{"id":14683,"date":"2025-07-09T11:53:52","date_gmt":"2025-07-09T11:53:52","guid":{"rendered":"\/cybersecurity-blog\/?p=14683"},"modified":"2025-07-09T11:53:53","modified_gmt":"2025-07-09T11:53:53","slug":"faster-alert-triage-with-ti-lookup","status":"publish","type":"post","link":"https:\/\/any.run\/cybersecurity-blog\/faster-alert-triage-with-ti-lookup\/","title":{"rendered":"How to Maintain Fast and Fatigue-Free Alert Triage with Threat Intelligence\u00a0"},"content":{"rendered":"\n<p>Alert triage as one of the critical SOC and MSSP workflows implies evaluating, prioritizing, and categorizing security alerts to determine which threats require immediate attention and which can be safely dismissed or handled through automated processes.&nbsp;<\/p>\n\n\n\n<p>Efficient alert triage, supported by robust threat intelligence, ensures that organizations stay ahead of adversaries while maintaining analyst productivity and morale. We shall see how it works on the example of ANY.RUN\u2019s <a href=\"https:\/\/intelligence.any.run\/analysis\/lookup\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=alert_triage_lookup&amp;utm_term=090725&amp;utm_content=linktotilookup\" target=\"_blank\" rel=\"noreferrer noopener\">Threat Intelligence Lookup<\/a>.&nbsp;&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Why Triage is the Key to Efficiency&nbsp;<\/h2>\n\n\n\n<p>For SOCs, triage ensures that internal teams focus on high-priority incidents that could compromise critical systems or data. <a href=\"https:\/\/any.run\/cybersecurity-blog\/expertware-success-story\/\" target=\"_blank\" rel=\"noreferrer noopener\">MSSPs<\/a>, managing multiple clients, rely on triage to allocate resources efficiently across diverse environments, ensuring timely responses tailored to each client\u2019s needs.&nbsp;&nbsp;<\/p>\n\n\n\n<p>The triage process acts as the gateway between detection and action \u2014 the critical juncture where security alerts either trigger appropriate defensive measures or fade into background noise.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Challenges and Problems of Alert Triage&nbsp;<\/h2>\n\n\n\n<p>Alert triage is fraught with challenges that compromise its effectiveness in many organizations.&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Alert Overload<\/strong>: Modern SOCs generate thousands to millions of alerts daily from tools like SIEMs, EDRs, and network monitoring systems. Analysts can only investigate a fraction of these, leading to potential oversight of critical threats.\u00a0<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>False Positives<\/strong>: Many alerts are benign or irrelevant, consuming valuable time and resources.\u00a0\u00a0<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Lack of Context<\/strong>: Alerts often require analysts to manually gather data from disparate sources, slowing down investigations and increasing the risk of errors.\u00a0<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Resource Constraints<\/strong>: Limited staffing and budget constraints stretch SOC teams thin, making it difficult to handle high alert volumes efficiently; the same goes for MSSPs managing multiple clients.\u00a0<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Evolving Threats<\/strong>: The complexity and variety of modern cyberattacks demand constant adaptation, challenging analysts to stay ahead with limited tools and time.\u00a0<\/li>\n<\/ul>\n\n\n\n<p>These obstacles create inefficiencies, delay responses, and increase organizational risk.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Speed as a Critical Key Performance Indicator<\/h2>\n\n\n\n<p>Speed in alert triage, measured by metrics like <a href=\"https:\/\/any.run\/cybersecurity-blog\/reduce-mttd-with-ti-feeds\/\" target=\"_blank\" rel=\"noreferrer noopener\">Mean Time to Detect (MTTD) and Mean Time to Respond (MTTR)<\/a>, is a critical KPI for SOCs and MSSPs. Rapid triage minimizes the window of opportunity for attackers, reducing potential damage from breaches, data loss, or system downtime. For businesses, fast triage aligns with key objectives:\u00a0<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Minimizing Financial Impact\u00a0<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Protecting Customer Trust\u00a0<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Operational Continuity\u00a0\u00a0<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Regulatory Compliance\u00a0<\/li>\n<\/ul>\n\n\n\n<p>Organizations with efficient triage processes can handle larger volumes of security data without proportionally increasing staff, improving operational efficiency and ROI on security investments. <\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Analyst Fatigue: The Hidden Threat to Security Effectiveness\u00a0<\/h2>\n\n\n\n<p>Analyst fatigue occurs when security professionals become mentally and emotionally exhausted from processing endless streams of alerts, many of which prove to be false positives or low-priority events.&nbsp;<\/p>\n\n\n\n<p>Cognitive overload increases when analysts must process more information than their mental capacity allows, leading to lower accuracy in threat assessment. Emotional exhaustion develops from the constant pressure of potentially missing critical threats, creating a state of chronic stress that affects both performance and well-being.&nbsp;<\/p>\n\n\n\n<p>The business impact is profound and multifaceted. Fatigued analysts are more likely to miss genuine threats, increasing the exposure to successful attacks. They may also escalate false positives to avoid responsibility. High fatigue levels contribute to analyst turnover, creating recruitment and training costs while leaving organizations vulnerable during transition periods.&nbsp;<\/p>\n\n\n\n<p>A negative feedback loop emerges where stressed analysts make more mistakes, leading to increased scrutiny and pressure, which further exacerbates fatigue. This cycle can devastate team morale.&nbsp;&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Balancing Speed and Accuracy: The Dual Challenge of Analyst Overload&nbsp;<\/h2>\n\n\n\n<p>The &#8220;need for speed&#8221; in alert triage is inseparable from the problem of analyst overload and fatigue. SOCs and MSSPs must analyze threats, incidents, and artifacts quickly to contain risks, but this analysis must be accurate and comprehensive to avoid missing critical threats or wasting resources on false positives.&nbsp;&nbsp;<\/p>\n\n\n\n<p>Solutions that streamline triage without sacrificing accuracy are essential for overcoming this paradox. You do not choose between speed and accuracy but develop systems and processes that enable both.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">ANY.RUN&#8217;s Threat Intelligence Lookup: A Comprehensive Solution<\/h2>\n\n\n\n<p>ANY.RUN&#8217;s <a href=\"https:\/\/intelligence.any.run\/analysis\/lookup\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=alert_triage_lookup&amp;utm_term=090725&amp;utm_content=linktotilookup\" target=\"_blank\" rel=\"noreferrer noopener\">Threat Intelligence Lookup<\/a> addresses both the speed and fatigue challenges by providing rapid, comprehensive threat context for indicators like files, URLs, domains, and IP addresses, and enabling teams to make informed decisions quickly. \u00a0<br>\u00a0<br>Besides basic IOCs, this data contains <a href=\"https:\/\/any.run\/cybersecurity-blog\/iocs-iobs-ioas-explained\/\" target=\"_blank\" rel=\"noreferrer noopener\">attack and behavioral indicators<\/a> including:\u00a0<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/any.run\/cybersecurity-blog\/how-to-spot-malware-registry-abuse\/\" target=\"_blank\" rel=\"noreferrer noopener\">registry changes<\/a>,\u00a0<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>file modifications,\u00a0<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>processes,\u00a0<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>network activity,\u00a0<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>TTPs mapped to the MITRE ATT&amp;CK Matrix,\u00a0<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>malware configurations, Suricata IDS signatures.\u00a0<\/li>\n<\/ul>\n\n\n\n<p>The data is derived from investigations of real-world cyberattacks on over 15,000 companies using ANY.RUN\u2019s services.&nbsp;&nbsp;&nbsp;<\/p>\n\n\n\n<p>When analysts encounter suspicious artifacts during triage, they can quickly query the service to obtain detailed information about the threat. This eliminates the time-consuming process of manually researching threats across multiple sources.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">TI Lookup Use Cases: Faster and Smarter Alert Triage<\/h2>\n\n\n\n<p>Instead of spending valuable time manually investigating suspicious artifacts, analysts can focus on higher-level analysis and decision-making. Here are a couple of examples.\u00a0\u00a0<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">1. Artifact Quick Check&nbsp;<\/h3>\n\n\n\n<p>A suspicious IP spotted in network connections can be checked against TI Lookup\u2019s vast indicator database in a matter of seconds.&nbsp;&nbsp;&nbsp;<\/p>\n\n\n\n<p><a href=\"https:\/\/intelligence.any.run\/analysis\/lookup\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=alert_triage_lookup&amp;utm_term=090725&amp;utm_content=linktotilookup#%7B%2522query%2522:%2522destinationIP:%255C%2522195.177.94.58%255C%2522%2522,%2522dateRange%2522:180%7D\" target=\"_blank\" rel=\"noreferrer noopener\">destinationIP:&#8221;195.177.94.58&#8243;<\/a>&nbsp;<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"594\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2025\/07\/image-4-1024x594.png\" alt=\"\" class=\"wp-image-14685\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/07\/image-4-1024x594.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/07\/image-4-300x174.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/07\/image-4-768x446.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/07\/image-4-370x215.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/07\/image-4-270x157.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/07\/image-4-740x429.png 740w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/07\/image-4.png 1475w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\"><em>IP search results with a <\/em>&#8220;<em>malicious<\/em>&#8220;<em> verdict<\/em>\u00a0<\/figcaption><\/figure><\/div>\n\n\n<p>The IP address is exposed as malicious and a part of <a href=\"https:\/\/any.run\/malware-trends\/quasar\/\" target=\"_blank\" rel=\"noreferrer noopener\">Quasar RAT<\/a> inventory. It has been detected in recent malware samples, so it is an indicator of an actual threat.&nbsp;&nbsp;&nbsp;<\/p>\n\n\n\n<!-- Regular Banner START -->\n<div class=\"regular-banner\">\n<!-- Text Content -->\n<p class=\"regular-banner__text\">\nGet 50 search requests to test <span class=\"highlight\">TI Lookup<\/span> in your SOC<br> Speed up triage and gain threat context for fast response&nbsp;   \n<\/p>\n<!-- CTA Link -->\n<a class=\"regular-banner__link\" id=\"article-banner-regular\" href=\"https:\/\/any.run\/demo\/?utm_source=anyrunblog&#038;utm_medium=article&#038;utm_campaign=alert_triage_lookup&#038;utm_term=090725&#038;utm_content=linktodemo\" target=\"_blank\" rel=\"noopener\">\nRequest trial\n<\/a>\n<\/div>\n<!-- Regular Banner END -->\n<!-- Regular Banner Styles START -->\n\n<style>\n.regular-banner {\ndisplay: flex;\ntext-align: center;\nflex-direction: column;\nalign-items: center;\ngap: 1.5rem;\nwidth: 100%;\npadding: 2rem;\nmargin: 1.5rem 0;\nborder-radius: 0.5rem;\nfont-family: 'Catamaran Bold';\nmargin-inline: auto;\nbackground: rgba(32, 168, 241, 0.1);\nborder: 1px solid rgba(75, 174, 227, 0.32);\n}\n\n.regular-banner__text {\nfont-size: 1.5rem;\nmargin: 0;\n}\n\n.highlight {\ncolor: #ea2526;\n}\n\n.regular-banner__link {\npadding: 0.5rem 1.5rem;\nfont-weight: 500;\ntext-decoration: none;\nborder-radius: 0.5rem;\ncolor: #FFFFFF;\nbackground-color: #1491D4;\ntext-align: center;\ntransition: all 0.2s ease-in;\n}\n\n.regular-banner__link:hover {\nbackground-color: #68CBFF;\ncolor: white;\n}\n<\/style>\n<!-- Regular Banner Styles END -->\n\n\n\n<h3 class=\"wp-block-heading\">2. Process Investigation&nbsp;<\/h3>\n\n\n\n<p>Suppose an analyst notices a legitimate utility like certutil.exe is used for retrieving content from an external URL. All they have to do is copy a snippet of command line contents and paste it into TI Lookup search bar with the CommandLine search parameter:&nbsp;&nbsp;<\/p>\n\n\n\n<p><a href=\"https:\/\/intelligence.any.run\/analysis\/lookup\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=alert_triage_lookup&amp;utm_term=090725&amp;utm_content=linktotilookup#{%22query%22:%22commandLine:%5C%22*certutil.exe%20-urlcache%20-split%20-f%20http*%5C%22%22,%22dateRange%22:180}\" target=\"_blank\" rel=\"noreferrer noopener\">commandLine:&#8221;certutil.exe -urlcache -split -f http&#8221;<\/a>&nbsp;<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"604\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2025\/07\/image2-2-1024x604.png\" alt=\"\" class=\"wp-image-14686\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/07\/image2-2-1024x604.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/07\/image2-2-300x177.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/07\/image2-2-768x453.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/07\/image2-2-370x218.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/07\/image2-2-270x159.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/07\/image2-2-740x436.png 740w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/07\/image2-2.png 1459w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\"><em>Lookup by a fragment of a command line command<\/em>\u00a0<\/figcaption><\/figure><\/div>\n\n\n<p>Switching to the Analyses tab of the search results, the analyst observes a selection of malware samples that performed this command during their execution chain. Now he knows that this behavior is typical for <a href=\"https:\/\/any.run\/malware-trends\/glupteba\/\" target=\"_blank\" rel=\"noreferrer noopener\">Glupteba<\/a> trojan acting as a <a href=\"https:\/\/any.run\/malware-trends\/loader\/\" target=\"_blank\" rel=\"noreferrer noopener\">loader<\/a>. Each sample analysis can be researched in depth and used for collecting IOCs.&nbsp;&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">3. Registry Change Understanding&nbsp;<\/h3>\n\n\n\n<p>Could it be okay if an app changes Windows registry key \\\\CurrentVersion\\\\Run responsible for default autoruns at system startup, by adding a command that initiates a script execution chain via mshta.exe <a href=\"https:\/\/any.run\/cybersecurity-blog\/malicious-scripts\/\" target=\"_blank\" rel=\"noreferrer noopener\">using built-in VBScript<\/a>? Query TI Lookup using RegistryKey and RegistryValue search parameters:&nbsp;&nbsp;<\/p>\n\n\n\n<p><a href=\"https:\/\/intelligence.any.run\/analysis\/lookup\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=alert_triage_lookup&amp;utm_term=090725&amp;utm_content=linktotilookup#%7B%2522query%2522:%2522registryKey:%255C%2522*SOFTWARE%255C%255C%255C%255CMicrosoft%255C%255C%255C%255CWindows%255C%255C%255C%255CCurrentVersion%255C%255C%255C%255CRun%255C%2522%2520AND%2520registryValue:%255C%2522*mshta*vbscript*%255C%2522%2522,%2522dateRange%2522:180%7D\" target=\"_blank\" rel=\"noreferrer noopener\">registryKey:&#8221;SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Run&#8221; AND registryValue:&#8221;mshtavbscript&#8221;<\/a>&nbsp;<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"606\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2025\/07\/image3-1-1024x606.png\" alt=\"\" class=\"wp-image-14688\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/07\/image3-1-1024x606.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/07\/image3-1-300x177.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/07\/image3-1-768x454.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/07\/image3-1-370x219.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/07\/image3-1-270x160.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/07\/image3-1-740x438.png 740w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/07\/image3-1.png 1327w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\"><em>Malware samples that change Windows registry in a certain way<\/em>\u00a0<\/figcaption><\/figure><\/div>\n\n\n<p>As we can notice looking at the found sandbox analyses, such <a href=\"https:\/\/any.run\/cybersecurity-blog\/how-to-spot-malware-registry-abuse\/\" target=\"_blank\" rel=\"noreferrer noopener\">registry<\/a> modification is often associated with malware <a href=\"https:\/\/any.run\/cybersecurity-blog\/five-common-malware-evasion-techniques\/\" target=\"_blank\" rel=\"noreferrer noopener\">evasion<\/a> and <a href=\"https:\/\/any.run\/cybersecurity-blog\/6-persistence-mechanisms-in-malware\/\" target=\"_blank\" rel=\"noreferrer noopener\">persistence<\/a> techniques, and <a href=\"https:\/\/any.run\/malware-trends\/xworm\/\" target=\"_blank\" rel=\"noreferrer noopener\">is typical for XWorm<\/a> RAT.&nbsp;&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">4. Mutex detection&nbsp;<\/h3>\n\n\n\n<p>When a new malware emerges, the available intelligence on it can be scarce. <a href=\"https:\/\/any.run\/cybersecurity-blog\/nitrogen-ransomware-report\/\" target=\"_blank\" rel=\"noreferrer noopener\">Nitrogen <\/a>ransomware became notorious for targeting the valuable and vulnerable financial sector back in mid-2024. For months, a single research report was the source of public data on this strain. It provided analysts with two IOCs and two IOBs, one of the formers was a mutex.&nbsp;&nbsp;<\/p>\n\n\n\n<p>Before encrypting files, Nitrogen creates a unique mutex (nvxkjcv7yxctvgsdfjhv6esdvsx) to ensure only one instance of the ransomware runs at a time. The mutex can be used for Nitrogen detection, and searching for it via Threat Intelligence Lookup delivers Nitrogen samples detonated in the Interactive Sandbox.&nbsp;&nbsp;<\/p>\n\n\n\n<p><a href=\"https:\/\/intelligence.any.run\/analysis\/lookup\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=alert_triage_lookup&amp;utm_term=090725&amp;utm_content=linktotilookup#%7B%2522query%2522:%2522syncObjectName:%255C%2522nvxkjcv7yxctvgsdfjhv6esdvsx%255C%2522%2522,%2522dateRange%2522:180%7D\" target=\"_blank\" rel=\"noreferrer noopener\">syncObjectName:&#8221;nvxkjcv7yxctvgsdfjhv6esdvsx&#8221;<\/a>&nbsp;<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"579\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2025\/07\/image4-1-1024x579.png\" alt=\"\" class=\"wp-image-14689\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/07\/image4-1-1024x579.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/07\/image4-1-300x169.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/07\/image4-1-768x434.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/07\/image4-1-370x209.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/07\/image4-1-270x153.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/07\/image4-1-740x418.png 740w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/07\/image4-1.png 1324w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\"><em>SyncObject parameters in TI Lookup help to work with mutexes<\/em>\u00a0\u00a0<\/figcaption><\/figure><\/div>\n\n\n<p>Each sample can be explored to enrich the understanding of the threat and gather additional indicators not featured in public research.&nbsp;<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"537\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2025\/07\/image5-1024x537.png\" alt=\"\" class=\"wp-image-14690\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/07\/image5-1024x537.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/07\/image5-300x157.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/07\/image5-768x402.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/07\/image5-1536x805.png 1536w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/07\/image5-370x194.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/07\/image5-270x141.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/07\/image5-740x388.png 740w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/07\/image5.png 1767w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\"><em>Nitrogen sample analysis: ransom note and one of the main processes<\/em>\u00a0<\/figcaption><\/figure><\/div>\n\n\n<h3 class=\"wp-block-heading\">5. Payload recognition&nbsp;<\/h3>\n\n\n\n<p>File hashes as unique digital fingerprints of a particular file are popular indicators of compromise. TI Lookup supports md5, sha256 and sha1 search parameters, but also allows to use a file name as a query.&nbsp;<\/p>\n\n\n\n<p><a href=\"https:\/\/intelligence.any.run\/analysis\/lookup\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=alert_triage_lookup&amp;utm_term=090725&amp;utm_content=linktotilookup#%7B%2522query%2522:%2522filePath:%255C%2522Electronic_Receipt_ATT0001%255C%2522%2522,%2522dateRange%2522:180%7D\" target=\"_blank\" rel=\"noreferrer noopener\">filePath:&#8221;Electronic_Receipt_ATT0001&#8243;<\/a>&nbsp;<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"549\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2025\/07\/image6-1024x549.png\" alt=\"\" class=\"wp-image-14691\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/07\/image6-1024x549.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/07\/image6-300x161.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/07\/image6-768x412.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/07\/image6-370x198.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/07\/image6-270x145.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/07\/image6-740x397.png 740w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/07\/image6.png 1336w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\"><em>File search results: not always malicious but not to be trusted<\/em>\u00a0<\/figcaption><\/figure><\/div>\n\n\n<p>These lookup results show that a certain file name pattern can emerge in both malicious and benign samples: <a href=\"https:\/\/any.run\/malware-trends\/phishingkit\/\" target=\"_blank\" rel=\"noreferrer noopener\">phishing kit<\/a> campaigns often use filenames typical for popular documentation formats.&nbsp;<\/p>\n\n\n\n<p>We can observe several samples of phishing attacks using the file with such name pattern in the Interactive Sandbox:&nbsp;&nbsp;<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"509\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2025\/07\/image7-1024x509.png\" alt=\"\" class=\"wp-image-14692\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/07\/image7-1024x509.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/07\/image7-300x149.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/07\/image7-768x381.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/07\/image7-1536x763.png 1536w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/07\/image7-370x184.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/07\/image7-270x134.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/07\/image7-740x367.png 740w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/07\/image7.png 1774w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\"><em>A phishing sample analysis<\/em>\u00a0<\/figcaption><\/figure><\/div>\n\n\n<p><br>File name search can help understand the general mechanics of phishkit attacks and see a broader picture of emerging threats.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Fast, Fatigue-Free Alert Triage with Threat Intelligence\u00a0<\/h2>\n\n\n\n<p>It\u2019s up to you not to choose between speed and accuracy, nor to accept analyst fatigue as an unavoidable cost of doing business. Instead, embrace solutions that enable both rapid response and meticulous analysis.&nbsp;<\/p>\n\n\n\n<p>ANY.RUN&#8217;s Threat Intelligence Lookup fuels this strategy by providing immediate, context-rich insights into suspicious artifacts and transforming reactive, manual investigations into proactive, informed decision-making. This translates into tangible business values:&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Enhanced Operational Efficiency<\/strong>: Teams can process a higher volume of alerts with existing staff, optimizing the return on investment in security tools and personnel.\u00a0<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Reduced Organizational Risk<\/strong>: Faster and more accurate identification of genuine threats minimizes the window of opportunity for attackers, thereby reducing the likelihood of successful breaches, data loss, and system downtime.\u00a0\u00a0\u00a0<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Improved Analyst Productivity and Morale<\/strong>: Automating the initial stages of threat intelligence gathering frees analysts from repetitive, cognitively taxing tasks.\u00a0\u00a0<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Preserved Customer Trust and Brand Reputation<\/strong>: Swift and effective handling of security incidents demonstrates a commitment to protecting sensitive data and maintaining operational integrity.\u00a0<\/li>\n<\/ul>\n\n\n\n<p>Investing in solutions like ANY.RUN&#8217;s Threat Intelligence Lookup is not just about technology; it&#8217;s about building a sustainable and resilient security posture that protects an organization&#8217;s financial health, its most valuable assets, and its people.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">About ANY.RUN&nbsp;&nbsp;<\/h2>\n\n\n\n<p>Over 500,000 cybersecurity professionals and 15,000+ companies in finance, manufacturing, healthcare, and other sectors rely on <a href=\"https:\/\/any.run\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=alert_triage_lookup&amp;utm_term=090725&amp;utm_content=linktolanding\" target=\"_blank\" rel=\"noreferrer noopener\">ANY.RUN<\/a>. Our services streamline malware and phishing investigations for organizations worldwide.&nbsp;&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Speed up triage and response: <\/strong>Detonate suspicious files using ANY.RUN\u2019s <a href=\"https:\/\/app.any.run\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=alert_triage_lookup&amp;utm_term=090725&amp;utm_content=linktoregistration#register\/\" target=\"_blank\" rel=\"noreferrer noopener\">Interactive Sandbox<\/a> to observe malicious behavior in real time and collect insights for faster and more confident security decisions.\u00a0\u00a0<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Improve threat detection: <\/strong>ANY.RUN\u2019s <a href=\"https:\/\/any.run\/threat-intelligence-lookup\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=devman_analysis&amp;utm_term=010725&amp;utm_content=linktotilookuplanding\" target=\"_blank\" rel=\"noreferrer noopener\">Threat Intelligence Lookup<\/a> and <a href=\"https:\/\/intelligence.any.run\/feeds\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=alert_triage_lookup&amp;utm_term=090725&amp;utm_content=linktotifeeds\" target=\"_blank\" rel=\"noreferrer noopener\">TI Feeds<\/a> provide actionable insights into cyber attacks, improving detection and deepening understanding of evolving threats.\u00a0<\/li>\n<\/ul>\n\n\n\n<p><a href=\"https:\/\/any.run\/demo\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=alert_triage_lookup&amp;utm_term=090725&amp;utm_content=linktodemo\" target=\"_blank\" rel=\"noreferrer noopener\">Start 14-day trial of ANY.RUN\u2019s solutions in your SOC today<\/a>&nbsp;<\/p>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Alert triage as one of the critical SOC and MSSP workflows implies evaluating, prioritizing, and categorizing security alerts to determine which threats require immediate attention and which can be safely dismissed or handled through automated processes.&nbsp; Efficient alert triage, supported by robust threat intelligence, ensures that organizations stay ahead of adversaries while maintaining analyst productivity [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":14694,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4],"tags":[57,10,75],"class_list":["post-14683","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-lifehacks","tag-anyrun","tag-cybersecurity","tag-cybersecurity-lifehacks"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v20.10 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>How to Maintain Fast and Fatigue-Free Alert Triage with Threat Intelligence\u00a0 - ANY.RUN&#039;s Cybersecurity Blog<\/title>\n<meta name=\"description\" content=\"Check out our actionable tips for streamlining alert triage and Improving MTTD in your SOC with real-world examples.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/any.run\/cybersecurity-blog\/faster-alert-triage-with-ti-lookup\/\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"ANY.RUN\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"9 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/faster-alert-triage-with-ti-lookup\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/faster-alert-triage-with-ti-lookup\/\"},\"author\":{\"name\":\"ANY.RUN\",\"@id\":\"https:\/\/any.run\/\"},\"headline\":\"How to Maintain Fast and Fatigue-Free Alert Triage with Threat Intelligence\u00a0\",\"datePublished\":\"2025-07-09T11:53:52+00:00\",\"dateModified\":\"2025-07-09T11:53:53+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/faster-alert-triage-with-ti-lookup\/\"},\"wordCount\":1755,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/any.run\/\"},\"keywords\":[\"ANYRUN\",\"cybersecurity\",\"cybersecurity lifehacks\"],\"articleSection\":[\"Cybersecurity Lifehacks\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/any.run\/cybersecurity-blog\/faster-alert-triage-with-ti-lookup\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/faster-alert-triage-with-ti-lookup\/\",\"url\":\"https:\/\/any.run\/cybersecurity-blog\/faster-alert-triage-with-ti-lookup\/\",\"name\":\"How to Maintain Fast and Fatigue-Free Alert Triage with Threat Intelligence\u00a0 - ANY.RUN&#039;s Cybersecurity Blog\",\"isPartOf\":{\"@id\":\"https:\/\/any.run\/\"},\"datePublished\":\"2025-07-09T11:53:52+00:00\",\"dateModified\":\"2025-07-09T11:53:53+00:00\",\"description\":\"Check out our actionable tips for streamlining alert triage and Improving MTTD in your SOC with real-world examples.\",\"breadcrumb\":{\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/faster-alert-triage-with-ti-lookup\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/any.run\/cybersecurity-blog\/faster-alert-triage-with-ti-lookup\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/faster-alert-triage-with-ti-lookup\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/any.run\/cybersecurity-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity Lifehacks\",\"item\":\"https:\/\/any.run\/cybersecurity-blog\/category\/lifehacks\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"How to Maintain Fast and Fatigue-Free Alert Triage with Threat Intelligence\u00a0\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/any.run\/\",\"url\":\"https:\/\/any.run\/\",\"name\":\"ANY.RUN&#039;s Cybersecurity Blog\",\"description\":\"Cybersecurity Blog covers topics for experienced professionals as well as for those new to it.\",\"publisher\":{\"@id\":\"https:\/\/any.run\/\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/any.run\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/any.run\/\",\"name\":\"ANY.RUN\",\"url\":\"https:\/\/any.run\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/any.run\/\",\"url\":\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg\",\"contentUrl\":\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg\",\"width\":1,\"height\":1,\"caption\":\"ANY.RUN\"},\"image\":{\"@id\":\"https:\/\/any.run\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/www.any.run\/\",\"https:\/\/twitter.com\/anyrun_app\",\"https:\/\/www.linkedin.com\/company\/30692044\",\"https:\/\/www.youtube.com\/channel\/UCOgCPho7lzmH7m6fPNlukrQ\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/any.run\/\",\"name\":\"ANY.RUN\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/any.run\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/c4ce3a6c672056b4a8cd6b0110782215?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/c4ce3a6c672056b4a8cd6b0110782215?s=96&d=mm&r=g\",\"caption\":\"ANY.RUN\"},\"url\":\"https:\/\/any.run\/cybersecurity-blog\/author\/a-bespalova\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How to Maintain Fast and Fatigue-Free Alert Triage with Threat Intelligence\u00a0 - ANY.RUN&#039;s Cybersecurity Blog","description":"Check out our actionable tips for streamlining alert triage and Improving MTTD in your SOC with real-world examples.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/any.run\/cybersecurity-blog\/faster-alert-triage-with-ti-lookup\/","twitter_misc":{"Written by":"ANY.RUN","Est. reading time":"9 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/any.run\/cybersecurity-blog\/faster-alert-triage-with-ti-lookup\/#article","isPartOf":{"@id":"https:\/\/any.run\/cybersecurity-blog\/faster-alert-triage-with-ti-lookup\/"},"author":{"name":"ANY.RUN","@id":"https:\/\/any.run\/"},"headline":"How to Maintain Fast and Fatigue-Free Alert Triage with Threat Intelligence\u00a0","datePublished":"2025-07-09T11:53:52+00:00","dateModified":"2025-07-09T11:53:53+00:00","mainEntityOfPage":{"@id":"https:\/\/any.run\/cybersecurity-blog\/faster-alert-triage-with-ti-lookup\/"},"wordCount":1755,"commentCount":0,"publisher":{"@id":"https:\/\/any.run\/"},"keywords":["ANYRUN","cybersecurity","cybersecurity lifehacks"],"articleSection":["Cybersecurity Lifehacks"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/any.run\/cybersecurity-blog\/faster-alert-triage-with-ti-lookup\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/any.run\/cybersecurity-blog\/faster-alert-triage-with-ti-lookup\/","url":"https:\/\/any.run\/cybersecurity-blog\/faster-alert-triage-with-ti-lookup\/","name":"How to Maintain Fast and Fatigue-Free Alert Triage with Threat Intelligence\u00a0 - ANY.RUN&#039;s Cybersecurity Blog","isPartOf":{"@id":"https:\/\/any.run\/"},"datePublished":"2025-07-09T11:53:52+00:00","dateModified":"2025-07-09T11:53:53+00:00","description":"Check out our actionable tips for streamlining alert triage and Improving MTTD in your SOC with real-world examples.","breadcrumb":{"@id":"https:\/\/any.run\/cybersecurity-blog\/faster-alert-triage-with-ti-lookup\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/any.run\/cybersecurity-blog\/faster-alert-triage-with-ti-lookup\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/any.run\/cybersecurity-blog\/faster-alert-triage-with-ti-lookup\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/any.run\/cybersecurity-blog\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity Lifehacks","item":"https:\/\/any.run\/cybersecurity-blog\/category\/lifehacks\/"},{"@type":"ListItem","position":3,"name":"How to Maintain Fast and Fatigue-Free Alert Triage with Threat Intelligence\u00a0"}]},{"@type":"WebSite","@id":"https:\/\/any.run\/","url":"https:\/\/any.run\/","name":"ANY.RUN&#039;s Cybersecurity Blog","description":"Cybersecurity Blog covers topics for experienced professionals as well as for those new to it.","publisher":{"@id":"https:\/\/any.run\/"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/any.run\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/any.run\/","name":"ANY.RUN","url":"https:\/\/any.run\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/any.run\/","url":"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg","contentUrl":"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg","width":1,"height":1,"caption":"ANY.RUN"},"image":{"@id":"https:\/\/any.run\/"},"sameAs":["https:\/\/www.facebook.com\/www.any.run\/","https:\/\/twitter.com\/anyrun_app","https:\/\/www.linkedin.com\/company\/30692044","https:\/\/www.youtube.com\/channel\/UCOgCPho7lzmH7m6fPNlukrQ"]},{"@type":"Person","@id":"https:\/\/any.run\/","name":"ANY.RUN","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/any.run\/","url":"https:\/\/secure.gravatar.com\/avatar\/c4ce3a6c672056b4a8cd6b0110782215?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/c4ce3a6c672056b4a8cd6b0110782215?s=96&d=mm&r=g","caption":"ANY.RUN"},"url":"https:\/\/any.run\/cybersecurity-blog\/author\/a-bespalova\/"}]}},"_links":{"self":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts\/14683"}],"collection":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/comments?post=14683"}],"version-history":[{"count":8,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts\/14683\/revisions"}],"predecessor-version":[{"id":14704,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts\/14683\/revisions\/14704"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/media\/14694"}],"wp:attachment":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/media?parent=14683"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/categories?post=14683"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/tags?post=14683"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}