{"id":16471,"date":"2025-10-24T08:14:04","date_gmt":"2025-10-24T08:14:04","guid":{"rendered":"\/cybersecurity-blog\/?p=16471"},"modified":"2025-10-24T08:14:05","modified_gmt":"2025-10-24T08:14:05","slug":"cybersecurity-breakthrough-awards-2025","status":"publish","type":"post","link":"https:\/\/any.run\/cybersecurity-blog\/cybersecurity-breakthrough-awards-2025\/","title":{"rendered":"ANY.RUN Recognized as Threat Intelligence Company of the Year 2025 \u00a0"},"content":{"rendered":"\n<p>Here at <a href=\"https:\/\/any.run\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=cybersecurity_breakthrough&amp;utm_term=241025&amp;utm_content=landing\" target=\"_blank\" rel=\"noreferrer noopener\">ANY.RUN,<\/a> we know how crucial threat intelligence is for ensuring strong cybersecurity, especially in organizations.&nbsp;<\/p>\n\n\n\n<p>This year, our efforts in promoting this data-driven approach to solving the needs of businesses were <a href=\"https:\/\/cybersecuritybreakthrough.com\/2025-winners\/\" target=\"_blank\" rel=\"noreferrer noopener\">praised<\/a> at CyberSecurity Breakthrough Awards. ANY.RUN was recognized as the Threat Intelligence Company of the Year 2025.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">New Milestone on the Way to Safer Future&nbsp;<\/h2>\n\n\n\n<p>This wasn&#8217;t an easy win: the CyberSecurity Breakthrough Awards is a prestigious international program with an independent panel of industry experts in the jury. Our sincere thanks go to them for acknowledging our impact on leading innovative enterprise-grade solutions forward.&nbsp;<\/p>\n\n\n\n<p>But above all, we\u2019d like to thank our global community of clients, contributors, and partners. It\u2019s a shared win for all of us.&nbsp;<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"533\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2025\/10\/screen1-1-1024x533.png\" alt=\"\" class=\"wp-image-16473\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/10\/screen1-1-1024x533.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/10\/screen1-1-300x156.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/10\/screen1-1-768x399.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/10\/screen1-1-1536x799.png 1536w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/10\/screen1-1-2048x1065.png 2048w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/10\/screen1-1-370x192.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/10\/screen1-1-270x140.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/10\/screen1-1-740x385.png 740w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\"><em>ANY.RUN\u2019s TI Lookup providing IOCs related to Agent Tesla threats submitted in Germany<\/em><\/figcaption><\/figure><\/div>\n\n\n<h2 class=\"wp-block-heading\">Threat Intelligence Changes Everything&nbsp;<\/h2>\n\n\n\n<p>Earlier this year, ANY.RUN&#8217;s solutions gained global acclaim and won multiple awards, like <a href=\"https:\/\/any.run\/cybersecurity-blog\/globee-awards-2025-ti\/\" target=\"_blank\" rel=\"noreferrer noopener\">Globee Awards<\/a> and <a href=\"https:\/\/any.run\/cybersecurity-blog\/cybersecurity-excellence-awards-2025\/\" target=\"_blank\" rel=\"noreferrer noopener\">Cybersecurity Excellence Awards<\/a>. But this victory stands out, as it recognizes our influence as a company and reflects our approach focused on the integrity of a <a href=\"https:\/\/any.run\/cybersecurity-blog\/streamline-your-soc\/\" target=\"_blank\" rel=\"noreferrer noopener\">unified workflow<\/a>.&nbsp;&nbsp;<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"695\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2025\/10\/screen2-1024x695.png\" alt=\"\" class=\"wp-image-16474\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/10\/screen2-1024x695.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/10\/screen2-300x204.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/10\/screen2-768x521.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/10\/screen2-370x251.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/10\/screen2-270x183.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/10\/screen2-740x502.png 740w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/10\/screen2.png 1456w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\"><em>TI Feeds accumulate threat data and enrich your system with it for expanded threat coverage<\/em>\u00a0<\/figcaption><\/figure><\/div>\n\n\n<p>ANY.RUN\u2019s <a href=\"https:\/\/intelligence.any.run\/feeds?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=cybersecurity_breakthrough&amp;utm_term=241025&amp;utm_content=linktotifeeds\" target=\"_blank\" rel=\"noreferrer noopener\">Threat Intelligence Feeds<\/a> and <a href=\"https:\/\/intelligence.any.run\/analysis\/lookup?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=cybersecurity_breakthrough&amp;utm_term=241025&amp;utm_content=linktotilookup\" target=\"_blank\" rel=\"noreferrer noopener\">Threat Intelligence Lookup<\/a> are redefining how SOCs operate in today\u2019s threat landscape. Instead of relying on outdated indicators from post-incident reports, ANY.RUN leverages insights from a global community of over 500,000 analysts and 15,000 organizations actively analyzing the latest threats in our Interactive Sandbox.&nbsp;<\/p>\n\n\n\n<!-- Regular Banner START -->\n<div class=\"regular-banner\">\n<!-- Text Content -->\n<p class=\"regular-banner__text\">\nGain <span class=\"highlight\">3x boost <\/span>in performance rates\u00a0<br>Acclaimed TI solutions for your SOC\n<\/p>\n<!-- CTA Link -->\n<a class=\"regular-banner__link\" id=\"article-banner-regular\" href=\"https:\/\/any.run\/plans-ti\/?utm_source=anyrunblog&#038;utm_medium=article&#038;utm_campaign=cybersecurity_breakthrough&#038;utm_term=241025&#038;utm_content=contactus#contact-sales\" target=\"_blank\" rel=\"noopener\">\nContact us\u00a0\n<\/a>\n<\/div>\n<!-- Regular Banner END -->\n<!-- Regular Banner Styles START -->\n\n<style>\n.regular-banner {\ndisplay: flex;\ntext-align: center;\nflex-direction: column;\nalign-items: center;\ngap: 1.5rem;\nwidth: 100%;\npadding: 2rem;\nmargin: 1.5rem 0;\nborder-radius: 0.5rem;\nfont-family: 'Catamaran Bold';\nmargin-inline: auto;\nbackground: rgba(32, 168, 241, 0.1);\nborder: 1px solid rgba(75, 174, 227, 0.32);\n}\n\n.regular-banner__text {\nfont-size: 1.5rem;\nmargin: 0;\n}\n\n.highlight {\ncolor: #ea2526;\n}\n\n.regular-banner__link {\npadding: 0.5rem 1.5rem;\nfont-weight: 500;\ntext-decoration: none;\nborder-radius: 0.5rem;\ncolor: #FFFFFF;\nbackground-color: #1491D4;\ntext-align: center;\ntransition: all 0.2s ease-in;\n}\n\n.regular-banner__link:hover {\nbackground-color: #68CBFF;\ncolor: white;\n}\n<\/style>\n<!-- Regular Banner Styles END -->\n\n\n\n<p>\u00a0Continuously updated threat intelligence helps SOC teams gain automation and data needed to stay ahead of evolving attacks. Security leaders can make faster, more confident decisions, strengthen proactive defense strategies, and maximize the ROI of their security stack.\u00a0<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Access 24x more IOCs per incident for wider visibility:<\/strong> Live data on global attacks ensures comprehensive threat coverage of new malware and phishing.\u00a0<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Enrich your system with 99% unique IOCs to reduce workload: <\/strong>In-depth intel cuts Tier 1\/Tier 2 investigations and promotes confident decisions.\u00a0<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Accelerate MTTR by 21 min per case for faster action: <\/strong>Threat behavior context for IOCs\/IOAs\/IOBs provides insights for streamlined incident mitigation.\u00a0<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">About ANY.RUN&nbsp;<\/h2>\n\n\n\n<p>Over&nbsp;500,000 cybersecurity professionals&nbsp;and&nbsp;15,000+ organizations&nbsp;across finance, manufacturing, healthcare, and other industries trust&nbsp;ANY.RUN&nbsp;and accelerate their malware investigations worldwide.&nbsp;<\/p>\n\n\n\n<p><strong>Faster triage and response with&nbsp;<\/strong><a href=\"https:\/\/any.run\/features\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=cybersecurity_breakthrough&amp;utm_term=241025&amp;utm_content=linktosandboxlanding\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>ANY.RUN\u2019s Interactive Sandbox<\/strong><strong>:<\/strong><\/a>&nbsp;Safely detonate suspicious files, observe malicious behavior in real time, and gain insights for faster, confident security decisions.&nbsp;<\/p>\n\n\n\n<p><strong>Enhance threat detection with <\/strong><a href=\"https:\/\/any.run\/threat-intelligence-lookup\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=cybersecurity_breakthrough&amp;utm_term=241025&amp;utm_content=linktolookuplanding\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>Threat Intelligence Lookup<\/strong><\/a><strong>&nbsp;and&nbsp;<\/strong><a href=\"https:\/\/any.run\/threat-intelligence-feeds\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=cybersecurity_breakthrough&amp;utm_term=241025&amp;utm_content=linktofeedslanding\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>Threat Intelligence Feeds<\/strong><\/a><strong>:<\/strong>&nbsp;Tap into&nbsp;actionable, up-to-date intelligence to detect and understand&nbsp;emerging threats instantly.&nbsp;<\/p>\n\n\n\n<p><a href=\"https:\/\/any.run\/demo\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=cybersecurity_breakthrough&amp;utm_term=241025&amp;utm_content=linktodemo\" target=\"_blank\" rel=\"noreferrer noopener\">Experience how ANY.RUN\u2019s solutions can power your SOC: start 14-day trial<\/a>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Here at ANY.RUN, we know how crucial threat intelligence is for ensuring strong cybersecurity, especially in organizations.&nbsp; This year, our efforts in promoting this data-driven approach to solving the needs of businesses were praised at CyberSecurity Breakthrough Awards. ANY.RUN was recognized as the Threat Intelligence Company of the Year 2025.&nbsp; New Milestone on the Way [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":16476,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[60],"tags":[57,10,34],"class_list":["post-16471","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news","tag-anyrun","tag-cybersecurity","tag-malware-analysis"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v20.10 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>ANY.RUN: Threat Intelligence Company of the Year<\/title>\n<meta name=\"description\" content=\"Explore TI solutions by ANY.RUN, threat intelligence company of the year acknowledged by CyberSecurity Breakthrough Awards.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/any.run\/cybersecurity-blog\/cybersecurity-breakthrough-awards-2025\/\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"ANY.RUN\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/cybersecurity-breakthrough-awards-2025\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/cybersecurity-breakthrough-awards-2025\/\"},\"author\":{\"name\":\"ANY.RUN\",\"@id\":\"https:\/\/any.run\/\"},\"headline\":\"ANY.RUN Recognized as Threat Intelligence Company of the Year 2025 \u00a0\",\"datePublished\":\"2025-10-24T08:14:04+00:00\",\"dateModified\":\"2025-10-24T08:14:05+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/cybersecurity-breakthrough-awards-2025\/\"},\"wordCount\":497,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/any.run\/\"},\"keywords\":[\"ANYRUN\",\"cybersecurity\",\"malware analysis\"],\"articleSection\":[\"News\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/any.run\/cybersecurity-blog\/cybersecurity-breakthrough-awards-2025\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/cybersecurity-breakthrough-awards-2025\/\",\"url\":\"https:\/\/any.run\/cybersecurity-blog\/cybersecurity-breakthrough-awards-2025\/\",\"name\":\"ANY.RUN: Threat Intelligence Company of the Year\",\"isPartOf\":{\"@id\":\"https:\/\/any.run\/\"},\"datePublished\":\"2025-10-24T08:14:04+00:00\",\"dateModified\":\"2025-10-24T08:14:05+00:00\",\"description\":\"Explore TI solutions by ANY.RUN, threat intelligence company of the year acknowledged by CyberSecurity Breakthrough Awards.\",\"breadcrumb\":{\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/cybersecurity-breakthrough-awards-2025\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/any.run\/cybersecurity-blog\/cybersecurity-breakthrough-awards-2025\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/cybersecurity-breakthrough-awards-2025\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/any.run\/cybersecurity-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"News\",\"item\":\"https:\/\/any.run\/cybersecurity-blog\/category\/news\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"ANY.RUN Recognized as Threat Intelligence Company of the Year 2025 \u00a0\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/any.run\/\",\"url\":\"https:\/\/any.run\/\",\"name\":\"ANY.RUN&#039;s Cybersecurity Blog\",\"description\":\"Cybersecurity Blog covers topics for experienced professionals as well as for those new to it.\",\"publisher\":{\"@id\":\"https:\/\/any.run\/\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/any.run\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/any.run\/\",\"name\":\"ANY.RUN\",\"url\":\"https:\/\/any.run\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/any.run\/\",\"url\":\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg\",\"contentUrl\":\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg\",\"width\":1,\"height\":1,\"caption\":\"ANY.RUN\"},\"image\":{\"@id\":\"https:\/\/any.run\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/www.any.run\/\",\"https:\/\/twitter.com\/anyrun_app\",\"https:\/\/www.linkedin.com\/company\/30692044\",\"https:\/\/www.youtube.com\/channel\/UCOgCPho7lzmH7m6fPNlukrQ\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/any.run\/\",\"name\":\"ANY.RUN\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/any.run\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/c4ce3a6c672056b4a8cd6b0110782215?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/c4ce3a6c672056b4a8cd6b0110782215?s=96&d=mm&r=g\",\"caption\":\"ANY.RUN\"},\"url\":\"https:\/\/any.run\/cybersecurity-blog\/author\/a-bespalova\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"ANY.RUN: Threat Intelligence Company of the Year","description":"Explore TI solutions by ANY.RUN, threat intelligence company of the year acknowledged by CyberSecurity Breakthrough Awards.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/any.run\/cybersecurity-blog\/cybersecurity-breakthrough-awards-2025\/","twitter_misc":{"Written by":"ANY.RUN","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/any.run\/cybersecurity-blog\/cybersecurity-breakthrough-awards-2025\/#article","isPartOf":{"@id":"https:\/\/any.run\/cybersecurity-blog\/cybersecurity-breakthrough-awards-2025\/"},"author":{"name":"ANY.RUN","@id":"https:\/\/any.run\/"},"headline":"ANY.RUN Recognized as Threat Intelligence Company of the Year 2025 \u00a0","datePublished":"2025-10-24T08:14:04+00:00","dateModified":"2025-10-24T08:14:05+00:00","mainEntityOfPage":{"@id":"https:\/\/any.run\/cybersecurity-blog\/cybersecurity-breakthrough-awards-2025\/"},"wordCount":497,"commentCount":0,"publisher":{"@id":"https:\/\/any.run\/"},"keywords":["ANYRUN","cybersecurity","malware analysis"],"articleSection":["News"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/any.run\/cybersecurity-blog\/cybersecurity-breakthrough-awards-2025\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/any.run\/cybersecurity-blog\/cybersecurity-breakthrough-awards-2025\/","url":"https:\/\/any.run\/cybersecurity-blog\/cybersecurity-breakthrough-awards-2025\/","name":"ANY.RUN: Threat Intelligence Company of the Year","isPartOf":{"@id":"https:\/\/any.run\/"},"datePublished":"2025-10-24T08:14:04+00:00","dateModified":"2025-10-24T08:14:05+00:00","description":"Explore TI solutions by ANY.RUN, threat intelligence company of the year acknowledged by CyberSecurity Breakthrough Awards.","breadcrumb":{"@id":"https:\/\/any.run\/cybersecurity-blog\/cybersecurity-breakthrough-awards-2025\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/any.run\/cybersecurity-blog\/cybersecurity-breakthrough-awards-2025\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/any.run\/cybersecurity-blog\/cybersecurity-breakthrough-awards-2025\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/any.run\/cybersecurity-blog\/"},{"@type":"ListItem","position":2,"name":"News","item":"https:\/\/any.run\/cybersecurity-blog\/category\/news\/"},{"@type":"ListItem","position":3,"name":"ANY.RUN Recognized as Threat Intelligence Company of the Year 2025 \u00a0"}]},{"@type":"WebSite","@id":"https:\/\/any.run\/","url":"https:\/\/any.run\/","name":"ANY.RUN&#039;s Cybersecurity Blog","description":"Cybersecurity Blog covers topics for experienced professionals as well as for those new to it.","publisher":{"@id":"https:\/\/any.run\/"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/any.run\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/any.run\/","name":"ANY.RUN","url":"https:\/\/any.run\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/any.run\/","url":"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg","contentUrl":"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg","width":1,"height":1,"caption":"ANY.RUN"},"image":{"@id":"https:\/\/any.run\/"},"sameAs":["https:\/\/www.facebook.com\/www.any.run\/","https:\/\/twitter.com\/anyrun_app","https:\/\/www.linkedin.com\/company\/30692044","https:\/\/www.youtube.com\/channel\/UCOgCPho7lzmH7m6fPNlukrQ"]},{"@type":"Person","@id":"https:\/\/any.run\/","name":"ANY.RUN","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/any.run\/","url":"https:\/\/secure.gravatar.com\/avatar\/c4ce3a6c672056b4a8cd6b0110782215?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/c4ce3a6c672056b4a8cd6b0110782215?s=96&d=mm&r=g","caption":"ANY.RUN"},"url":"https:\/\/any.run\/cybersecurity-blog\/author\/a-bespalova\/"}]}},"_links":{"self":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts\/16471"}],"collection":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/comments?post=16471"}],"version-history":[{"count":5,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts\/16471\/revisions"}],"predecessor-version":[{"id":16481,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts\/16471\/revisions\/16481"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/media\/16476"}],"wp:attachment":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/media?parent=16471"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/categories?post=16471"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/tags?post=16471"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}