{"id":1583,"date":"2021-06-30T07:32:00","date_gmt":"2021-06-30T07:32:00","guid":{"rendered":"\/cybersecurity-blog\/?p=1583"},"modified":"2022-12-21T06:50:01","modified_gmt":"2022-12-21T06:50:01","slug":"release-notes-30-06","status":"publish","type":"post","link":"https:\/\/any.run\/cybersecurity-blog\/release-notes-30-06\/","title":{"rendered":"Release Notes June 30, 2021"},"content":{"rendered":"\n<p>This month is rich for changes from ANY.RUN. And today, we give new users a helpful tip \u2013 service tutorials! An interactive and fast introduction of our service will assist you in creating tasks and analyze malware samples with ease.&nbsp;<br><\/p>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>Update overview:<\/strong><\/h4>\n\n\n\n<ul class=\"wp-block-list\"><li>Interactive tutorial of how to analyze threats&nbsp;<\/li><li>Service usability improvements<\/li><\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">Interactive tour on the service<\/h3>\n\n\n\n<p>ANY.RUN is always happy when new users join our community. And the best way to show it is to give a warm welcome! We have prepared a quick but detailed tutorial, so all users can understand the sandbox\u2019s functionality and do their work on the service successfully.&nbsp;<br><\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/lh6.googleusercontent.com\/1H733URcKViN_SlPCg5OFeK48Dn6nJs8LncZMIEap2UkvoXV0mt1POUetOSFvAiW7by94NvzHKoYo28DWVciJJ1OmH5G5LfOUOCHCYjCe2buHYtMOAZrkCZdEIDH4o4r3jKRfqKr\" alt=\"\"\/><\/figure>\n\n\n\n<p>Interactive tutorials are the most effective method to get how to use all functionality available on the service. Modal windows, pop-up notifications with tons of texts seem confusing and tiring. Therefore, the intuitive approach enables smart and straightforward navigation between all the different parts of the service, easy to learn and operate. That\u2019s why as soon as you register, we will run the first task together without time-consuming reading!&nbsp;<br><\/p>\n\n\n\n<p>We will learn all the necessary steps for proper malware investigation with the \u201cHow to analyze threats\u201d tutorial:<br><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Create a new task<\/li><li>Upload a sample<\/li><li>Interact with the virtual machine<\/li><li>Navigate in the service<\/li><li>Complete the task.<\/li><\/ul>\n\n\n\n<p>Each guide\u2019s point is accompanied by a clear description of what you need to do and what data you can find there.&nbsp;<br><\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/lh6.googleusercontent.com\/CiJ0COTZG9xDEZS99Lb0RE2HgZxk-Ptbh8-0ZbUPNxALicH3KOo-3aX-YcnAU0qyNwlI7uAKSW8WUet6LQNWhDY6baRnfUEHYUMi1Ct8sZoxzshHISV8kS_pm9joespOOsBFnBMz\" alt=\"\"\/><\/figure>\n\n\n\n<p>After you complete this tour, there will be no problems for you to analyze threats by yourself. Moreover, in the nearest future, we will add other tutorials to get you familiar with ANY.RUN. And even if you\u2019re an experienced user of our sandbox, you can check this novelty out in the FAQ, the Tutorial tab.&nbsp;<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/lh4.googleusercontent.com\/CK7z6JJKyl5bbqXKT6PRPPYl9kodm8zxjh1iTUCZjLmvUBldt1NK-XcoghZ7RuDGtHxJ3ABmRFZxaG6BungZfVDnkSMWHUaUIjyWK8WIO-c1TOh2A17sLpuK8drWog9WH6KuuLe3\" alt=\"\"\/><\/figure>\n\n\n\n<p>ANY.RUN\u2019s goal is to simplify threat analysis and make it as intuitive as possible. We are eager to help you make the best of our services and achieve your desired outcome. The \u201cHow to analyze threats\u201d tutorial is one of the first essential steps to your malware hunting and, we hope, our cooperation.<br><\/p>\n","protected":false},"excerpt":{"rendered":"<p>This month is rich for changes from ANY.RUN. And today, we give new users a helpful tip \u2013 service tutorials! An interactive and fast introduction of our service will assist you in creating tasks and analyze malware samples with ease.&nbsp; Update overview: Interactive tutorial of how to analyze threats&nbsp; Service usability improvements Interactive tour on [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":3760,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[9],"tags":[57,54,55,56],"class_list":["post-1583","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-service-updates","tag-anyrun","tag-features","tag-release","tag-update"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v20.10 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Release Notes June 30, 2021 - ANY.RUN&#039;s Cybersecurity Blog<\/title>\n<meta name=\"description\" content=\"ANY.RUN has updated the service with a new release on the 30th of June. This post will walk you through the first interactive tutorial for new users.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/any.run\/cybersecurity-blog\/release-notes-30-06\/\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"ANY.RUN\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/release-notes-30-06\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/release-notes-30-06\/\"},\"author\":{\"name\":\"ANY.RUN\",\"@id\":\"https:\/\/any.run\/\"},\"headline\":\"Release Notes June 30, 2021\",\"datePublished\":\"2021-06-30T07:32:00+00:00\",\"dateModified\":\"2022-12-21T06:50:01+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/release-notes-30-06\/\"},\"wordCount\":357,\"commentCount\":1,\"publisher\":{\"@id\":\"https:\/\/any.run\/\"},\"keywords\":[\"ANYRUN\",\"features\",\"release\",\"update\"],\"articleSection\":[\"Service Updates\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/any.run\/cybersecurity-blog\/release-notes-30-06\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/release-notes-30-06\/\",\"url\":\"https:\/\/any.run\/cybersecurity-blog\/release-notes-30-06\/\",\"name\":\"Release Notes June 30, 2021 - ANY.RUN&#039;s Cybersecurity Blog\",\"isPartOf\":{\"@id\":\"https:\/\/any.run\/\"},\"datePublished\":\"2021-06-30T07:32:00+00:00\",\"dateModified\":\"2022-12-21T06:50:01+00:00\",\"description\":\"ANY.RUN has updated the service with a new release on the 30th of June. This post will walk you through the first interactive tutorial for new users.\",\"breadcrumb\":{\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/release-notes-30-06\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/any.run\/cybersecurity-blog\/release-notes-30-06\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/release-notes-30-06\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/any.run\/cybersecurity-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"teamwork\",\"item\":\"https:\/\/any.run\/tag\/teamwork\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Release Notes June 30, 2021\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/any.run\/\",\"url\":\"https:\/\/any.run\/\",\"name\":\"ANY.RUN&#039;s Cybersecurity Blog\",\"description\":\"Cybersecurity Blog covers topics for experienced professionals as well as for those new to it.\",\"publisher\":{\"@id\":\"https:\/\/any.run\/\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/any.run\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/any.run\/\",\"name\":\"ANY.RUN\",\"url\":\"https:\/\/any.run\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/any.run\/\",\"url\":\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg\",\"contentUrl\":\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg\",\"width\":1,\"height\":1,\"caption\":\"ANY.RUN\"},\"image\":{\"@id\":\"https:\/\/any.run\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/www.any.run\/\",\"https:\/\/twitter.com\/anyrun_app\",\"https:\/\/www.linkedin.com\/company\/30692044\",\"https:\/\/www.youtube.com\/channel\/UCOgCPho7lzmH7m6fPNlukrQ\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/any.run\/\",\"name\":\"ANY.RUN\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/any.run\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/c4ce3a6c672056b4a8cd6b0110782215?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/c4ce3a6c672056b4a8cd6b0110782215?s=96&d=mm&r=g\",\"caption\":\"ANY.RUN\"},\"url\":\"https:\/\/any.run\/cybersecurity-blog\/author\/a-bespalova\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Release Notes June 30, 2021 - ANY.RUN&#039;s Cybersecurity Blog","description":"ANY.RUN has updated the service with a new release on the 30th of June. This post will walk you through the first interactive tutorial for new users.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/any.run\/cybersecurity-blog\/release-notes-30-06\/","twitter_misc":{"Written by":"ANY.RUN","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/any.run\/cybersecurity-blog\/release-notes-30-06\/#article","isPartOf":{"@id":"https:\/\/any.run\/cybersecurity-blog\/release-notes-30-06\/"},"author":{"name":"ANY.RUN","@id":"https:\/\/any.run\/"},"headline":"Release Notes June 30, 2021","datePublished":"2021-06-30T07:32:00+00:00","dateModified":"2022-12-21T06:50:01+00:00","mainEntityOfPage":{"@id":"https:\/\/any.run\/cybersecurity-blog\/release-notes-30-06\/"},"wordCount":357,"commentCount":1,"publisher":{"@id":"https:\/\/any.run\/"},"keywords":["ANYRUN","features","release","update"],"articleSection":["Service Updates"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/any.run\/cybersecurity-blog\/release-notes-30-06\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/any.run\/cybersecurity-blog\/release-notes-30-06\/","url":"https:\/\/any.run\/cybersecurity-blog\/release-notes-30-06\/","name":"Release Notes June 30, 2021 - ANY.RUN&#039;s Cybersecurity Blog","isPartOf":{"@id":"https:\/\/any.run\/"},"datePublished":"2021-06-30T07:32:00+00:00","dateModified":"2022-12-21T06:50:01+00:00","description":"ANY.RUN has updated the service with a new release on the 30th of June. This post will walk you through the first interactive tutorial for new users.","breadcrumb":{"@id":"https:\/\/any.run\/cybersecurity-blog\/release-notes-30-06\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/any.run\/cybersecurity-blog\/release-notes-30-06\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/any.run\/cybersecurity-blog\/release-notes-30-06\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/any.run\/cybersecurity-blog\/"},{"@type":"ListItem","position":2,"name":"teamwork","item":"https:\/\/any.run\/tag\/teamwork\/"},{"@type":"ListItem","position":3,"name":"Release Notes June 30, 2021"}]},{"@type":"WebSite","@id":"https:\/\/any.run\/","url":"https:\/\/any.run\/","name":"ANY.RUN&#039;s Cybersecurity Blog","description":"Cybersecurity Blog covers topics for experienced professionals as well as for those new to it.","publisher":{"@id":"https:\/\/any.run\/"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/any.run\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/any.run\/","name":"ANY.RUN","url":"https:\/\/any.run\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/any.run\/","url":"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg","contentUrl":"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg","width":1,"height":1,"caption":"ANY.RUN"},"image":{"@id":"https:\/\/any.run\/"},"sameAs":["https:\/\/www.facebook.com\/www.any.run\/","https:\/\/twitter.com\/anyrun_app","https:\/\/www.linkedin.com\/company\/30692044","https:\/\/www.youtube.com\/channel\/UCOgCPho7lzmH7m6fPNlukrQ"]},{"@type":"Person","@id":"https:\/\/any.run\/","name":"ANY.RUN","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/any.run\/","url":"https:\/\/secure.gravatar.com\/avatar\/c4ce3a6c672056b4a8cd6b0110782215?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/c4ce3a6c672056b4a8cd6b0110782215?s=96&d=mm&r=g","caption":"ANY.RUN"},"url":"https:\/\/any.run\/cybersecurity-blog\/author\/a-bespalova\/"}]}},"_links":{"self":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts\/1583"}],"collection":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/comments?post=1583"}],"version-history":[{"count":1,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts\/1583\/revisions"}],"predecessor-version":[{"id":3771,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts\/1583\/revisions\/3771"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/media\/3760"}],"wp:attachment":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/media?parent=1583"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/categories?post=1583"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/tags?post=1583"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}