{"id":16675,"date":"2025-11-06T09:51:13","date_gmt":"2025-11-06T09:51:13","guid":{"rendered":"\/cybersecurity-blog\/?p=16675"},"modified":"2025-11-06T13:04:21","modified_gmt":"2025-11-06T13:04:21","slug":"top-infosec-innovators-award-2025","status":"publish","type":"post","link":"https:\/\/any.run\/cybersecurity-blog\/top-infosec-innovators-award-2025\/","title":{"rendered":"ANY.RUN Wins Trailblazing Threat Intelligence at the 2025 Top InfoSec Innovators Awards"},"content":{"rendered":"\n<p>Big news from the <a href=\"https:\/\/any.run\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=trailblazing_TI_Winner_2025&amp;utm_term=061125&amp;utm_content=linktolanding\" target=\"_blank\" rel=\"noreferrer noopener\">ANY.RUN<\/a> team; we\u2019ve just been named the 2025<strong> \u201cTrailblazing Threat Intelligence\u201d winner<\/strong> at the Top InfoSec Innovators Awards!&nbsp;<\/p>\n\n\n\n<p>This recognition means a lot to us because it celebrates what we care about most: helping analysts, SOC teams, and researchers access live, actionable threat intelligence that makes a real difference in investigations every day.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">A Milestone That Reflects Our Mission&nbsp;<\/h2>\n\n\n\n<p>The <strong>Top InfoSec Innovator Awards<\/strong> celebrate cybersecurity companies that shape the future of the industry with new ideas and bold technology. Now in its 13th year, the program is known worldwide for spotlighting organizations that truly move the field forward.&nbsp;<\/p>\n\n\n\n<p>Winning the <strong>Trailblazing <\/strong><a href=\"https:\/\/any.run\/threat-intelligence-lookup\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=trailblazing_TI_Winner_2025&amp;utm_term=061125&amp;utm_content=linktofeedslanding\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>Threat Intelligence<\/strong><\/a> award reinforces what drives us, transforming how teams investigate and respond to cyber threats through a connected, behavioral approach to intelligence.&nbsp;<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"550\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2025\/11\/image-3-1024x550.png\" alt=\"\" class=\"wp-image-16679\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/11\/image-3-1024x550.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/11\/image-3-300x161.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/11\/image-3-768x413.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/11\/image-3-1536x825.png 1536w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/11\/image-3-2048x1100.png 2048w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/11\/image-3-370x199.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/11\/image-3-270x145.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/11\/image-3-740x398.png 740w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\"><em>TI Lookup with 40+ parameters, used to discover relevant intel from real-world threat investigations\u00a0<\/em>\u00a0<\/figcaption><\/figure><\/div>\n\n\n<p>For our users, this award reflects the impact they experience every day:&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Connected intelligence, powered by 15,000+ company data sources worldwide: <\/strong>ANY.RUN\u2019s ecosystem gathers insights from thousands of live environments, helping teams detect threats that traditional feeds often miss.\u00a0<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>24\u00d7 more IOCs per incident for wider visibility:<\/strong> Live data from global attacks ensures comprehensive coverage of new malware and phishing campaigns, giving analysts the full picture behind each alert.\u00a0<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>99% unique IOCs to cut noise and workload:<\/strong> In-depth behavioral intelligence filters out duplicates and low-value data, reducing Tier 1\/Tier 2 investigation time and supporting faster, more confident decisions.\u00a0<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>21 minutes faster MTTR per case: <\/strong>Real-time context for IOCs, IOAs, and IOBs provides the insight analysts need to prioritize critical alerts and accelerate incident resolution.\u00a0<\/li>\n<\/ul>\n\n\n\n<!-- Regular Banner START -->\n<div class=\"regular-banner\">\n<!-- Text Content -->\n<p class=\"regular-banner__text\">\nExperience the award-winning TI solutions <\/br>trusted by <span class=\"highlight\">15,000+ organizations<\/span>\n<\/p>\n<!-- CTA Link -->\n<a class=\"regular-banner__link\" id=\"article-banner-regular\" href=\"https:\/\/any.run\/plans-ti\/?utm_source=anyrunblog&#038;utm_medium=article&#038;utm_campaign=trailblazing_TI_Winner_2025&#038;utm_term=061125&#038;utm_content=contactus#contact-sales\" target=\"_blank\" rel=\"noopener\">\nContact us\u00a0\n<\/a>\n<\/div>\n<!-- Regular Banner END -->\n<!-- Regular Banner Styles START -->\n\n<style>\n.regular-banner {\ndisplay: flex;\ntext-align: center;\nflex-direction: column;\nalign-items: center;\ngap: 1.5rem;\nwidth: 100%;\npadding: 2rem;\nmargin: 1.5rem 0;\nborder-radius: 0.5rem;\nfont-family: 'Catamaran Bold';\nmargin-inline: auto;\nbackground: rgba(32, 168, 241, 0.1);\nborder: 1px solid rgba(75, 174, 227, 0.32);\n}\n\n.regular-banner__text {\nfont-size: 1.5rem;\nmargin: 0;\n}\n\n.highlight {\ncolor: #ea2526;\n}\n\n.regular-banner__link {\npadding: 0.5rem 1.5rem;\nfont-weight: 500;\ntext-decoration: none;\nborder-radius: 0.5rem;\ncolor: #FFFFFF;\nbackground-color: #1491D4;\ntext-align: center;\ntransition: all 0.2s ease-in;\n}\n\n.regular-banner__link:hover {\nbackground-color: #68CBFF;\ncolor: white;\n}\n<\/style>\n<!-- Regular Banner Styles END -->\n\n\n\n<h2 class=\"wp-block-heading\">Connecting People and Data Through Innovative Threat Intelligence&nbsp;<\/h2>\n\n\n\n<p>We earned this recognition because innovation at <a href=\"https:\/\/any.run\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=trailblazing_TI_Winner_2025&amp;utm_term=061125&amp;utm_content=linktolanding\" target=\"_blank\" rel=\"noreferrer noopener\">ANY.RUN<\/a> is built around real analyst needs. Instead of scattering data across multiple tools, we created an ecosystem where threat intelligence is <strong>connected, interactive, and human-centered.<\/strong>&nbsp;<\/p>\n\n\n\n<p>Our <a href=\"https:\/\/any.run\/threat-intelligence-lookup\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=trailblazing_TI_Winner_2025&amp;utm_term=061125&amp;utm_content=linktofeedslanding\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>Threat Intelligence Lookup<\/strong><\/a> and <a href=\"https:\/\/intelligence.any.run\/feeds?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=trailblazing_TI_Winner_2025&amp;utm_term=061125&amp;utm_content=linktotifeeds\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>Threat Intelligence Feeds<\/strong><\/a> bridge live malware behavior with verified indicators, giving teams instant context they can trust. Whether it\u2019s uncovering hidden links between campaigns or enriching detections automatically, these solutions help analysts see more, decide faster, and collaborate better.&nbsp;<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"695\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2025\/11\/image2-3-1024x695.png\" alt=\"\" class=\"wp-image-16680\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/11\/image2-3-1024x695.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/11\/image2-3-300x204.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/11\/image2-3-768x521.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/11\/image2-3-370x251.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/11\/image2-3-270x183.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/11\/image2-3-740x502.png 740w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/11\/image2-3.png 1456w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\"><em>TI Feeds gather fresh threat data and enrich your system with it for expanded threat coverage<\/em>\u00a0<\/figcaption><\/figure><\/div>\n\n\n<p>That\u2019s what this award stands for: innovation that connects people and data to make threat intelligence more practical, powerful, and ready for what\u2019s next.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Looking Ahead: Building the Future of Threat Intelligence&nbsp;<\/h2>\n\n\n\n<p>This recognition fuels our drive to keep innovating.&nbsp;<br>In the coming months, we\u2019re expanding our <a href=\"https:\/\/any.run\/threat-intelligence-lookup\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=trailblazing_TI_Winner_2025&amp;utm_term=061125&amp;utm_content=linktofeedslanding\" target=\"_blank\" rel=\"noreferrer noopener\">Threat Intelligence<\/a> products with even deeper enrichment, new integrations for SIEM and SOAR platforms, and broader OS coverage.&nbsp;<\/p>\n\n\n\n<p>But most importantly, we\u2019ll keep growing together with our community; the analysts, researchers, and security teams who make ANY.RUN what it is today. Every sample executed, every IOC shared, every insight contributed helps make global defense stronger.&nbsp;<\/p>\n\n\n\n<p>So, this win is yours as much as it is ours. \ud83c\udfc6&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">See Why the Industry Calls It Trailblazing&nbsp;<\/h2>\n\n\n\n<p>Experience threat intelligence that helps analysts act <strong>21 minutes faster per case<\/strong> and uncover <strong>24\u00d7 more IOCs<\/strong> per incident.&nbsp;<\/p>\n\n\n\n<p>With behavior-driven data and real-world context, <a href=\"https:\/\/any.run\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=trailblazing_TI_Winner_2025&amp;utm_term=061125&amp;utm_content=linktolanding\" target=\"_blank\" rel=\"noreferrer noopener\">ANY.RUN<\/a> turns every investigation into clear, actionable insight.&nbsp;<\/p>\n\n\n\n<p><a href=\"https:\/\/any.run\/plans-ti\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=trailblazing_TI_Winner_2025&amp;utm_term=061125&amp;utm_content=contactus#contact-sales\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>Book a live demo<\/strong><\/a> and see how connected intelligence can sharpen your team\u2019s response.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">About ANY.RUN&nbsp;<\/h2>\n\n\n\n<p><a href=\"https:\/\/any.run\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=trailblazing_TI_Winner_2025&amp;utm_term=061125&amp;utm_content=linktolanding\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>ANY.RUN<\/strong><\/a>, a leading provider of&nbsp;<a href=\"https:\/\/any.run\/features\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=%20trailblazing_TI_Winner_2025&amp;utm_term=061125&amp;utm_content=linksandboxlanding\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>interactive malware analysis<\/strong><\/a><strong> and t<\/strong><a href=\"https:\/\/any.run\/threat-intelligence-lookup\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=trailblazing_TI_Winner_2025&amp;utm_term=061125&amp;utm_content=linktofeedslanding\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>hreat intelligence solutions<\/strong><\/a>, makes advanced investigation fast, visual, and accessible.&nbsp;<br>The service processes&nbsp;<strong>millions of analysis sessions<\/strong>&nbsp;and is trusted by&nbsp;<strong>15,000+ organizations<\/strong>&nbsp;and&nbsp;<strong>over 500,000 cybersecurity professionals worldwide<\/strong>.&nbsp;<\/p>\n\n\n\n<p>Teams using ANY.RUN report tangible gains; up to&nbsp;<strong>3\u00d7 higher SOC efficiency<\/strong>,&nbsp;<strong>90% faster detection<\/strong>&nbsp;of unknown threats, and a&nbsp;<strong>60% reduction in false positives<\/strong>&nbsp;thanks to real-time interactivity and behavior-based analysis.&nbsp;<\/p>\n\n\n\n<p><a href=\"https:\/\/any.run\/plans-ti\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=trailblazing_TI_Winner_2025&amp;utm_term=061125&amp;utm_content=contactus#contact-sales\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>Explore ANY.RUN\u2019s capabilities with a 14-day trial<\/strong><\/a>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Big news from the ANY.RUN team; we\u2019ve just been named the 2025 \u201cTrailblazing Threat Intelligence\u201d winner at the Top InfoSec Innovators Awards!&nbsp; This recognition means a lot to us because it celebrates what we care about most: helping analysts, SOC teams, and researchers access live, actionable threat intelligence that makes a real difference in investigations [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":16676,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[60],"tags":[57,10,34],"class_list":["post-16675","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news","tag-anyrun","tag-cybersecurity","tag-malware-analysis"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v20.10 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>ANY.RUN Wins 2025 Trailblazing Threat Intelligence Award<\/title>\n<meta name=\"description\" content=\"ANY.RUN named 2025 Trailblazing Threat Intelligence winner for redefining how analysts detect and understand modern threats.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/any.run\/cybersecurity-blog\/top-infosec-innovators-award-2025\/\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"ANY.RUN\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/top-infosec-innovators-award-2025\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/top-infosec-innovators-award-2025\/\"},\"author\":{\"name\":\"ANY.RUN\",\"@id\":\"https:\/\/any.run\/\"},\"headline\":\"ANY.RUN Wins Trailblazing Threat Intelligence at the 2025 Top InfoSec Innovators Awards\",\"datePublished\":\"2025-11-06T09:51:13+00:00\",\"dateModified\":\"2025-11-06T13:04:21+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/top-infosec-innovators-award-2025\/\"},\"wordCount\":676,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/any.run\/\"},\"keywords\":[\"ANYRUN\",\"cybersecurity\",\"malware analysis\"],\"articleSection\":[\"News\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/any.run\/cybersecurity-blog\/top-infosec-innovators-award-2025\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/top-infosec-innovators-award-2025\/\",\"url\":\"https:\/\/any.run\/cybersecurity-blog\/top-infosec-innovators-award-2025\/\",\"name\":\"ANY.RUN Wins 2025 Trailblazing Threat Intelligence Award\",\"isPartOf\":{\"@id\":\"https:\/\/any.run\/\"},\"datePublished\":\"2025-11-06T09:51:13+00:00\",\"dateModified\":\"2025-11-06T13:04:21+00:00\",\"description\":\"ANY.RUN named 2025 Trailblazing Threat Intelligence winner for redefining how analysts detect and understand modern threats.\",\"breadcrumb\":{\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/top-infosec-innovators-award-2025\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/any.run\/cybersecurity-blog\/top-infosec-innovators-award-2025\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/top-infosec-innovators-award-2025\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/any.run\/cybersecurity-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"News\",\"item\":\"https:\/\/any.run\/cybersecurity-blog\/category\/news\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"ANY.RUN Wins Trailblazing Threat Intelligence at the 2025 Top InfoSec Innovators Awards\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/any.run\/\",\"url\":\"https:\/\/any.run\/\",\"name\":\"ANY.RUN&#039;s Cybersecurity Blog\",\"description\":\"Cybersecurity Blog covers topics for experienced professionals as well as for those new to it.\",\"publisher\":{\"@id\":\"https:\/\/any.run\/\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/any.run\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/any.run\/\",\"name\":\"ANY.RUN\",\"url\":\"https:\/\/any.run\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/any.run\/\",\"url\":\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg\",\"contentUrl\":\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg\",\"width\":1,\"height\":1,\"caption\":\"ANY.RUN\"},\"image\":{\"@id\":\"https:\/\/any.run\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/www.any.run\/\",\"https:\/\/twitter.com\/anyrun_app\",\"https:\/\/www.linkedin.com\/company\/30692044\",\"https:\/\/www.youtube.com\/channel\/UCOgCPho7lzmH7m6fPNlukrQ\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/any.run\/\",\"name\":\"ANY.RUN\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/any.run\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/c4ce3a6c672056b4a8cd6b0110782215?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/c4ce3a6c672056b4a8cd6b0110782215?s=96&d=mm&r=g\",\"caption\":\"ANY.RUN\"},\"url\":\"https:\/\/any.run\/cybersecurity-blog\/author\/a-bespalova\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"ANY.RUN Wins 2025 Trailblazing Threat Intelligence Award","description":"ANY.RUN named 2025 Trailblazing Threat Intelligence winner for redefining how analysts detect and understand modern threats.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/any.run\/cybersecurity-blog\/top-infosec-innovators-award-2025\/","twitter_misc":{"Written by":"ANY.RUN","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/any.run\/cybersecurity-blog\/top-infosec-innovators-award-2025\/#article","isPartOf":{"@id":"https:\/\/any.run\/cybersecurity-blog\/top-infosec-innovators-award-2025\/"},"author":{"name":"ANY.RUN","@id":"https:\/\/any.run\/"},"headline":"ANY.RUN Wins Trailblazing Threat Intelligence at the 2025 Top InfoSec Innovators Awards","datePublished":"2025-11-06T09:51:13+00:00","dateModified":"2025-11-06T13:04:21+00:00","mainEntityOfPage":{"@id":"https:\/\/any.run\/cybersecurity-blog\/top-infosec-innovators-award-2025\/"},"wordCount":676,"commentCount":0,"publisher":{"@id":"https:\/\/any.run\/"},"keywords":["ANYRUN","cybersecurity","malware analysis"],"articleSection":["News"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/any.run\/cybersecurity-blog\/top-infosec-innovators-award-2025\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/any.run\/cybersecurity-blog\/top-infosec-innovators-award-2025\/","url":"https:\/\/any.run\/cybersecurity-blog\/top-infosec-innovators-award-2025\/","name":"ANY.RUN Wins 2025 Trailblazing Threat Intelligence Award","isPartOf":{"@id":"https:\/\/any.run\/"},"datePublished":"2025-11-06T09:51:13+00:00","dateModified":"2025-11-06T13:04:21+00:00","description":"ANY.RUN named 2025 Trailblazing Threat Intelligence winner for redefining how analysts detect and understand modern threats.","breadcrumb":{"@id":"https:\/\/any.run\/cybersecurity-blog\/top-infosec-innovators-award-2025\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/any.run\/cybersecurity-blog\/top-infosec-innovators-award-2025\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/any.run\/cybersecurity-blog\/top-infosec-innovators-award-2025\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/any.run\/cybersecurity-blog\/"},{"@type":"ListItem","position":2,"name":"News","item":"https:\/\/any.run\/cybersecurity-blog\/category\/news\/"},{"@type":"ListItem","position":3,"name":"ANY.RUN Wins Trailblazing Threat Intelligence at the 2025 Top InfoSec Innovators Awards"}]},{"@type":"WebSite","@id":"https:\/\/any.run\/","url":"https:\/\/any.run\/","name":"ANY.RUN&#039;s Cybersecurity Blog","description":"Cybersecurity Blog covers topics for experienced professionals as well as for those new to it.","publisher":{"@id":"https:\/\/any.run\/"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/any.run\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/any.run\/","name":"ANY.RUN","url":"https:\/\/any.run\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/any.run\/","url":"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg","contentUrl":"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg","width":1,"height":1,"caption":"ANY.RUN"},"image":{"@id":"https:\/\/any.run\/"},"sameAs":["https:\/\/www.facebook.com\/www.any.run\/","https:\/\/twitter.com\/anyrun_app","https:\/\/www.linkedin.com\/company\/30692044","https:\/\/www.youtube.com\/channel\/UCOgCPho7lzmH7m6fPNlukrQ"]},{"@type":"Person","@id":"https:\/\/any.run\/","name":"ANY.RUN","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/any.run\/","url":"https:\/\/secure.gravatar.com\/avatar\/c4ce3a6c672056b4a8cd6b0110782215?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/c4ce3a6c672056b4a8cd6b0110782215?s=96&d=mm&r=g","caption":"ANY.RUN"},"url":"https:\/\/any.run\/cybersecurity-blog\/author\/a-bespalova\/"}]}},"_links":{"self":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts\/16675"}],"collection":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/comments?post=16675"}],"version-history":[{"count":7,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts\/16675\/revisions"}],"predecessor-version":[{"id":16688,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts\/16675\/revisions\/16688"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/media\/16676"}],"wp:attachment":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/media?parent=16675"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/categories?post=16675"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/tags?post=16675"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}