a>&nbsp;<\/li>\n<\/ul>\n<\/div><\/div>\n\n\n\n<p><strong>Linux:<\/strong>&nbsp;<\/p>\n\n\n\n<div class=\"wp-block-group\"><div class=\"wp-block-group__inner-container is-layout-grid wp-container-core-group-is-layout-3 wp-block-group-is-layout-grid\">\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/app.any.run\/tasks\/8b75f106-515d-4977-ab38-bb007d02a761\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release_notes_apr_25&amp;utm_term=300425&amp;utm_content=linktoservice\" target=\"_blank\" rel=\"noreferrer noopener\">OUTLAW<\/a>&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/app.any.run\/tasks\/eb783875-611a-48a2-bf9a-e1cfe190e126\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release_notes_apr_25&amp;utm_term=300425&amp;utm_content=linktoservice\" target=\"_blank\" rel=\"noreferrer noopener\">WOLFSBANE<\/a>&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>KAIJI&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/app.any.run\/tasks\/628612c5-6124-4090-ae43-dedd86569c81\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release_notes_apr_25&amp;utm_term=300425&amp;utm_content=linktoservice\" target=\"_blank\" rel=\"noreferrer noopener\">AUTOCOLOR<\/a>&nbsp;<\/li>\n<\/ul>\n<\/div><\/div>\n\n\n\n<p><strong>Vulnerability Exploits Tracked:<\/strong>&nbsp;<\/p>\n\n\n\n<p>In April, we observed active exploitation attempts involving two newly disclosed vulnerabilities:&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/app.any.run\/tasks\/01db8c78-cd34-4542-b403-f1d4d0241868\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release_notes_apr_25&amp;utm_term=300425&amp;utm_content=linktoservice\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>CVE-2025-0411<\/strong><\/a>&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/app.any.run\/tasks\/0b86d671-7848-468a-854f-864057ee792c\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release_notes_apr_25&amp;utm_term=300425&amp;utm_content=linktoservice\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>CVE-2025-24071<\/strong><\/a>&nbsp;<\/li>\n<\/ul>\n\n\n\n<p>These exploits were identified during real-world malware analysis sessions and are now reflected in our detection logic. ANY.RUN continues to monitor and analyze new CVEs to provide fast, actionable insights for defenders.&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">New YARA Rule Updates&nbsp;<\/h3>\n\n\n\n<p>We released <strong>13 new and updated YARA rules<\/strong> to improve static detection and classification, covering both new malware strains and updates to existing detections.&nbsp;<\/p>\n\n\n\n<p>New or updated rules include:&nbsp;<\/p>\n\n\n\n<div class=\"wp-block-group\"><div class=\"wp-block-group__inner-container is-layout-grid wp-container-core-group-is-layout-4 wp-block-group-is-layout-grid\">\n<ul class=\"wp-block-list\">\n<li>chstealer&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>octalyn&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>zerotrace&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>prysmax&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/app.any.run\/tasks\/5362cdde-ac0e-4054-88b4-ba0d09144dd1\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release_notes_apr_25&amp;utm_term=300425&amp;utm_content=linktoservice\" target=\"_blank\" rel=\"noreferrer noopener\">aurotun<\/a>&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/app.any.run\/tasks\/67e0a6ff-94fd-490a-a947-fb8bcbe5b328\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release_notes_apr_25&amp;utm_term=300425&amp;utm_content=linktoservice\" target=\"_blank\" rel=\"noreferrer noopener\">giftedcrook<\/a>&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/app.any.run\/tasks\/e2ee87c7-50a0-4d3f-a3a3-79bcfdd603df\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release_notes_apr_25&amp;utm_term=300425&amp;utm_content=linktoservice\" target=\"_blank\" rel=\"noreferrer noopener\">kalambur<\/a>&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/app.any.run\/tasks\/45436ea8-b5cb-45f2-a82e-b07808ac3a94\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release_notes_apr_25&amp;utm_term=300425&amp;utm_content=linktoservice\" target=\"_blank\" rel=\"noreferrer noopener\">hellokitty<\/a>&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/app.any.run\/tasks\/c95acc1f-69ae-432d-8120-9ce083bd143c\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release_notes_apr_25&amp;utm_term=300425&amp;utm_content=linktoservice\" target=\"_blank\" rel=\"noreferrer noopener\">fog<\/a>&nbsp;<\/li>\n<\/ul>\n<\/div><\/div>\n\n\n\n<p>Additionally, we added and updated detectors and extractors for:&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/app.any.run\/tasks\/5f0bc54b-4a1d-41f2-b315-2daa5fe33cf1\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release_notes_apr_25&amp;utm_term=300425&amp;utm_content=linktoservice\" target=\"_blank\" rel=\"noreferrer noopener\">Lumma Stealer<\/a>&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/app.any.run\/tasks\/c6cab32a-0f99-4bfc-a590-82f625ec8579\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release_notes_apr_25&amp;utm_term=300425&amp;utm_content=linktoservice\" target=\"_blank\" rel=\"noreferrer noopener\">StealC v2<\/a>&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Grandoreiro banking malware&nbsp;<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">New TI Reports Published&nbsp;<\/h2>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"596\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2025\/04\/image2-5-1024x596.png\" alt=\"\" class=\"wp-image-13257\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/04\/image2-5-1024x596.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/04\/image2-5-300x175.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/04\/image2-5-768x447.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/04\/image2-5-370x215.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/04\/image2-5-270x157.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/04\/image2-5-740x431.png 740w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/04\/image2-5.png 1484w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\"><em>TI Reports get you up to speed on the latest cyber threats targeting business<\/em>es&nbsp;<\/figcaption><\/figure><\/div>\n\n\n<p>In April, we added two new reports to our <a href=\"https:\/\/intelligence.any.run\/feeds\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release_notes_apr_25&amp;utm_term=300425&amp;utm_content=linktotireports\" target=\"_blank\" rel=\"noreferrer noopener\">Threat Intelligence library<\/a>, focused on <a href=\"https:\/\/any.run\/cybersecurity-blog\/track-advanced-persistent-threats\/\" target=\"_blank\" rel=\"noreferrer noopener\">advanced persistent threats<\/a> (APTs) and coordinated cybercriminal activity. <a href=\"https:\/\/any.run\/cybersecurity-blog\/threat-intelligence-reports\/\" target=\"_blank\" rel=\"noreferrer noopener\">These reports<\/a> provide fresh insights into recent campaigns, along with actionable tools to support threat hunting, attribution, and detection.&nbsp;<\/p>\n\n\n\n<p>Please note that the reports are available to TI Lookup\u2019s paid users. <a href=\"https:\/\/intelligence.any.run\/plans\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release_notes_apr_25&amp;utm_term=300425&amp;utm_content=linktotiplans\" target=\"_blank\" rel=\"noreferrer noopener\">Contact us to try TI Lookup for your SOC team<\/a>.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Threat Actors Activity Overview 01&nbsp;<\/h3>\n\n\n\n<p><a href=\"https:\/\/intelligence.any.run\/reports\/04-25-threat-actors-activity-overview-01\">This report<\/a> analyzes campaigns linked to <strong>APT37<\/strong>, <strong>EncryptHub<\/strong>, and <strong>STORM-1865, <\/strong>combining info from public research and ANY.RUN\u2019s own findings.\u00a0It includes:\u00a0<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>IOC lists and observed TTPs&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Related malware samples&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>TI Lookup queries and YARA rules&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Guidance for detecting similar threats in your environment&nbsp;<\/li>\n<\/ul>\n\n\n\n<p>This overview shows how threat actor activity is identified, analyzed, and traced using ANY.RUN\u2019s tools.&nbsp;<\/p>\n\n\n\n<!-- CTA Split START -->\n<div class=\"cta-split\">\n<div class=\"cta__split-left\">\n\n<!-- Image -->\n<img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/mcusercontent.com\/663b94f19348582a8dc323efe\/images\/0d88188b-3e89-2314-5a60-cb87e8077326.png\" alt=\"Enrich your threat knowledge with TI Lookup\" class=\"cta__split-icon\" \/>\n<\/div>\n\n<div class=\"cta__split-right\">\n<div>\n\n<!-- Heading -->\n<h3 class=\"cta__split-heading\"><br>Learn to Track Emerging Cyber Threats<\/h3>\n\n<!-- Text -->\n<p class=\"cta__split-text\">\nCheck out expert guide to collecting intelligence on emerging threats with <span class=\"highlight\">TI Lookup<\/span>\n\n<br \/>\n<\/p>\n<\/div>\n<!-- CTA Link -->\n<a target=\"_blank\" rel=\"noopener\" id=\"article-banner-split\" href=\"https:\/\/any.run\/cybersecurity-blog\/emerging-threats\/\"><div class=\"cta__split-link\">Read full guide<\/div><\/a>\n<\/div>\n<\/div>\n<!-- CTA Split END -->\n<!-- CTA Split Styles START -->\n<style>\n.cta-split {\noverflow: hidden;\nmargin: 3rem 0;\ndisplay: grid;\njustify-items: center;\nborder-radius: 0.5rem;\nwidth: 100%;\nmin-height: 25rem;\ngrid-template-columns: repeat(2, 1fr);\nborder: 1px solid rgba(75, 174, 227, 0.32);\nfont-family: 'Catamaran Bold';\n}\n\n.cta__split-left {\ndisplay: flex;\nalign-items: center;\njustify-content: center;\nheight: 100%;\nwidth: 100%;\nbackground-color: #161c59;\nbackground-position: center center;\nbackground: rgba(32, 168, 241, 0.1);\n}\n\n.cta__split-icon { \nwidth: 100%;\nheight: auto;\nobject-fit: contain;\nmax-width: 100%;\n}\n\n.cta__split-right {\ndisplay: flex;\nflex-direction: column;\njustify-content: space-between;\npadding: 2rem;\n}\n\n.cta__split-heading { font-size: 1.5rem; }\n\n.cta__split-text {\nmargin-top: 1rem;\nfont-family: Lato, Roboto, sans-serif;\n}\n\n.cta__split-link {\npadding: 0.5rem 1rem;\nfont-weight: 500;\ntext-decoration: none;\nborder-radius: 0.5rem;\ncolor: white;\nbackground-color: #1491D4;\ntext-align: center;\ntransition: all 0.2s ease-in;\ndisplay: block;\nz-index: 1000;\nposition: relative;\ncursor: pointer !important;\n}\n\n.cta__split-link:hover {\nbackground-color: #68CBFF;\ncolor: white;\ncursor: pointer;\n}\n\n.highlight { color: #ea2526;}\n\n\n\/* Mobile styles START *\/\n@media only screen and (max-width: 768px) {\n\n.cta-split {\ngrid-template-columns: 1fr;\nmin-height: auto;\n}\n\n.cta__split-left {\nheight: auto;\nmin-height: 10rem;\n}\n\n\n.cta__split-left, .cta__split-right {\nheight: auto;\n}\n\n.cta__split-heading { font-size: 1.2rem; }\n\n.cta__split-text { font-size: 1rem; }\n.cta__split-icon {\nmax-height: auto;\nobject-fit: cover;\n}\n\n}\n\/* Mobile styles END *\/\n<\/style>\n<!-- CTA Split Styles END -->\n\n\n\n<h3 class=\"wp-block-heading\">Threat Actors Activity Overview 02&nbsp;<\/h3>\n\n\n\n<p><a href=\"https:\/\/intelligence.any.run\/reports\/04-25-threat-actors-activity-overview-02\" target=\"_blank\" rel=\"noreferrer noopener\">This report<\/a> focuses on recent campaigns associated with <strong>PATCHWORK<\/strong> and <strong>APT29<\/strong>.\u00a0It provides:\u00a0<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>YARA rules and TI Lookup queries to support detection&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>IOC collections and sample analysis&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Adversary profiles and campaign behavior&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Technical breakdowns of malicious files&nbsp;<\/li>\n<\/ul>\n\n\n\n<p>The report is built to support threat hunters and analysts in tracking high-impact adversaries with greater precision.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">About ANY.RUN<\/h2>\n\n\n\n<p><a href=\"https:\/\/any.run\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release_notes_apr_25&amp;utm_term=300425&amp;utm_content=linktolanding\" target=\"_blank\" rel=\"noreferrer noopener\">ANY.RUN<\/a>&nbsp;supports over&nbsp;<a href=\"https:\/\/any.run\/cybersecurity-blog\/threat-intelligence-from-organizations\/\" target=\"_blank\" rel=\"noreferrer noopener\">15,000 organizations<\/a>&nbsp;across industries such as banking, manufacturing, telecommunications, healthcare, retail, and technology, helping them build stronger and more resilient cybersecurity operations. <\/p>\n\n\n\n<p>With our cloud-based Interactive Sandbox, security teams can safely analyze and understand threats targeting Windows, Linux, and Android environments in less than 40 seconds and without the need for complex on-premise systems. Combined with&nbsp;<a href=\"https:\/\/any.run\/cybersecurity-blog\/introducing-any-run-threat-intelligence-lookup\/\" target=\"_blank\" rel=\"noreferrer noopener\">TI Lookup<\/a>,&nbsp;<a href=\"https:\/\/any.run\/cybersecurity-blog\/yara-search\/\" target=\"_blank\" rel=\"noreferrer noopener\">YARA Search<\/a>, and&nbsp;<a href=\"https:\/\/any.run\/cybersecurity-blog\/threat-intelligence-feeds\/\" target=\"_blank\" rel=\"noreferrer noopener\">Feeds<\/a>, we equip businesses to speed up investigations, reduce security risks, and improve team\u2019s efficiency.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>April was another busy month for the ANY.RUN team!&nbsp;We continued improving our malware detection capabilities, expanded our behavior signatures, and sharpened threat intelligence, all to make your investigations faster, deeper, and even more precise.&nbsp; From adding fresh Suricata rules and YARA signatures to detecting new malware behaviors, here\u2019s what\u2019s new at ANY.RUN this month.&nbsp; Let\u2019s [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":7723,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[9],"tags":[57,10,55,56],"class_list":["post-13245","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-service-updates","tag-anyrun","tag-cybersecurity","tag-release","tag-update"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v20.10 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Release Notes: SDK, Notifications, Detection Rules, and more<\/title>\n<meta name=\"description\" content=\"Discover ANY.RUN&#039;s releases in April 2025, including SDK for seamless integrations, Notifications to help you get updates, and more.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/any.run\/cybersecurity-blog\/release-notes-april-2025\/\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"ANY.RUN\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/release-notes-april-2025\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/release-notes-april-2025\/\"},\"author\":{\"name\":\"ANY.RUN\",\"@id\":\"https:\/\/any.run\/\"},\"headline\":\"Release Notes: SDK Integration, Notifications, 1,000+ Detection Rules, and APT Reports\u00a0\",\"datePublished\":\"2025-04-30T11:07:47+00:00\",\"dateModified\":\"2025-04-30T12:56:49+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/release-notes-april-2025\/\"},\"wordCount\":1062,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/any.run\/\"},\"keywords\":[\"ANYRUN\",\"cybersecurity\",\"release\",\"update\"],\"articleSection\":[\"Service Updates\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/any.run\/cybersecurity-blog\/release-notes-april-2025\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/release-notes-april-2025\/\",\"url\":\"https:\/\/any.run\/cybersecurity-blog\/release-notes-april-2025\/\",\"name\":\"Release Notes: SDK, Notifications, Detection Rules, and more\",\"isPartOf\":{\"@id\":\"https:\/\/any.run\/\"},\"datePublished\":\"2025-04-30T11:07:47+00:00\",\"dateModified\":\"2025-04-30T12:56:49+00:00\",\"description\":\"Discover ANY.RUN's releases in April 2025, including SDK for seamless integrations, Notifications to help you get updates, and more.\",\"breadcrumb\":{\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/release-notes-april-2025\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/any.run\/cybersecurity-blog\/release-notes-april-2025\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/release-notes-april-2025\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/any.run\/cybersecurity-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Service Updates\",\"item\":\"https:\/\/any.run\/cybersecurity-blog\/category\/service-updates\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Release Notes: SDK Integration, Notifications, 1,000+ Detection Rules, and APT Reports\u00a0\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/any.run\/\",\"url\":\"https:\/\/any.run\/\",\"name\":\"ANY.RUN&#039;s Cybersecurity Blog\",\"description\":\"Cybersecurity Blog covers topics for experienced professionals as well as for those new to it.\",\"publisher\":{\"@id\":\"https:\/\/any.run\/\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/any.run\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/any.run\/\",\"name\":\"ANY.RUN\",\"url\":\"https:\/\/any.run\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/any.run\/\",\"url\":\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg\",\"contentUrl\":\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg\",\"width\":1,\"height\":1,\"caption\":\"ANY.RUN\"},\"image\":{\"@id\":\"https:\/\/any.run\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/www.any.run\/\",\"https:\/\/twitter.com\/anyrun_app\",\"https:\/\/www.linkedin.com\/company\/30692044\",\"https:\/\/www.youtube.com\/channel\/UCOgCPho7lzmH7m6fPNlukrQ\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/any.run\/\",\"name\":\"ANY.RUN\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/any.run\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/c4ce3a6c672056b4a8cd6b0110782215?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/c4ce3a6c672056b4a8cd6b0110782215?s=96&d=mm&r=g\",\"caption\":\"ANY.RUN\"},\"url\":\"https:\/\/any.run\/cybersecurity-blog\/author\/a-bespalova\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Release Notes: SDK, Notifications, Detection Rules, and more","description":"Discover ANY.RUN's releases in April 2025, including SDK for seamless integrations, Notifications to help you get updates, and more.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/any.run\/cybersecurity-blog\/release-notes-april-2025\/","twitter_misc":{"Written by":"ANY.RUN","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/any.run\/cybersecurity-blog\/release-notes-april-2025\/#article","isPartOf":{"@id":"https:\/\/any.run\/cybersecurity-blog\/release-notes-april-2025\/"},"author":{"name":"ANY.RUN","@id":"https:\/\/any.run\/"},"headline":"Release Notes: SDK Integration, Notifications, 1,000+ Detection Rules, and APT Reports\u00a0","datePublished":"2025-04-30T11:07:47+00:00","dateModified":"2025-04-30T12:56:49+00:00","mainEntityOfPage":{"@id":"https:\/\/any.run\/cybersecurity-blog\/release-notes-april-2025\/"},"wordCount":1062,"commentCount":0,"publisher":{"@id":"https:\/\/any.run\/"},"keywords":["ANYRUN","cybersecurity","release","update"],"articleSection":["Service Updates"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/any.run\/cybersecurity-blog\/release-notes-april-2025\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/any.run\/cybersecurity-blog\/release-notes-april-2025\/","url":"https:\/\/any.run\/cybersecurity-blog\/release-notes-april-2025\/","name":"Release Notes: SDK, Notifications, Detection Rules, and more","isPartOf":{"@id":"https:\/\/any.run\/"},"datePublished":"2025-04-30T11:07:47+00:00","dateModified":"2025-04-30T12:56:49+00:00","description":"Discover ANY.RUN's releases in April 2025, including SDK for seamless integrations, Notifications to help you get updates, and more.","breadcrumb":{"@id":"https:\/\/any.run\/cybersecurity-blog\/release-notes-april-2025\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/any.run\/cybersecurity-blog\/release-notes-april-2025\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/any.run\/cybersecurity-blog\/release-notes-april-2025\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/any.run\/cybersecurity-blog\/"},{"@type":"ListItem","position":2,"name":"Service Updates","item":"https:\/\/any.run\/cybersecurity-blog\/category\/service-updates\/"},{"@type":"ListItem","position":3,"name":"Release Notes: SDK Integration, Notifications, 1,000+ Detection Rules, and APT Reports\u00a0"}]},{"@type":"WebSite","@id":"https:\/\/any.run\/","url":"https:\/\/any.run\/","name":"ANY.RUN&#039;s Cybersecurity Blog","description":"Cybersecurity Blog covers topics for experienced professionals as well as for those new to it.","publisher":{"@id":"https:\/\/any.run\/"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/any.run\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/any.run\/","name":"ANY.RUN","url":"https:\/\/any.run\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/any.run\/","url":"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg","contentUrl":"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg","width":1,"height":1,"caption":"ANY.RUN"},"image":{"@id":"https:\/\/any.run\/"},"sameAs":["https:\/\/www.facebook.com\/www.any.run\/","https:\/\/twitter.com\/anyrun_app","https:\/\/www.linkedin.com\/company\/30692044","https:\/\/www.youtube.com\/channel\/UCOgCPho7lzmH7m6fPNlukrQ"]},{"@type":"Person","@id":"https:\/\/any.run\/","name":"ANY.RUN","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/any.run\/","url":"https:\/\/secure.gravatar.com\/avatar\/c4ce3a6c672056b4a8cd6b0110782215?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/c4ce3a6c672056b4a8cd6b0110782215?s=96&d=mm&r=g","caption":"ANY.RUN"},"url":"https:\/\/any.run\/cybersecurity-blog\/author\/a-bespalova\/"}]}},"_links":{"self":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts\/13245"}],"collection":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/comments?post=13245"}],"version-history":[{"count":17,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts\/13245\/revisions"}],"predecessor-version":[{"id":13265,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts\/13245\/revisions\/13265"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/media\/7723"}],"wp:attachment":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/media?parent=13245"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/categories?post=13245"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/tags?post=13245"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}