{"id":15217,"date":"2025-08-04T11:49:03","date_gmt":"2025-08-04T11:49:03","guid":{"rendered":"\/cybersecurity-blog\/?p=15217"},"modified":"2025-08-04T11:49:04","modified_gmt":"2025-08-04T11:49:04","slug":"release-notes-july-2025","status":"publish","type":"post","link":"https:\/\/any.run\/cybersecurity-blog\/release-notes-july-2025\/","title":{"rendered":"Release Notes: QRadar SOAR App, TI Lookup Free Access, and 2,900+ New Detection Rules"},"content":{"rendered":"\n<p>July brought powerful new updates to help your SOC catch threats faster, reduce manual effort, and make more confident decisions, right inside your existing workflows.&nbsp;From fresh integrations to better detection coverage, these changes are built to support your team every step of the way.&nbsp;<\/p>\n\n\n\n<p>In this update:&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>New&nbsp;<strong>IBM QRadar SOAR integration<\/strong>&nbsp;to automate investigations and speed up response&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Launch of&nbsp;a free <strong>TI Lookup <\/strong>plan, giving all users access to live attack data from 15K SOCs&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>New&nbsp;<strong>Debian ARM VM <\/strong>for analyzing malware targeting IoT and embedded systems&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Expanded detection with&nbsp;<strong>163 new behavior signatures<\/strong>,&nbsp;<strong>13 YARA rules<\/strong>, and&nbsp;<strong>2,772 Suricata rules<\/strong>&nbsp;<\/li>\n<\/ul>\n\n\n\n<p>Keep reading to explore what\u2019s new and how these updates can improve your daily workflows and threat visibility.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Product Updates&nbsp;<\/h2>\n\n\n\n<h2 class=\"wp-block-heading\">IBM QRadar SOAR Integration: Faster, Smarter Incident Response&nbsp;<\/h2>\n\n\n\n<p>We\u2019ve officially launched the&nbsp;<a href=\"https:\/\/any.run\/cybersecurity-blog\/ibm-qradar-soar-anyrun-integration\/\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>ANY.RUN app for IBM QRadar SOAR<\/strong><\/a>, helping SOC teams move faster, reduce manual effort, and make smarter decisions without leaving their existing workflows.&nbsp;<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"729\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2025\/08\/image-1-1024x729.png\" alt=\"\" class=\"wp-image-15220\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/08\/image-1-1024x729.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/08\/image-1-300x213.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/08\/image-1-768x546.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/08\/image-1-1536x1093.png 1536w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/08\/image-1-370x263.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/08\/image-1-270x192.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/08\/image-1-740x526.png 740w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/08\/image-1.png 2048w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\"><em>ANY.RUN app for IBM QRadar SOAR<\/em>&nbsp;<\/figcaption><\/figure><\/div>\n\n\n<p>With this integration, analysts can detonate suspicious files and URLs in <a href=\"https:\/\/any.run\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release_notes_july_25&amp;utm_term=040825&amp;utm_content=linktolanding\" target=\"_blank\" rel=\"noreferrer noopener\">ANY.RUN\u2019s interactive sandbox<\/a>&nbsp;directly from QRadar SOAR, and get verdicts, behavioral logs, and IOCs pushed back into the incident automatically. This not only speeds up triage, but also cuts Mean Time to Respond (MTTR) and reduces the risk of missing stealthy threats.&nbsp;<\/p>\n\n\n\n<p>You can also enrich key indicators using&nbsp;<a href=\"https:\/\/intelligence.any.run\/analysis\/lookup\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release_notes_july_25&amp;utm_term=040825&amp;utm_content=linktotilookup\" target=\"_blank\" rel=\"noreferrer noopener\">ANY.RUN\u2019s Threat Intelligence Lookup<\/a>, pulling in fresh, real-world threat context from live malware samples observed across 15,000+ organizations.&nbsp;<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"588\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2025\/08\/image2-1024x588.png\" alt=\"\" class=\"wp-image-15222\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/08\/image2-1024x588.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/08\/image2-300x172.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/08\/image2-768x441.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/08\/image2-1536x881.png 1536w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/08\/image2-370x212.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/08\/image2-270x155.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/08\/image2-740x425.png 740w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/08\/image2.png 2048w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\"><em>ANY.RUN playbook library&nbsp;<\/em>&nbsp;<\/figcaption><\/figure><\/div>\n\n\n<h3 class=\"wp-block-heading\">What Your Team Gains: Business and Operational Impact&nbsp;<\/h3>\n\n\n\n<p>The new IBM QRadar SOAR integration delivers&nbsp;<strong>real performance and value across your SOC<\/strong>. By combining automated sandbox detonation with live threat intelligence enrichment, ANY.RUN helps security teams reduce alert fatigue, move faster, and make better-informed decisions.&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Lower workload and faster response:<\/strong>&nbsp;Automation cuts down manual triage and enrichment, letting analysts focus on critical threats, not routine tasks.&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Improved efficiency across tiers:<\/strong>&nbsp;Tier 1 and Tier 2 analysts benefit from streamlined investigation and escalation, while senior staff gain the bandwidth to focus on strategy and tuning.&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Smarter decisions, better processes:<\/strong>&nbsp;Sandbox reports and TI Lookup insights feed directly into playbooks and detection rules, driving continuous improvement.&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Early visibility into stealthy threats:<\/strong>&nbsp;Real-time behavioral data exposes multi-stage and evasive attacks that traditional tools often miss.&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Stronger ROI from existing tools:<\/strong>&nbsp;The integration adds powerful behavioral context to your SOAR workflows, without requiring new infrastructure or steep learning curves.&nbsp;<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">How to Get Started&nbsp;<\/h3>\n\n\n\n<p>Getting started is easy, just install the&nbsp;<a href=\"https:\/\/apps.xforce.ibmcloud.com\/extension\/06dbb4c6b59fc59ed9c277b0bb1a3f7d\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>ANY.RUN app from IBM App Exchange<\/strong><\/a>&nbsp;and connect your account using an API key. You can enable sandbox analysis, Threat Intelligence Lookup, or both, depending on your workflow. &nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Threat Intelligence Lookup Gets a Free Plan and More Power for Premium&nbsp;<\/h2>\n\n\n\n<p>This July, we made accessing high-quality threat intelligence easier than ever.&nbsp;<a href=\"https:\/\/intelligence.any.run\/analysis\/lookup\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release_notes_july_25&amp;utm_term=040825&amp;utm_content=linktotilookup\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>ANY.RUN\u2019s Threat Intelligence Lookup (TI Lookup)<\/strong><\/a>&nbsp;now includes a&nbsp;<a href=\"https:\/\/any.run\/cybersecurity-blog\/threat-intelligence-lookup-new-plan\/\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>Free plan<\/strong><\/a>, giving every analyst and SOC team access to real-time, actionable data from millions of sandboxed malware sessions.&nbsp;<\/p>\n\n\n\n<p>\u201cThreat Intelligence in ANY.RUN continues to evolve \u2014 not only by adding more features, but by making the right ones easier to use.\u201d&nbsp;<br>\u2014 Aleksey Lapshin, CEO at ANY.RUN&nbsp;<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"603\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2025\/08\/image3-1024x603.png\" alt=\"\" class=\"wp-image-15224\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/08\/image3-1024x603.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/08\/image3-300x177.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/08\/image3-768x452.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/08\/image3-1536x904.png 1536w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/08\/image3-370x218.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/08\/image3-270x159.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/08\/image3-740x436.png 740w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/08\/image3.png 1833w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\"><em>TI Lookup provides access to an extensive database of the latest IOCs, IOBs, and IOAs<\/em>&nbsp;<\/figcaption><\/figure><\/div>\n\n\n<p>We\u2019ve simplified access to ANY.RUN\u2019s threat intelligence ecosystem with a cleaner, faster entry point. With the&nbsp;<strong>Free plan<\/strong>, you can now explore&nbsp;<strong>Public Samples<\/strong>,&nbsp;<strong>TTPs<\/strong>,&nbsp;<strong>Suricata rules<\/strong>, and&nbsp;<strong>malware trends<\/strong>&nbsp;without cost or complexity.&nbsp;<\/p>\n\n\n\n<p>Users can perform unlimited searches using core indicators like&nbsp;<strong>file hashes, URLs, domains, IPs, Suricata IDs, and MITRE ATT&amp;CK techniques<\/strong>, and combine them using the&nbsp;<strong>AND operator<\/strong>&nbsp;for refined threat queries.&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">What You Can Achieve with TI Lookup Free&nbsp;<\/h3>\n\n\n\n<p>The essential features in the free tier help SOC teams address real-world challenges:&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Enrich threat investigations:<\/strong>&nbsp;Gain extensive context by linking existing artifacts to real-world attacks observed in the wild.&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Reduce response time (MTTR):<\/strong>&nbsp;Analyze threat behavior, objectives, and targets directly from sandbox sessions to support fast, informed decisions.&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Strengthen proactive defense:<\/strong>&nbsp;Gather intel on emerging threats early, before they escalate, using real-time data.&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Grow your team\u2019s expertise:<\/strong>&nbsp;Help SOC analysts learn from real-world malware by exploring TTPs through the interactive MITRE ATT&amp;CK matrix.&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Develop SIEM, IDS\/IPS, or EDR rules:<\/strong>&nbsp;Use collected intelligence to fine-tune detection rules and boost your organization&#8217;s overall defense.&nbsp;<\/li>\n<\/ul>\n\n\n\n<p>You can view up to&nbsp;<strong>20 recent sandbox sessions per query<\/strong>, giving you insight into how threats evolve and behave across multiple industries and regions.&nbsp;<\/p>\n\n\n\n<p>All you need to do to get started is&nbsp;<strong>sign up or log into your ANY.RUN account, a<\/strong>nd you\u2019re in.&nbsp;<\/p>\n\n\n\n<!-- Regular Banner START -->\n<div class=\"regular-banner\">\n<!-- Text Content -->\n<p class=\"regular-banner__text\">\nGet instant threat context with <span class=\"highlight\">TI Lookup<\/span><br> Act faster. Slash MTTR. Stop breaches early&nbsp;  \n<\/p>\n<!-- CTA Link -->\n<a class=\"regular-banner__link\" id=\"article-banner-regular\" href=\"https:\/\/intelligence.any.run\/analysis\/lookup\/?utm_source=anyrunblog&#038;utm_medium=article&#038;utm_campaign=release_notes_july_25&#038;utm_term=040825&#038;utm_content=linktolookup\" target=\"_blank\" rel=\"noopener\">\nTry now. It&#8217;s free!\n<\/a>\n<\/div>\n<!-- Regular Banner END -->\n<!-- Regular Banner Styles START -->\n\n<style>\n.regular-banner {\ndisplay: flex;\ntext-align: center;\nflex-direction: column;\nalign-items: center;\ngap: 1.5rem;\nwidth: 100%;\npadding: 2rem;\nmargin: 1.5rem 0;\nborder-radius: 0.5rem;\nfont-family: 'Catamaran Bold';\nmargin-inline: auto;\nbackground: rgba(32, 168, 241, 0.1);\nborder: 1px solid rgba(75, 174, 227, 0.32);\n}\n\n.regular-banner__text {\nfont-size: 1.5rem;\nmargin: 0;\n}\n\n.highlight {\ncolor: #ea2526;\n}\n\n.regular-banner__link {\npadding: 0.5rem 1.5rem;\nfont-weight: 500;\ntext-decoration: none;\nborder-radius: 0.5rem;\ncolor: #FFFFFF;\nbackground-color: #1491D4;\ntext-align: center;\ntransition: all 0.2s ease-in;\n}\n\n.regular-banner__link:hover {\nbackground-color: #68CBFF;\ncolor: white;\n}\n<\/style>\n<!-- Regular Banner Styles END -->\n\n\n\n<h3 class=\"wp-block-heading\">Go Beyond the Basics with TI Lookup Premium&nbsp;<\/h3>\n\n\n\n<p>The Free plan gives your team a powerful starting point, but with&nbsp;<strong>TI Lookup Premium<\/strong>, you gain the scale, depth, and automation needed for enterprise-grade investigations. Premium unlocks three times more threat data, advanced search capabilities, and access to exclusive features like&nbsp;<strong>private search, YARA rule matching, alert subscriptions, and API integration<\/strong>.&nbsp;<\/p>\n\n\n\n<div class=\"wpdt-c row wpDataTableContainerSimpleTable wpDataTables wpDataTablesWrapper\n\"\n    >\n        <table id=\"wpdtSimpleTable-243\"\n           style=\"border-collapse:collapse;\n                   border-spacing:0px;\"\n           class=\"wpdtSimpleTable wpDataTable\"\n           data-column=\"3\"\n           data-rows=\"11\"\n           data-wpID=\"243\"\n           data-responsive=\"0\"\n           data-has-header=\"1\">\n\n                    <thead>        <tr class=\"wpdt-cell-row \" >\n                                <th class=\"wpdt-cell wpdt-bold\"\n                                            data-cell-id=\"A1\"\n                    data-col-index=\"0\"\n                    data-row-index=\"0\"\n                    style=\" width:33.333333333333%;                    padding:10px;\n                    \"\n                    >\n                                        \u00a0                    <\/th>\n                                                <th class=\"wpdt-cell wpdt-bold\"\n                                            data-cell-id=\"B1\"\n                    data-col-index=\"1\"\n                    data-row-index=\"0\"\n                    style=\" width:33.333333333333%;                    padding:10px;\n                    \"\n                    >\n                                        Free\u00a0                    <\/th>\n                                                <th class=\"wpdt-cell wpdt-bold\"\n                                            data-cell-id=\"C1\"\n                    data-col-index=\"2\"\n                    data-row-index=\"0\"\n                    style=\" width:33.333333333333%;                    padding:10px;\n                    \"\n                    >\n                                        Premium\u00a0                    <\/th>\n                                        <\/tr>\n                    <tbody>        <tr class=\"wpdt-cell-row \" >\n                                <td class=\"wpdt-cell wpdt-bold\"\n                                            data-cell-id=\"A2\"\n                    data-col-index=\"0\"\n                    data-row-index=\"1\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        Requests\u00a0                    <\/td>\n                                                <td class=\"wpdt-cell \"\n                                            data-cell-id=\"B2\"\n                    data-col-index=\"1\"\n                    data-row-index=\"1\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        Unlimited number of basic requests\u00a0\u00a0                    <\/td>\n                                                <td class=\"wpdt-cell \"\n                                            data-cell-id=\"C2\"\n                    data-col-index=\"2\"\n                    data-row-index=\"1\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        Advanced requests (100\/500\/5K\/25K)\u00a0                    <\/td>\n                                        <\/tr>\n                            <tr class=\"wpdt-cell-row \" >\n                                <td class=\"wpdt-cell wpdt-bold\"\n                                            data-cell-id=\"A3\"\n                    data-col-index=\"0\"\n                    data-row-index=\"2\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        Search operators\u00a0                    <\/td>\n                                                <td class=\"wpdt-cell \"\n                                            data-cell-id=\"B3\"\n                    data-col-index=\"1\"\n                    data-row-index=\"2\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        AND\u00a0                    <\/td>\n                                                <td class=\"wpdt-cell \"\n                                            data-cell-id=\"C3\"\n                    data-col-index=\"2\"\n                    data-row-index=\"2\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        AND, OR, NOT\u00a0                    <\/td>\n                                        <\/tr>\n                            <tr class=\"wpdt-cell-row \" >\n                                <td class=\"wpdt-cell wpdt-bold\"\n                                            data-cell-id=\"A4\"\n                    data-col-index=\"0\"\n                    data-row-index=\"3\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        Search parameters\u00a0                    <\/td>\n                                                <td class=\"wpdt-cell \"\n                                            data-cell-id=\"B4\"\n                    data-col-index=\"1\"\n                    data-row-index=\"3\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        11\u00a0\u00a0                    <\/td>\n                                                <td class=\"wpdt-cell \"\n                                            data-cell-id=\"C4\"\n                    data-col-index=\"2\"\n                    data-row-index=\"3\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        44\u00a0                    <\/td>\n                                        <\/tr>\n                            <tr class=\"wpdt-cell-row \" >\n                                <td class=\"wpdt-cell wpdt-bold\"\n                                            data-cell-id=\"A5\"\n                    data-col-index=\"0\"\n                    data-row-index=\"4\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        Links to analysis sessions\u00a0                    <\/td>\n                                                <td class=\"wpdt-cell \"\n                                            data-cell-id=\"B5\"\n                    data-col-index=\"1\"\n                    data-row-index=\"4\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        Up to 20 most recent\u00a0                    <\/td>\n                                                <td class=\"wpdt-cell \"\n                                            data-cell-id=\"C5\"\n                    data-col-index=\"2\"\n                    data-row-index=\"4\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        All available\u00a0                    <\/td>\n                                        <\/tr>\n                            <tr class=\"wpdt-cell-row \" >\n                                <td class=\"wpdt-cell wpdt-bold\"\n                                            data-cell-id=\"A6\"\n                    data-col-index=\"0\"\n                    data-row-index=\"5\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        Interface\u00a0                    <\/td>\n                                                <td class=\"wpdt-cell \"\n                                            data-cell-id=\"B6\"\n                    data-col-index=\"1\"\n                    data-row-index=\"5\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        Limited (only analyses)\u00a0                    <\/td>\n                                                <td class=\"wpdt-cell \"\n                                            data-cell-id=\"C6\"\n                    data-col-index=\"2\"\n                    data-row-index=\"5\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        Full (all threat data + analyses)\u00a0                    <\/td>\n                                        <\/tr>\n                            <tr class=\"wpdt-cell-row \" >\n                                <td class=\"wpdt-cell wpdt-bold\"\n                                            data-cell-id=\"A7\"\n                    data-col-index=\"0\"\n                    data-row-index=\"6\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        Integration\u00a0                    <\/td>\n                                                <td class=\"wpdt-cell \"\n                                            data-cell-id=\"B7\"\n                    data-col-index=\"1\"\n                    data-row-index=\"6\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        -\u00a0                    <\/td>\n                                                <td class=\"wpdt-cell \"\n                                            data-cell-id=\"C7\"\n                    data-col-index=\"2\"\n                    data-row-index=\"6\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        API and SDK (Python package)\u00a0                    <\/td>\n                                        <\/tr>\n                            <tr class=\"wpdt-cell-row \" >\n                                <td class=\"wpdt-cell wpdt-bold\"\n                                            data-cell-id=\"A8\"\n                    data-col-index=\"0\"\n                    data-row-index=\"7\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        YARA Search\u00a0                    <\/td>\n                                                <td class=\"wpdt-cell \"\n                                            data-cell-id=\"B8\"\n                    data-col-index=\"1\"\n                    data-row-index=\"7\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        -\u00a0                    <\/td>\n                                                <td class=\"wpdt-cell \"\n                                            data-cell-id=\"C8\"\n                    data-col-index=\"2\"\n                    data-row-index=\"7\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        +\u00a0                    <\/td>\n                                        <\/tr>\n                            <tr class=\"wpdt-cell-row \" >\n                                <td class=\"wpdt-cell wpdt-bold\"\n                                            data-cell-id=\"A9\"\n                    data-col-index=\"0\"\n                    data-row-index=\"8\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        Private search\u00a0                    <\/td>\n                                                <td class=\"wpdt-cell \"\n                                            data-cell-id=\"B9\"\n                    data-col-index=\"1\"\n                    data-row-index=\"8\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        -\u00a0                    <\/td>\n                                                <td class=\"wpdt-cell \"\n                                            data-cell-id=\"C9\"\n                    data-col-index=\"2\"\n                    data-row-index=\"8\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        +\u00a0                    <\/td>\n                                        <\/tr>\n                            <tr class=\"wpdt-cell-row \" >\n                                <td class=\"wpdt-cell wpdt-bold\"\n                                            data-cell-id=\"A10\"\n                    data-col-index=\"0\"\n                    data-row-index=\"9\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        TI Reports\u00a0                    <\/td>\n                                                <td class=\"wpdt-cell \"\n                                            data-cell-id=\"B10\"\n                    data-col-index=\"1\"\n                    data-row-index=\"9\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        -\u00a0                    <\/td>\n                                                <td class=\"wpdt-cell \"\n                                            data-cell-id=\"C10\"\n                    data-col-index=\"2\"\n                    data-row-index=\"9\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        +\u00a0                    <\/td>\n                                        <\/tr>\n                            <tr class=\"wpdt-cell-row \" >\n                                <td class=\"wpdt-cell wpdt-bold\"\n                                            data-cell-id=\"A11\"\n                    data-col-index=\"0\"\n                    data-row-index=\"10\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        Search Updates\u00a0                    <\/td>\n                                                <td class=\"wpdt-cell \"\n                                            data-cell-id=\"B11\"\n                    data-col-index=\"1\"\n                    data-row-index=\"10\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        -\u00a0                    <\/td>\n                                                <td class=\"wpdt-cell \"\n                                            data-cell-id=\"C11\"\n                    data-col-index=\"2\"\n                    data-row-index=\"10\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        +\u00a0                    <\/td>\n                                        <\/tr>\n                    <\/table>\n<\/div><style id='wpdt-custom-style-243'>\ntable#wpdtSimpleTable-243{ table-layout: fixed !important; }\ntable#wpdtSimpleTable-243 td, table.wpdtSimpleTable243 th { white-space: normal !important; }\n<\/style>\n\n\n\n\n<p>Whether you\u2019re triaging alerts, threat hunting, or building detection rules, Premium gives you full control over your threat intelligence workflows, so your SOC stays ahead of threats, not just reacts to them.&nbsp;<\/p>\n\n\n\n<p><a href=\"https:\/\/intelligence.any.run\/plans\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release_notes_july_25&amp;utm_term=040825&amp;utm_content=linktotiplans\" target=\"_blank\" rel=\"noreferrer noopener\">Reach out to us for trial access<\/a> to TI Lookup Premium for your SOC team.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Debian Sandbox for ARM Malware Detection and Analysis&nbsp;<\/h2>\n\n\n\n<p>To help SOC teams stay ahead of evolving threats, <a href=\"https:\/\/any.run\/cybersecurity-blog\/arm-linux-malware-sandbox\/\" target=\"_blank\" rel=\"noreferrer noopener\">ANY.RUN now supports Linux Debian 12.2 64-bit (ARM)<\/a>&nbsp;in our Interactive Sandbox. This new environment enables deep analysis of malware targeting ARM-based systems, commonly found in IoT devices, embedded infrastructure, and lightweight servers.&nbsp;<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"795\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2025\/08\/image6-1024x795.png\" alt=\"\" class=\"wp-image-15232\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/08\/image6-1024x795.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/08\/image6-300x233.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/08\/image6-768x596.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/08\/image6-1536x1193.png 1536w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/08\/image6-370x287.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/08\/image6-270x210.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/08\/image6-385x300.png 385w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/08\/image6-740x575.png 740w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/08\/image6.png 1674w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\"><em>Select Debian (ARM) from the available OS options<\/em>&nbsp;<\/figcaption><\/figure><\/div>\n\n\n<p>ARM-based malware is becoming a serious concern across industries. These attacks often target underprotected systems to establish botnets, steal resources, or maintain unauthorized access, making early detection critical.&nbsp;<\/p>\n\n\n\n<p>With the new Debian (ARM) VM, analysts can:&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Engage directly with ARM-based malware<\/strong>&nbsp;in a live, isolated environment to trigger and observe hidden behaviors&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Uncover advanced tactics<\/strong>&nbsp;like persistence, evasion, and privilege escalation with process-level visibility&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Trace execution paths in real time<\/strong>, from dropped files to command-line activity&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Correlate behaviors with known TTPs<\/strong>&nbsp;using integrated MITRE ATT&amp;CK mapping for threat classification&nbsp;<\/li>\n<\/ul>\n\n\n\n<p>The new ARM VM is available to&nbsp;<a href=\"https:\/\/any.run\/cybersecurity-blog\/anyrun-enterprise-plan\/\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>Enterprise users<\/strong><\/a>. Simply open a new analysis and select&nbsp;<strong>Linux Debian 12.2 (ARM, 64-bit)<\/strong>&nbsp;from the OS list to get started.&nbsp;<\/p>\n\n\n\n<p><strong>What this update brings to your SOC:<\/strong>&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Faster analysis:<\/strong>&nbsp;Accelerate triage, incident response, and threat hunting with a dedicated ARM environment that delivers instant behavioral insights.&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Reduced platform costs:<\/strong>&nbsp;Analyze ARM-based threats alongside Windows, Android, and Linux&nbsp;samples, all within the same sandbox platform.&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Smarter incident escalation:<\/strong>&nbsp;Collect rich, actionable data during Tier 1 analysis to support better handoffs to Tier 2 teams.&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Stronger analyst expertise:<\/strong>&nbsp;Empower your team to investigate real-world ARM malware, improving skillsets through hands-on, safe analysis.&nbsp;<\/li>\n<\/ul>\n\n\n\n<!-- Regular Banner START -->\n<div class=\"regular-banner\">\n<!-- Text Content -->\n<p class=\"regular-banner__text\">\nIntegrate ANY.RUN&#8217;s <span class=\"highlight\">Interactive Sandbox in your SOC<\/span><br> Automate threat analysis, cut MTTD, &#038; boost detection rate&nbsp;   \n<\/p>\n<!-- CTA Link -->\n<a class=\"regular-banner__link\" id=\"article-banner-regular\" href=\"https:\/\/app.any.run\/contact-us\/?utm_source=anyrunblog&#038;utm_medium=article&#038;utm_campaign=release_notes_july_25&#038;utm_term=040825&#038;utm_content=linktocontactus\" target=\"_blank\" rel=\"noopener\">\nContact us\n<\/a>\n<\/div>\n<!-- Regular Banner END -->\n<!-- Regular Banner Styles START -->\n\n<style>\n.regular-banner {\ndisplay: flex;\ntext-align: center;\nflex-direction: column;\nalign-items: center;\ngap: 1.5rem;\nwidth: 100%;\npadding: 2rem;\nmargin: 1.5rem 0;\nborder-radius: 0.5rem;\nfont-family: 'Catamaran Bold';\nmargin-inline: auto;\nbackground: rgba(32, 168, 241, 0.1);\nborder: 1px solid rgba(75, 174, 227, 0.32);\n}\n\n.regular-banner__text {\nfont-size: 1.5rem;\nmargin: 0;\n}\n\n.highlight {\ncolor: #ea2526;\n}\n\n.regular-banner__link {\npadding: 0.5rem 1.5rem;\nfont-weight: 500;\ntext-decoration: none;\nborder-radius: 0.5rem;\ncolor: #FFFFFF;\nbackground-color: #1491D4;\ntext-align: center;\ntransition: all 0.2s ease-in;\n}\n\n.regular-banner__link:hover {\nbackground-color: #68CBFF;\ncolor: white;\n}\n<\/style>\n<!-- Regular Banner Styles END -->\n\n\n\n<h2 class=\"wp-block-heading\">Threat Coverage Update&nbsp;<\/h2>\n\n\n\n<p>In July, our team expanded detection capabilities significantly to help SOCs stay ahead of evolving threats:&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>163 new signatures<\/strong> were added to strengthen detection across malware families and techniques.&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>13 new YARA rules<\/strong> went live in production, boosting accuracy and enabling deeper hunting capabilities.&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>2,772 new Suricata rules<\/strong> were deployed, ensuring better coverage for network-based attacks.&nbsp;<\/li>\n<\/ul>\n\n\n\n<p>These updates mean analysts get faster, more confident verdicts in the sandbox and can enrich SIEM, SOAR, and IDS workflows with fresh, actionable IOCs.&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">New Behavior Signatures&nbsp;<\/h3>\n\n\n\n<p>In July, we added a new set of behavior signatures to help SOC teams detect&nbsp;<strong>stealthy, obfuscated, and persistent techniques<\/strong>&nbsp;earlier in the attack chain. These signatures are triggered by actions, not static indicators, giving your analysts deeper visibility and faster context during investigations.&nbsp;<\/p>\n\n\n\n<p><strong>Malware Families<\/strong>&nbsp;<\/p>\n\n\n\n<div class=\"wp-block-group\"><div class=\"wp-block-group__inner-container is-layout-grid wp-container-core-group-is-layout-1 wp-block-group-is-layout-grid\">\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/app.any.run\/tasks\/66a0092e-3710-47a8-b0c7-d77877ab74f3\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release_notes_july_25&amp;utm_term=040825&amp;utm_content=linktoservice\" target=\"_blank\" rel=\"noreferrer noopener\">Ermac<\/a>&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/app.any.run\/tasks\/c4f321ec-2c12-4023-9529-4f592e81f25b\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release_notes_july_25&amp;utm_term=040825&amp;utm_content=linktoservice\" target=\"_blank\" rel=\"noreferrer noopener\">BaqiyatLock<\/a>&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/app.any.run\/tasks\/65f44af4-2d9f-4556-9924-0e30149299a6\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release_notes_july_25&amp;utm_term=040825&amp;utm_content=linktoservice\" target=\"_blank\" rel=\"noreferrer noopener\">MythStealer<\/a>&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/app.any.run\/tasks\/bf9fa6f6-e4f5-43b6-b8b6-5b2a74039f1d\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release_notes_july_25&amp;utm_term=040825&amp;utm_content=linktoservice\" target=\"_blank\" rel=\"noreferrer noopener\">Justice<\/a>&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/app.any.run\/tasks\/a5ac9a52-78b1-4623-b069-a304ba5039da\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release_notes_july_25&amp;utm_term=040825&amp;utm_content=linktoservice\" target=\"_blank\" rel=\"noreferrer noopener\">7ev3n-Hone$t<\/a>&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/app.any.run\/tasks\/afa6e250-df40-4c38-bc0c-e2b11ff7432b\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release_notes_july_25&amp;utm_term=040825&amp;utm_content=linktoservice\" target=\"_blank\" rel=\"noreferrer noopener\">Durr<\/a>&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/app.any.run\/tasks\/5fa86b7e-95c5-46f6-b8df-fe112bdc8c38\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release_notes_july_25&amp;utm_term=040825&amp;utm_content=linktoservice\" target=\"_blank\" rel=\"noreferrer noopener\">Xentari<\/a>&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/app.any.run\/tasks\/5005fdc3-8648-4afc-bfab-f3a6ccc6d571\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release_notes_july_25&amp;utm_term=040825&amp;utm_content=linktoservice\" target=\"_blank\" rel=\"noreferrer noopener\">Deadlock<\/a>&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/app.any.run\/tasks\/40dd60c5-4beb-424a-af00-3fa599501601\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release_notes_july_25&amp;utm_term=040825&amp;utm_content=linktoservice\" target=\"_blank\" rel=\"noreferrer noopener\">Nebula<\/a>&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/app.any.run\/tasks\/8a7201d5-3876-4d55-9003-e2ade2404f10\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release_notes_july_25&amp;utm_term=040825&amp;utm_content=linktoservice\" target=\"_blank\" rel=\"noreferrer noopener\">Helpwire<\/a>&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/app.any.run\/tasks\/44f924c5-af2a-456a-888e-32c42c02a4ae\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release_notes_july_25&amp;utm_term=040825&amp;utm_content=linktoservice\" target=\"_blank\" rel=\"noreferrer noopener\">Resilio Sync<\/a>&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/app.any.run\/tasks\/61d6344a-43f4-4bb9-be78-47ec00051d1d\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release_notes_july_25&amp;utm_term=040825&amp;utm_content=linktoservice\" target=\"_blank\" rel=\"noreferrer noopener\">Proton<\/a>&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/app.any.run\/tasks\/9d4c53fa-18f7-44ea-9bcb-6b34bd458f0c\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release_notes_july_25&amp;utm_term=040825&amp;utm_content=linktoservice\" target=\"_blank\" rel=\"noreferrer noopener\">Sinobi<\/a>&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/app.any.run\/tasks\/f1b4378e-f6ed-403e-9db5-b1655956e7a9\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release_notes_july_25&amp;utm_term=040825&amp;utm_content=linktoservice\" target=\"_blank\" rel=\"noreferrer noopener\">Shuyal<\/a>&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/app.any.run\/tasks\/0a0d96e6-40b4-41d0-88d3-7ab344151be2\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release_notes_july_25&amp;utm_term=040825&amp;utm_content=linktoservice\" target=\"_blank\" rel=\"noreferrer noopener\">Helibot<\/a>&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/app.any.run\/tasks\/1129f142-a4fa-4607-8863-10538a159e0b\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release_notes_july_25&amp;utm_term=040825&amp;utm_content=linktoservice\" target=\"_blank\" rel=\"noreferrer noopener\">Kaiji<\/a>&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/app.any.run\/tasks\/b965faf3-9dfd-456e-baae-be8e92cedd04\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release_notes_july_25&amp;utm_term=040825&amp;utm_content=linktoservice\" target=\"_blank\" rel=\"noreferrer noopener\">Yakuza<\/a>&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/app.any.run\/tasks\/281064c7-c4fe-4896-b69d-10457491f6d2\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release_notes_july_25&amp;utm_term=040825&amp;utm_content=linktoservice\" target=\"_blank\" rel=\"noreferrer noopener\">Snoopy<\/a>&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/app.any.run\/tasks\/367087bf-a337-4b20-8a84-b34fd4d644c4\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release_notes_july_25&amp;utm_term=040825&amp;utm_content=linktoservice\" target=\"_blank\" rel=\"noreferrer noopener\">Mozi<\/a>&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/app.any.run\/tasks\/d037e057-f96c-4f88-9378-76c137815064\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release_notes_july_25&amp;utm_term=040825&amp;utm_content=linktoservice\" target=\"_blank\" rel=\"noreferrer noopener\">Alamdar<\/a>&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/app.any.run\/tasks\/e5d42ed1-20d5-4777-8fbe-03a85d327086\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release_notes_july_25&amp;utm_term=040825&amp;utm_content=linktoservice\" target=\"_blank\" rel=\"noreferrer noopener\">CastleLoader<\/a>&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/app.any.run\/tasks\/37e25912-cc56-4bcf-b616-34b905c81ee7\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release_notes_july_25&amp;utm_term=040825&amp;utm_content=linktoservice\" target=\"_blank\" rel=\"noreferrer noopener\">QwizzSerial<\/a>&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/app.any.run\/tasks\/14edb6d6-13f3-424f-9886-4b0630e2f461\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release_notes_july_25&amp;utm_term=040825&amp;utm_content=linktoservice\" target=\"_blank\" rel=\"noreferrer noopener\">Konfety<\/a>&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/app.any.run\/tasks\/21ab1cf8-0f33-43bb-a474-19771bf4721f\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release_notes_july_25&amp;utm_term=040825&amp;utm_content=linktoservice\" target=\"_blank\" rel=\"noreferrer noopener\">Rotajakiro<\/a>&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/app.any.run\/tasks\/a48140e0-c705-4ec0-96f7-3aa9b613775f\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release_notes_july_25&amp;utm_term=040825&amp;utm_content=linktoservice\" target=\"_blank\" rel=\"noreferrer noopener\">StudyNet<\/a>&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/app.any.run\/tasks\/69f0f092-7dba-45e5-b5ad-8724dc2cd9a1\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release_notes_july_25&amp;utm_term=040825&amp;utm_content=linktoservice\" target=\"_blank\" rel=\"noreferrer noopener\">Pandora<\/a>&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/app.any.run\/tasks\/2e44fd16-05ef-4fa4-baee-282bdb4f3328\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release_notes_july_25&amp;utm_term=040825&amp;utm_content=linktoservice\" target=\"_blank\" rel=\"noreferrer noopener\">DevMan<\/a>&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/app.any.run\/tasks\/325b1b5b-c428-450b-bbfd-1ad27baef263\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release_notes_july_25&amp;utm_term=040825&amp;utm_content=linktoservice\" target=\"_blank\" rel=\"noreferrer noopener\">VajraSpy<\/a>&nbsp;<\/li>\n<\/ul>\n<\/div><\/div>\n\n\n\n<p><strong>Obfuscation &amp; Evasion Techniques<\/strong>&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/app.any.run\/tasks\/924afb3f-258f-41ad-a743-c36d960dedc4\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release_notes_july_25&amp;utm_term=040825&amp;utm_content=linktoservice\" target=\"_blank\" rel=\"noreferrer noopener\">ASCII char obfuscation (POWERSHELL)<\/a>&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/app.any.run\/tasks\/c5b26dfc-0415-4a50-9570-cc2f7beffcb6\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release_notes_july_25&amp;utm_term=040825&amp;utm_content=linktoservice\" target=\"_blank\" rel=\"noreferrer noopener\">Escape characters obfuscation (POWERSHELL)<\/a>&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/app.any.run\/tasks\/55193927-0e9a-4972-b2d2-9b818c024123\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release_notes_july_25&amp;utm_term=040825&amp;utm_content=linktoservice\" target=\"_blank\" rel=\"noreferrer noopener\">Formatting operator obfuscation (POWERSHELL)<\/a>&nbsp;<\/li>\n<\/ul>\n\n\n\n<p><strong>Persistence Techniques<\/strong>&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/app.any.run\/tasks\/6f936a05-17b8-4820-a060-021c9d615d9a\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release_notes_july_25&amp;utm_term=040825&amp;utm_content=linktoservice\" target=\"_blank\" rel=\"noreferrer noopener\">Suspicious task schedule using the at utility<\/a>&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/app.any.run\/tasks\/b1494b5d-7af9-433f-8839-0e52a9289688\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release_notes_july_25&amp;utm_term=040825&amp;utm_content=linktoservice\" target=\"_blank\" rel=\"noreferrer noopener\">Overwriting the (ps, ss, ls, dir, find, lsof) system utility<\/a>&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/app.any.run\/tasks\/b1494b5d-7af9-433f-8839-0e52a9289688\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release_notes_july_25&amp;utm_term=040825&amp;utm_content=linktoservice\" target=\"_blank\" rel=\"noreferrer noopener\">Binding \/proc\/pid with mount to hide activity<\/a>&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/app.any.run\/tasks\/d5154fa3-cc55-4997-bc82-c3b5f0ac8638\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release_notes_july_25&amp;utm_term=040825&amp;utm_content=linktoservice\" target=\"_blank\" rel=\"noreferrer noopener\">Delete the USN journal volume to hide file creation activity<\/a>&nbsp;<\/li>\n<\/ul>\n\n\n\n<p><strong>Recon &amp; Credential Access<\/strong>&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/app.any.run\/tasks\/e5902065-8168-46a2-97c4-932e39379bd8\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release_notes_july_25&amp;utm_term=040825&amp;utm_content=linktoservice\" target=\"_blank\" rel=\"noreferrer noopener\">Get credential information from host via cmdkey<\/a>&nbsp;<\/li>\n<\/ul>\n\n\n\n<p><strong>File\/Registry\/OS Abuse<\/strong>&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/app.any.run\/tasks\/0a6ab507-e004-4227-b5e4-023014570adc\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release_notes_july_25&amp;utm_term=040825&amp;utm_content=linktoservice\" target=\"_blank\" rel=\"noreferrer noopener\">Stealing a registry hive<\/a>&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/app.any.run\/tasks\/dc764707-3af4-4d38-988b-fca5d41a70a1\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release_notes_july_25&amp;utm_term=040825&amp;utm_content=linktoservice\" target=\"_blank\" rel=\"noreferrer noopener\">Cipher free space wipe<\/a>&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/app.any.run\/tasks\/736cf777-aa50-4b8d-acba-e02f219f3010\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release_notes_july_25&amp;utm_term=040825&amp;utm_content=linktoservice\" target=\"_blank\" rel=\"noreferrer noopener\">Use SyncAppvPublishingServer as a Powershell host to execute Powershell code<\/a>&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/app.any.run\/tasks\/dfb7a275-97f7-4e31-a0e1-71749665fd48\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release_notes_july_25&amp;utm_term=040825&amp;utm_content=linktoservice\" target=\"_blank\" rel=\"noreferrer noopener\">Executes commands from a specially prepared ie4uinit.inf file<\/a>&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/app.any.run\/tasks\/f397cddf-bc72-4aa7-9ea9-a8350d08b639\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release_notes_july_25&amp;utm_term=040825&amp;utm_content=linktoservice\" target=\"_blank\" rel=\"noreferrer noopener\">driver loading without leaving file traces on disk<\/a>&nbsp;<\/li>\n<\/ul>\n\n\n\n<p><strong>Payload Delivery<\/strong>&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/app.any.run\/tasks\/b1dc814f-8c4b-497d-8932-db70268d3882\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release_notes_july_25&amp;utm_term=040825&amp;utm_content=linktoservice\" target=\"_blank\" rel=\"noreferrer noopener\">Finger tool payload download abuse<\/a>&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/app.any.run\/tasks\/ed87aa24-7197-49f0-b81a-e8c54c6243aa\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release_notes_july_25&amp;utm_term=040825&amp;utm_content=linktoservice\" target=\"_blank\" rel=\"noreferrer noopener\">IMEWDBLD tool payload download abuse<\/a>&nbsp;<\/li>\n<\/ul>\n\n\n\n<p><strong>Other<\/strong>&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/app.any.run\/tasks\/6cd105d0-ce3a-471e-9584-eb3c9a26f0f6\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release_notes_july_25&amp;utm_term=040825&amp;utm_content=linktoservice\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>BART<\/strong><\/a>: Loader activity observed in stealthy malware campaigns&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/app.any.run\/tasks\/8c85ebe9-4bdd-4dd8-afe2-08b0ef3c9163\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release_notes_july_25&amp;utm_term=040825&amp;utm_content=linktoservice\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>susp-lnk<\/strong><\/a>: Flags suspicious&nbsp;.lnk&nbsp;shortcut behavior often used for initial access&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/app.any.run\/browses\/1b93446c-1a45-479d-8366-4074cb50d00a\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release_notes_july_25&amp;utm_term=040825&amp;utm_content=linktoservice\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>susp-clipboard<\/strong><\/a>: Detects suspicious clipboard manipulation commonly used in credential theft or staged payload delivery&nbsp;<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">YARA Rule Updates&nbsp;<\/h3>\n\n\n\n<p>In July, we released 13 new YARA rules into production to help analysts detect threats faster, improve hunting accuracy, and cover a wider range of malware families and evasion tactics.&nbsp;<\/p>\n\n\n\n<p>Some key additions:&nbsp;<\/p>\n\n\n\n<div class=\"wp-block-group\"><div class=\"wp-block-group__inner-container is-layout-grid wp-container-core-group-is-layout-2 wp-block-group-is-layout-grid\">\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/app.any.run\/tasks\/e10294c4-27ab-4b86-b9fa-7bf02d460a2d\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release_notes_july_25&amp;utm_term=040825&amp;utm_content=linktoservice\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>BLACKMATTER<\/strong><\/a>: Detects ransomware operations linked to critical infrastructure attacks.&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/app.any.run\/tasks\/fc4201e5-306f-4d64-bd20-eeb619ac4ff7\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release_notes_july_25&amp;utm_term=040825&amp;utm_content=linktoservice\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>LOCKBIT4<\/strong><\/a>: Tracks the latest variant of this widely distributed ransomware family.&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/app.any.run\/tasks\/c0eeb0c7-7ba7-443c-bd42-37d79aed383f\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release_notes_july_25&amp;utm_term=040825&amp;utm_content=linktoservice\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>NirCmd has been detected<\/strong><\/a>: Flags abuse of NirCmd, a legitimate utility often used for stealthy execution.&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/app.any.run\/tasks\/92cad565-8960-424d-8a80-ffeceb8bb438\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release_notes_july_25&amp;utm_term=040825&amp;utm_content=linktoservice\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>nightspire<\/strong><\/a>:Identifies this stealthy stealer observed in recent targeted campaigns.&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/app.any.run\/tasks\/c53b00a9-fbe9-4969-aafe-5df1360ad523\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release_notes_july_25&amp;utm_term=040825&amp;utm_content=linktoservice\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>sinobi<\/strong><\/a>: Detects an infostealer family using Telegram for data exfiltration.&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/app.any.run\/tasks\/466f72ef-eac8-4e0c-a9b5-a03bd5184eb0\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release_notes_july_25&amp;utm_term=040825&amp;utm_content=linktoservice\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>cryptolocker<\/strong><\/a>: Covers one of the earliest forms of ransomware still resurfacing in modified campaigns.&nbsp;<\/li>\n<\/ul>\n<\/div><\/div>\n\n\n\n<h3 class=\"wp-block-heading\">New Suricata Rules&nbsp;<\/h3>\n\n\n\n<p>We\u2019ve also added 2772 targeted Suricata rules to help SOC teams catch stealthy data exfiltration attempts and phishing campaigns more reliably. Here are a few hihglights:&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/app.any.run\/browses\/c09254f8-3f2b-4bde-831d-3f039c4583f2\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release_notes_july_25&amp;utm_term=040825&amp;utm_content=linktoservice\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>Telegram data exfiltration<\/strong><\/a>&nbsp;(sid:85002387): Detects attempt to exfiltrate stolen data via Telegram Bot API&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/app.any.run\/tasks\/a6b2760c-2ba4-4d1d-80a6-b7fef0091469\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release_notes_july_25&amp;utm_term=040825&amp;utm_content=linktoservice\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>Fake government domain pattern<\/strong><\/a>&nbsp;(sid:85002265): Identifies potentially fraudulent domains mimicking legitimate government services&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/app.any.run\/tasks\/b02f994f-8d05-42fc-94c8-98ce0e7f5ea1\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release_notes_july_25&amp;utm_term=040825&amp;utm_content=linktoservice\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>Microsoft authorization phishing<\/strong><\/a>&nbsp;(sid:85002349): Tracks phishing attacks by observing legitimate MS Auth URL on unknown\/fake domain&nbsp;<\/li>\n<\/ul>\n\n\n\n<p>These new rules enhance detection for modern phishing and exfiltration tactics and are automatically applied in your ANY.RUN sessions.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">About ANY.RUN&nbsp;<\/h2>\n\n\n\n<p><a href=\"https:\/\/any.run\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release_notes_july_25&amp;utm_term=040825&amp;utm_content=linktolanding\" target=\"_blank\" rel=\"noreferrer noopener\">ANY.RUN<\/a> supports over&nbsp;<strong>15,000 organizations<\/strong>&nbsp;across banking, manufacturing, telecom, healthcare, retail, and tech, helping them build faster, smarter, and more resilient cybersecurity operations.&nbsp;<\/p>\n\n\n\n<p>Our&nbsp;<strong>cloud-based Interactive Sandbox<\/strong>&nbsp;enables teams to safely analyze threats targeting Windows, Linux, and Android systems in under 40 seconds; no complex infrastructure required. Paired with&nbsp;<strong>TI Lookup<\/strong>,&nbsp;<strong>YARA Search<\/strong>, and&nbsp;<strong>Threat Feeds<\/strong>, ANY.RUN empowers security teams to accelerate investigations, reduce risk, and boost SOC efficiency.&nbsp;<\/p>\n\n\n\n<p><a href=\"https:\/\/any.run\/demo\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release_notes_july_25&amp;utm_term=040825&amp;utm_content=linktodemo\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>Start your 14-day trial and take full control of threat analysis<\/strong><\/a>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>July brought powerful new updates to help your SOC catch threats faster, reduce manual effort, and make more confident decisions, right inside your existing workflows.&nbsp;From fresh integrations to better detection coverage, these changes are built to support your team every step of the way.&nbsp; In this update:&nbsp; Keep reading to explore what\u2019s new and how [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":7723,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[9],"tags":[57,10,54,55,56],"class_list":["post-15217","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-service-updates","tag-anyrun","tag-cybersecurity","tag-features","tag-release","tag-update"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v20.10 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Release Notes: QRadar SOAR App, Free TI Lookup, Detection Rules<\/title>\n<meta name=\"description\" content=\"Discover the latest releases from ANY.RUN in July 2025, including IBM QRadar integration, TI Lookup free plan, and more.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/any.run\/cybersecurity-blog\/release-notes-july-2025\/\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"ANY.RUN\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"9 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/release-notes-july-2025\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/release-notes-july-2025\/\"},\"author\":{\"name\":\"ANY.RUN\",\"@id\":\"https:\/\/any.run\/\"},\"headline\":\"Release Notes: QRadar SOAR App, TI Lookup Free Access, and 2,900+ New Detection Rules\",\"datePublished\":\"2025-08-04T11:49:03+00:00\",\"dateModified\":\"2025-08-04T11:49:04+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/release-notes-july-2025\/\"},\"wordCount\":1986,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/any.run\/\"},\"keywords\":[\"ANYRUN\",\"cybersecurity\",\"features\",\"release\",\"update\"],\"articleSection\":[\"Service Updates\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/any.run\/cybersecurity-blog\/release-notes-july-2025\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/release-notes-july-2025\/\",\"url\":\"https:\/\/any.run\/cybersecurity-blog\/release-notes-july-2025\/\",\"name\":\"Release Notes: QRadar SOAR App, Free TI Lookup, Detection Rules\",\"isPartOf\":{\"@id\":\"https:\/\/any.run\/\"},\"datePublished\":\"2025-08-04T11:49:03+00:00\",\"dateModified\":\"2025-08-04T11:49:04+00:00\",\"description\":\"Discover the latest releases from ANY.RUN in July 2025, including IBM QRadar integration, TI Lookup free plan, and more.\",\"breadcrumb\":{\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/release-notes-july-2025\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/any.run\/cybersecurity-blog\/release-notes-july-2025\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/release-notes-july-2025\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/any.run\/cybersecurity-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Service Updates\",\"item\":\"https:\/\/any.run\/cybersecurity-blog\/category\/service-updates\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Release Notes: QRadar SOAR App, TI Lookup Free Access, and 2,900+ New Detection Rules\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/any.run\/\",\"url\":\"https:\/\/any.run\/\",\"name\":\"ANY.RUN&#039;s Cybersecurity Blog\",\"description\":\"Cybersecurity Blog covers topics for experienced professionals as well as for those new to it.\",\"publisher\":{\"@id\":\"https:\/\/any.run\/\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/any.run\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/any.run\/\",\"name\":\"ANY.RUN\",\"url\":\"https:\/\/any.run\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/any.run\/\",\"url\":\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg\",\"contentUrl\":\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg\",\"width\":1,\"height\":1,\"caption\":\"ANY.RUN\"},\"image\":{\"@id\":\"https:\/\/any.run\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/www.any.run\/\",\"https:\/\/twitter.com\/anyrun_app\",\"https:\/\/www.linkedin.com\/company\/30692044\",\"https:\/\/www.youtube.com\/channel\/UCOgCPho7lzmH7m6fPNlukrQ\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/any.run\/\",\"name\":\"ANY.RUN\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/any.run\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/c4ce3a6c672056b4a8cd6b0110782215?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/c4ce3a6c672056b4a8cd6b0110782215?s=96&d=mm&r=g\",\"caption\":\"ANY.RUN\"},\"url\":\"https:\/\/any.run\/cybersecurity-blog\/author\/a-bespalova\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Release Notes: QRadar SOAR App, Free TI Lookup, Detection Rules","description":"Discover the latest releases from ANY.RUN in July 2025, including IBM QRadar integration, TI Lookup free plan, and more.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/any.run\/cybersecurity-blog\/release-notes-july-2025\/","twitter_misc":{"Written by":"ANY.RUN","Est. reading time":"9 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/any.run\/cybersecurity-blog\/release-notes-july-2025\/#article","isPartOf":{"@id":"https:\/\/any.run\/cybersecurity-blog\/release-notes-july-2025\/"},"author":{"name":"ANY.RUN","@id":"https:\/\/any.run\/"},"headline":"Release Notes: QRadar SOAR App, TI Lookup Free Access, and 2,900+ New Detection Rules","datePublished":"2025-08-04T11:49:03+00:00","dateModified":"2025-08-04T11:49:04+00:00","mainEntityOfPage":{"@id":"https:\/\/any.run\/cybersecurity-blog\/release-notes-july-2025\/"},"wordCount":1986,"commentCount":0,"publisher":{"@id":"https:\/\/any.run\/"},"keywords":["ANYRUN","cybersecurity","features","release","update"],"articleSection":["Service Updates"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/any.run\/cybersecurity-blog\/release-notes-july-2025\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/any.run\/cybersecurity-blog\/release-notes-july-2025\/","url":"https:\/\/any.run\/cybersecurity-blog\/release-notes-july-2025\/","name":"Release Notes: QRadar SOAR App, Free TI Lookup, Detection Rules","isPartOf":{"@id":"https:\/\/any.run\/"},"datePublished":"2025-08-04T11:49:03+00:00","dateModified":"2025-08-04T11:49:04+00:00","description":"Discover the latest releases from ANY.RUN in July 2025, including IBM QRadar integration, TI Lookup free plan, and more.","breadcrumb":{"@id":"https:\/\/any.run\/cybersecurity-blog\/release-notes-july-2025\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/any.run\/cybersecurity-blog\/release-notes-july-2025\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/any.run\/cybersecurity-blog\/release-notes-july-2025\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/any.run\/cybersecurity-blog\/"},{"@type":"ListItem","position":2,"name":"Service Updates","item":"https:\/\/any.run\/cybersecurity-blog\/category\/service-updates\/"},{"@type":"ListItem","position":3,"name":"Release Notes: QRadar SOAR App, TI Lookup Free Access, and 2,900+ New Detection Rules"}]},{"@type":"WebSite","@id":"https:\/\/any.run\/","url":"https:\/\/any.run\/","name":"ANY.RUN&#039;s Cybersecurity Blog","description":"Cybersecurity Blog covers topics for experienced professionals as well as for those new to it.","publisher":{"@id":"https:\/\/any.run\/"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/any.run\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/any.run\/","name":"ANY.RUN","url":"https:\/\/any.run\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/any.run\/","url":"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg","contentUrl":"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg","width":1,"height":1,"caption":"ANY.RUN"},"image":{"@id":"https:\/\/any.run\/"},"sameAs":["https:\/\/www.facebook.com\/www.any.run\/","https:\/\/twitter.com\/anyrun_app","https:\/\/www.linkedin.com\/company\/30692044","https:\/\/www.youtube.com\/channel\/UCOgCPho7lzmH7m6fPNlukrQ"]},{"@type":"Person","@id":"https:\/\/any.run\/","name":"ANY.RUN","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/any.run\/","url":"https:\/\/secure.gravatar.com\/avatar\/c4ce3a6c672056b4a8cd6b0110782215?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/c4ce3a6c672056b4a8cd6b0110782215?s=96&d=mm&r=g","caption":"ANY.RUN"},"url":"https:\/\/any.run\/cybersecurity-blog\/author\/a-bespalova\/"}]}},"_links":{"self":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts\/15217"}],"collection":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/comments?post=15217"}],"version-history":[{"count":26,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts\/15217\/revisions"}],"predecessor-version":[{"id":15250,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts\/15217\/revisions\/15250"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/media\/7723"}],"wp:attachment":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/media?parent=15217"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/categories?post=15217"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/tags?post=15217"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}