{"id":13576,"date":"2025-05-19T08:43:55","date_gmt":"2025-05-19T08:43:55","guid":{"rendered":"\/cybersecurity-blog\/?p=13576"},"modified":"2025-11-13T08:56:06","modified_gmt":"2025-11-13T08:56:06","slug":"any-runs-9th-cyberbirthday","status":"publish","type":"post","link":"https:\/\/any.run\/cybersecurity-blog\/any-runs-9th-cyberbirthday\/","title":{"rendered":"We\u2019re 9! Special Thanks (and Special Offers) Just for You"},"content":{"rendered":"\n<p>Time really flies. Nine years ago, we set out with a simple goal: to make malware analysis faster, easier, and more accessible for analysts and security teams everywhere.&nbsp;<\/p>\n\n\n\n<p>We started as a small group of researchers with a big idea. Today, <a href=\"http:\/\/any.run\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=9th_birthday&amp;utm_term=190525&amp;utm_content=linktolanding\" target=\"_blank\" rel=\"noreferrer noopener\">ANY.RUN<\/a> is trusted by over <a href=\"https:\/\/any.run\/cybersecurity-blog\/threat-intelligence-from-organizations\/\" target=\"_blank\" rel=\"noreferrer noopener\">15,000 companies<\/a> and half a million professionals around the world. And none of it would be possible without YOU.&nbsp;<a href=\"https:\/\/any.run\/demo\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=9th_birthday&amp;utm_term=190525&amp;utm_content=linktodemo\" target=\"_blank\" rel=\"noreferrer noopener\">Book a demo and explore all its advanced features<\/a>, we\u2019ll show you how it can support your security team, step by step.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Grab Your Offer Until May 31&nbsp;<\/h2>\n\n\n\n<p>From May 19 to May 31, 2025, we\u2019re celebrating with <a href=\"https:\/\/app.any.run\/plans\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=9th_birthday&amp;utm_term=190525&amp;utm_content=linktoplans\" target=\"_blank\" rel=\"noreferrer noopener\">exclusive birthday offers<\/a>, including bonus licenses, extended subscriptions, and special perks across our Interactive Sandbox and TI Lookup.<\/p>\n\n\n\n<p>Whether you\u2019re new to ANY.RUN or have been with us for years, this is our way of saying thank you. If you&#8217;ve been thinking about expanding your setup or trying out a new product, now\u2019s the perfect time to jump in!&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Interactive Sandbox Birthday Offers&nbsp;<\/h2>\n\n\n\n<p>Our <a href=\"https:\/\/any.run\/cybersecurity-blog\/interactive-malware-sandbox\/\" target=\"_blank\" rel=\"noreferrer noopener\">Interactive Sandbox<\/a> is where it all began and it&#8217;s still the go-to solution for fast, real-time malware analysis. Whether you&#8217;re a solo analyst, security manager, or SOC team lead, we\u2019ve crafted special birthday offers to help you get more features, privacy, and flexibility.&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Hunter Plan (For Individuals and Solo Analysts)&nbsp;<\/h3>\n\n\n\n<p>The <a href=\"https:\/\/any.run\/cybersecurity-blog\/subscriptions-hunter-plan\/\" target=\"_blank\" rel=\"noreferrer noopener\">Hunter plan<\/a> gives you full access to our cloud sandbox, including private mode, system process monitoring, residential proxy, and many other features that you need to work efficiently and confidently.&nbsp;<\/p>\n\n\n\n<p>If you\u2019ve been thinking about upgrading your current plan, returning after a pause, or getting Hunter access for the first time, this is your moment. &nbsp;<\/p>\n\n\n\n<!-- Regular Banner START -->\n<div class=\"regular-banner\">\n<!-- Text Content -->\n<p class=\"regular-banner__text\">\nCheck out Hunter plan special offer <br>to supercharge your <span class=\"highlight\">malware analysis<\/span> flow&nbsp;   \n<\/p>\n<!-- CTA Link -->\n<a class=\"regular-banner__link\" id=\"article-banner-regular\" href=\"https:\/\/app.any.run\/plans\/?utm_source=anyrunblog&#038;utm_medium=article&#038;utm_campaign=9th_birthday&#038;utm_term=190525&#038;utm_content=linktoplans\" rel=\"noopener\" target=\"_blank\">\nSee the offer\n<\/a>\n<\/div>\n<!-- Regular Banner END -->\n<!-- Regular Banner Styles START -->\n\n<style>\n.regular-banner {\ndisplay: flex;\ntext-align: center;\nflex-direction: column;\nalign-items: center;\ngap: 1.5rem;\nwidth: 100%;\npadding: 2rem;\nmargin: 1.5rem 0;\nborder-radius: 0.5rem;\nfont-family: 'Catamaran Bold';\nmargin-inline: auto;\nbackground: rgba(32, 168, 241, 0.1);\nborder: 1px solid rgba(75, 174, 227, 0.32);\n}\n\n.regular-banner__text {\nfont-size: 1.5rem;\nmargin: 0;\n}\n\n.highlight {\ncolor: #ea2526;\n}\n\n.regular-banner__link {\npadding: 0.5rem 1.5rem;\nfont-weight: 500;\ntext-decoration: none;\nborder-radius: 0.5rem;\ncolor: #FFFFFF;\nbackground-color: #1491D4;\ntext-align: center;\ntransition: all 0.2s ease-in;\n}\n\n.regular-banner__link:hover {\nbackground-color: #68CBFF;\ncolor: white;\n}\n<\/style>\n<!-- Regular Banner Styles END -->\n\n\n\n<h3 class=\"wp-block-heading\">Enterprise Plan (For Teams and Organizations)&nbsp;<\/h3>\n\n\n\n<p>Built for teams, the <a href=\"https:\/\/any.run\/cybersecurity-blog\/anyrun-enterprise-plan\/\" target=\"_blank\" rel=\"noreferrer noopener\">Enterprise plan<\/a> unlocks everything from seat management and SSO support to advanced privacy settings and productivity tracking. If your team works with sensitive samples or needs strict access control, this is the plan for you.&nbsp;<\/p>\n\n\n\n<p>With this year\u2019s Enterprise offer, we\u2019ve made it easy for you to scale up while saving more.&nbsp;<\/p>\n\n\n\n<!-- Regular Banner START -->\n<div class=\"regular-banner\">\n<!-- Text Content -->\n<p class=\"regular-banner__text\">\nCheck out Enterprise plan special offer <br>to level up your <span class=\"highlight\">teamwork and privacy<\/span>&nbsp;   \n<\/p>\n<!-- CTA Link -->\n<a class=\"regular-banner__link\" id=\"article-banner-regular\" href=\"https:\/\/app.any.run\/plans\/?utm_source=anyrunblog&#038;utm_medium=article&#038;utm_campaign=9th_birthday&#038;utm_term=190525&#038;utm_content=linktoplans\" rel=\"noopener\" target=\"_blank\">\nSee the offer\n<\/a>\n<\/div>\n<!-- Regular Banner END -->\n<!-- Regular Banner Styles START -->\n\n<style>\n.regular-banner {\ndisplay: flex;\ntext-align: center;\nflex-direction: column;\nalign-items: center;\ngap: 1.5rem;\nwidth: 100%;\npadding: 2rem;\nmargin: 1.5rem 0;\nborder-radius: 0.5rem;\nfont-family: 'Catamaran Bold';\nmargin-inline: auto;\nbackground: rgba(32, 168, 241, 0.1);\nborder: 1px solid rgba(75, 174, 227, 0.32);\n}\n\n.regular-banner__text {\nfont-size: 1.5rem;\nmargin: 0;\n}\n\n.highlight {\ncolor: #ea2526;\n}\n\n.regular-banner__link {\npadding: 0.5rem 1.5rem;\nfont-weight: 500;\ntext-decoration: none;\nborder-radius: 0.5rem;\ncolor: #FFFFFF;\nbackground-color: #1491D4;\ntext-align: center;\ntransition: all 0.2s ease-in;\n}\n\n.regular-banner__link:hover {\nbackground-color: #68CBFF;\ncolor: white;\n}\n<\/style>\n<!-- Regular Banner Styles END -->\n\n\n\n<h2 class=\"wp-block-heading\">TI Lookup Birthday Offer<\/h2>\n\n\n\n<p>Need fast answers about suspicious domains, IPs, hashes, URLs, and <a href=\"https:\/\/any.run\/cybersecurity-blog\/ti-lookup-search-parameters\/\" target=\"_blank\" rel=\"noreferrer noopener\">over 40 other Indicators<\/a> of Compromise (IOCs), Attack (IOAs), and Behavior (IOBs)? Use <a href=\"https:\/\/any.run\/cybersecurity-blog\/introducing-any-run-threat-intelligence-lookup\/\" target=\"_blank\" rel=\"noreferrer noopener\">Threat Intelligence Lookup<\/a> (TI Lookup). It helps analysts move quicker by giving instant context on thousands of indicators of compromise. It also includes <a href=\"https:\/\/any.run\/cybersecurity-blog\/threat-intelligence-reports\/\" target=\"_blank\" rel=\"noreferrer noopener\">detailed reports<\/a> on the latest APTs and threats from our analyst team.&nbsp;<\/p>\n\n\n\n<p>Whether you&#8217;re triaging alerts, investigating incidents, or just want to double-check a sample\u2019s reputation before launching a full sandbox run, TI Lookup helps you save time and act with confidence.&nbsp;<\/p>\n\n\n\n<p>And now, during our 9th birthday celebration, you can get even more value out of your TI Lookup plan.&nbsp;<\/p>\n\n\n\n<p>Buy a TI Lookup plan with 100\/300\/600\/1,000 or more requests and we\u2019ll double your request quota. That means you\u2019ll be able to conduct more investigations and collect tons of useful context on threats targeting your organization.&nbsp;<\/p>\n\n\n\n<!-- Regular Banner START -->\n<div class=\"regular-banner\">\n<!-- Text Content -->\n<p class=\"regular-banner__text\">\nDouble your TI Lookup search request quota <br>to <span class=\"highlight\">investigate more threats to your business<\/span>&nbsp;   \n<\/p>\n<!-- CTA Link -->\n<a class=\"regular-banner__link\" id=\"article-banner-regular\" href=\"https:\/\/intelligence.any.run\/plans?utm_source=anyrunblog&#038;utm_medium=article&#038;utm_campaign=9th_birthday&#038;utm_term=190525&#038;utm_content=linktotiplans\" rel=\"noopener\" target=\"_blank\">\nGet this offer\n<\/a>\n<\/div>\n<!-- Regular Banner END -->\n<!-- Regular Banner Styles START -->\n\n<style>\n.regular-banner {\ndisplay: flex;\ntext-align: center;\nflex-direction: column;\nalign-items: center;\ngap: 1.5rem;\nwidth: 100%;\npadding: 2rem;\nmargin: 1.5rem 0;\nborder-radius: 0.5rem;\nfont-family: 'Catamaran Bold';\nmargin-inline: auto;\nbackground: rgba(32, 168, 241, 0.1);\nborder: 1px solid rgba(75, 174, 227, 0.32);\n}\n\n.regular-banner__text {\nfont-size: 1.5rem;\nmargin: 0;\n}\n\n.highlight {\ncolor: #ea2526;\n}\n\n.regular-banner__link {\npadding: 0.5rem 1.5rem;\nfont-weight: 500;\ntext-decoration: none;\nborder-radius: 0.5rem;\ncolor: #FFFFFF;\nbackground-color: #1491D4;\ntext-align: center;\ntransition: all 0.2s ease-in;\n}\n\n.regular-banner__link:hover {\nbackground-color: #68CBFF;\ncolor: white;\n}\n<\/style>\n<!-- Regular Banner Styles END -->\n\n\n\n<h2 class=\"wp-block-heading\">About ANY.RUN&nbsp;<\/h2>\n\n\n\n<p><a href=\"http:\/\/any.run\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=9th_birthday&amp;utm_term=190525&amp;utm_content=linktolanding\" target=\"_blank\" rel=\"noreferrer noopener\">ANY.RUN<\/a> is a leading provider of interactive malware analysis and threat intelligence solutions, trusted by over 15,000 companies worldwide.&nbsp;<\/p>\n\n\n\n<p>Security teams, SOCs, and researchers use ANY.RUN to detect, investigate, and respond to cyber threats faster, with real-time sandboxing, deep visibility, and tools designed for collaboration and training.&nbsp;<\/p>\n\n\n\n<p>Here\u2019s how ANY.RUN helps teams every day:&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Fast, Interactive Malware Analysis<\/strong>: Analyze threats in real time across Windows, Linux, and Android environments. Get results in under 40 seconds, simulate user actions, and uncover full behavioral insights.&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Instant Threat Intelligence:<\/strong> Look up hashes, IPs, domains, and URLs in seconds. Backed by live sandbox data, TI Lookup delivers clear, context-rich insights fast.&nbsp;<\/li>\n\n\n\n<li><\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Flexible for Individuals and Teams<\/strong>: Whether you\u2019re flying solo or managing a large SOC, ANY.RUN adapts to your needs. Share tasks, manage access, and protect data with SSO, 2FA, and role-based controls.&nbsp;<\/li>\n<\/ul>\n\n\n\n<p><strong>Want to see everything ANY.RUN can offer?&nbsp;<\/strong><\/p>\n\n\n\n<p><a href=\"https:\/\/any.run\/demo\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=9th_birthday&amp;utm_term=190525&amp;utm_content=linktodemo\" target=\"_blank\" rel=\"noreferrer noopener\">Book a demo and explore all its advanced features<\/a>, we\u2019ll show you how it can support your security team, step by step.&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Time really flies. Nine years ago, we set out with a simple goal: to make malware analysis faster, easier, and more accessible for analysts and security teams everywhere.&nbsp; We started as a small group of researchers with a big idea. Today, ANY.RUN is trusted by over 15,000 companies and half a million professionals around the [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":13687,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[60],"tags":[57,10,55,56],"class_list":["post-13576","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news","tag-anyrun","tag-cybersecurity","tag-release","tag-update"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v20.10 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>We\u2019re 9! Special Thanks (and Special Offers) Just for You - ANY.RUN&#039;s Cybersecurity Blog<\/title>\n<meta name=\"description\" content=\"Celebrate ANY.RUN&#039;s 9th birthday with special offers to supercharge your SOC team&#039;s malware analysis and threat intelligence capabilities.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/any.run\/cybersecurity-blog\/any-runs-9th-cyberbirthday\/\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"y.shvetsov\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/any-runs-9th-cyberbirthday\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/any-runs-9th-cyberbirthday\/\"},\"author\":{\"name\":\"y.shvetsov\",\"@id\":\"https:\/\/any.run\/\"},\"headline\":\"We\u2019re 9! Special Thanks (and Special Offers) Just for You\",\"datePublished\":\"2025-05-19T08:43:55+00:00\",\"dateModified\":\"2025-11-13T08:56:06+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/any-runs-9th-cyberbirthday\/\"},\"wordCount\":756,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/any.run\/\"},\"keywords\":[\"ANYRUN\",\"cybersecurity\",\"release\",\"update\"],\"articleSection\":[\"News\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/any.run\/cybersecurity-blog\/any-runs-9th-cyberbirthday\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/any-runs-9th-cyberbirthday\/\",\"url\":\"https:\/\/any.run\/cybersecurity-blog\/any-runs-9th-cyberbirthday\/\",\"name\":\"We\u2019re 9! Special Thanks (and Special Offers) Just for You - ANY.RUN&#039;s Cybersecurity Blog\",\"isPartOf\":{\"@id\":\"https:\/\/any.run\/\"},\"datePublished\":\"2025-05-19T08:43:55+00:00\",\"dateModified\":\"2025-11-13T08:56:06+00:00\",\"description\":\"Celebrate ANY.RUN's 9th birthday with special offers to supercharge your SOC team's malware analysis and threat intelligence capabilities.\",\"breadcrumb\":{\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/any-runs-9th-cyberbirthday\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/any.run\/cybersecurity-blog\/any-runs-9th-cyberbirthday\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/any-runs-9th-cyberbirthday\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/any.run\/cybersecurity-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"News\",\"item\":\"https:\/\/any.run\/cybersecurity-blog\/category\/news\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"We\u2019re 9! Special Thanks (and Special Offers) Just for You\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/any.run\/\",\"url\":\"https:\/\/any.run\/\",\"name\":\"ANY.RUN&#039;s Cybersecurity Blog\",\"description\":\"Cybersecurity Blog covers topics for experienced professionals as well as for those new to it.\",\"publisher\":{\"@id\":\"https:\/\/any.run\/\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/any.run\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/any.run\/\",\"name\":\"ANY.RUN\",\"url\":\"https:\/\/any.run\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/any.run\/\",\"url\":\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg\",\"contentUrl\":\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg\",\"width\":1,\"height\":1,\"caption\":\"ANY.RUN\"},\"image\":{\"@id\":\"https:\/\/any.run\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/www.any.run\/\",\"https:\/\/twitter.com\/anyrun_app\",\"https:\/\/www.linkedin.com\/company\/30692044\",\"https:\/\/www.youtube.com\/channel\/UCOgCPho7lzmH7m6fPNlukrQ\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/any.run\/\",\"name\":\"y.shvetsov\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/any.run\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d0d0a5df59078efed19ba1b45c4fb721?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d0d0a5df59078efed19ba1b45c4fb721?s=96&d=mm&r=g\",\"caption\":\"y.shvetsov\"},\"url\":\"https:\/\/any.run\/cybersecurity-blog\/author\/y-shvetsov\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"We\u2019re 9! Special Thanks (and Special Offers) Just for You - ANY.RUN&#039;s Cybersecurity Blog","description":"Celebrate ANY.RUN's 9th birthday with special offers to supercharge your SOC team's malware analysis and threat intelligence capabilities.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/any.run\/cybersecurity-blog\/any-runs-9th-cyberbirthday\/","twitter_misc":{"Written by":"y.shvetsov","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/any.run\/cybersecurity-blog\/any-runs-9th-cyberbirthday\/#article","isPartOf":{"@id":"https:\/\/any.run\/cybersecurity-blog\/any-runs-9th-cyberbirthday\/"},"author":{"name":"y.shvetsov","@id":"https:\/\/any.run\/"},"headline":"We\u2019re 9! Special Thanks (and Special Offers) Just for You","datePublished":"2025-05-19T08:43:55+00:00","dateModified":"2025-11-13T08:56:06+00:00","mainEntityOfPage":{"@id":"https:\/\/any.run\/cybersecurity-blog\/any-runs-9th-cyberbirthday\/"},"wordCount":756,"commentCount":0,"publisher":{"@id":"https:\/\/any.run\/"},"keywords":["ANYRUN","cybersecurity","release","update"],"articleSection":["News"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/any.run\/cybersecurity-blog\/any-runs-9th-cyberbirthday\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/any.run\/cybersecurity-blog\/any-runs-9th-cyberbirthday\/","url":"https:\/\/any.run\/cybersecurity-blog\/any-runs-9th-cyberbirthday\/","name":"We\u2019re 9! Special Thanks (and Special Offers) Just for You - ANY.RUN&#039;s Cybersecurity Blog","isPartOf":{"@id":"https:\/\/any.run\/"},"datePublished":"2025-05-19T08:43:55+00:00","dateModified":"2025-11-13T08:56:06+00:00","description":"Celebrate ANY.RUN's 9th birthday with special offers to supercharge your SOC team's malware analysis and threat intelligence capabilities.","breadcrumb":{"@id":"https:\/\/any.run\/cybersecurity-blog\/any-runs-9th-cyberbirthday\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/any.run\/cybersecurity-blog\/any-runs-9th-cyberbirthday\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/any.run\/cybersecurity-blog\/any-runs-9th-cyberbirthday\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/any.run\/cybersecurity-blog\/"},{"@type":"ListItem","position":2,"name":"News","item":"https:\/\/any.run\/cybersecurity-blog\/category\/news\/"},{"@type":"ListItem","position":3,"name":"We\u2019re 9! Special Thanks (and Special Offers) Just for You"}]},{"@type":"WebSite","@id":"https:\/\/any.run\/","url":"https:\/\/any.run\/","name":"ANY.RUN&#039;s Cybersecurity Blog","description":"Cybersecurity Blog covers topics for experienced professionals as well as for those new to it.","publisher":{"@id":"https:\/\/any.run\/"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/any.run\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/any.run\/","name":"ANY.RUN","url":"https:\/\/any.run\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/any.run\/","url":"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg","contentUrl":"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg","width":1,"height":1,"caption":"ANY.RUN"},"image":{"@id":"https:\/\/any.run\/"},"sameAs":["https:\/\/www.facebook.com\/www.any.run\/","https:\/\/twitter.com\/anyrun_app","https:\/\/www.linkedin.com\/company\/30692044","https:\/\/www.youtube.com\/channel\/UCOgCPho7lzmH7m6fPNlukrQ"]},{"@type":"Person","@id":"https:\/\/any.run\/","name":"y.shvetsov","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/any.run\/","url":"https:\/\/secure.gravatar.com\/avatar\/d0d0a5df59078efed19ba1b45c4fb721?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d0d0a5df59078efed19ba1b45c4fb721?s=96&d=mm&r=g","caption":"y.shvetsov"},"url":"https:\/\/any.run\/cybersecurity-blog\/author\/y-shvetsov\/"}]}},"_links":{"self":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts\/13576"}],"collection":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/comments?post=13576"}],"version-history":[{"count":34,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts\/13576\/revisions"}],"predecessor-version":[{"id":16769,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts\/13576\/revisions\/16769"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/media\/13687"}],"wp:attachment":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/media?parent=13576"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/categories?post=13576"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/tags?post=13576"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}