{"id":18853,"date":"2026-03-03T10:46:37","date_gmt":"2026-03-03T10:46:37","guid":{"rendered":"\/cybersecurity-blog\/?p=18853"},"modified":"2026-03-04T16:23:09","modified_gmt":"2026-03-04T16:23:09","slug":"automatic-ssl-decryption","status":"publish","type":"post","link":"https:\/\/any.run\/cybersecurity-blog\/automatic-ssl-decryption\/","title":{"rendered":"Expanding\u00a0Phishing\u00a0Detection\u00a0at Scale\u00a0with Automatic SSL Decryption"},"content":{"rendered":"\n<p>90% of modern cyberattacks&nbsp;start with&nbsp;phishing&nbsp;and&nbsp;it\u2019s&nbsp;getting worse.&nbsp;The volume&nbsp;of compromise attempts&nbsp;keeps&nbsp;surging, leaving companies&nbsp;more exposed&nbsp;to credential theft&nbsp;and heavy financial hits.&nbsp;<\/p>\n\n\n\n<p>As&nbsp;phishing&nbsp;evolves,&nbsp;we&nbsp;focus&nbsp;on&nbsp;countering&nbsp;the&nbsp;core tactics&nbsp;that make it effective.&nbsp;That\u2019s&nbsp;why&nbsp;<a href=\"https:\/\/any.run\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=automatic-ssl-decryption&amp;utm_term=030326&amp;utm_content=linktolanding\" target=\"_blank\" rel=\"noreferrer noopener\">ANY.RUN<\/a>&nbsp;is&nbsp;upgrading the threat detection capabilities of the&nbsp;<a href=\"https:\/\/any.run\/features\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=automatic-ssl-decryption&amp;utm_term=030326&amp;utm_content=linktosandboxlanding\" target=\"_blank\" rel=\"noreferrer noopener\">Interactive&nbsp;Sandbox<\/a>&nbsp;across all subscription tiers with&nbsp;<strong>the<\/strong>&nbsp;<strong>new SSL decryption technology<\/strong>.&nbsp;<\/p>\n\n\n\n<p>By extracting encryption keys directly from process memory, it&nbsp;<strong>increases the detection rate of&nbsp;phishing&nbsp;inside the&nbsp;sandbox<\/strong>, helping every user and SOC team in our community to see critical threats early.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Phishing&nbsp;Pressure&nbsp;Is&nbsp;Rising.&nbsp;Detection Needs to Catch Up&nbsp;<\/h2>\n\n\n\n<p>Phishing&nbsp;remains&nbsp;the #1 cyber risk for companies, and its scale is intensifying.&nbsp;<a href=\"https:\/\/www.gartner.com\/en\/newsroom\/press-releases\/2025-03-18-gartner-predicts-ai-agents-will-reduce-the-time-it-takes-to-exploit-account-exposures-by-50-percent-by-2027\" target=\"_blank\" rel=\"noreferrer noopener\">Gartner predicts<\/a>&nbsp;that&nbsp;AI agents will cut the time&nbsp;required&nbsp;to exploit exposed accounts by 50 percent by 2027. This means that the window for early detection is shrinking.&nbsp;<\/p>\n\n\n\n<p>A top challenge in&nbsp;identifying&nbsp;<a href=\"https:\/\/any.run\/cybersecurity-blog\/enterprise-phishing-analysis\/\" target=\"_blank\" rel=\"noreferrer noopener\">modern&nbsp;phishing<\/a>&nbsp;is&nbsp;encrypted&nbsp;HTTPS sessions. Credential harvesting, redirect chains, and token theft often&nbsp;look like normal web traffic.&nbsp;<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"576\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2026\/03\/image-1024x576.png\" alt=\"Traffic encryption prevents SOC teams from detecting\u00a0phishing\" class=\"wp-image-18854\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/03\/image-1024x576.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/03\/image-300x169.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/03\/image-768x432.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/03\/image-1536x864.png 1536w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/03\/image-2048x1152.png 2048w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/03\/image-370x208.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/03\/image-270x152.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/03\/image-740x416.png 740w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\"><em>Traffic encryption prevents SOC teams from detecting&nbsp;phishing<\/em><\/figcaption><\/figure><\/div>\n\n\n<p>For SOC teams, this means more uncertainty. Alerts require deeper validation. Escalations increase. Investigations take longer. The risk of&nbsp;missing&nbsp;credential compromise rises.&nbsp;<\/p>\n\n\n\n<p>Encrypted traffic is typically inspected using man-in-the-middle&nbsp;(MITM)&nbsp;interception. While effective in&nbsp;specific&nbsp;scenarios, MITM is resource-intensive and can disrupt realistic analysis. As encryption becomes the default channel for&nbsp;phishing, this approach&nbsp;is no longer enough.&nbsp;<\/p>\n\n\n\n<p>Detection must work at scale, without slowing confirmation or disrupting execution.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Scaling&nbsp;Phishing&nbsp;Detection&nbsp;Across Every Investigation with Automatic SSL Decryption&nbsp;<\/h2>\n\n\n\n<p>To remove one of the biggest&nbsp;obstacles&nbsp;in&nbsp;phishing&nbsp;detection&nbsp;for&nbsp;<strong>every ANY.RUN user<\/strong>, the&nbsp;<a href=\"https:\/\/any.run\/features\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=automatic-ssl-decryption&amp;utm_term=030326&amp;utm_content=linktosandboxlanding\" target=\"_blank\" rel=\"noreferrer noopener\">Interactive&nbsp;Sandbox<\/a>&nbsp;now&nbsp;<strong>automatically decrypts&nbsp;HTTPS&nbsp;traffic by default,&nbsp;<\/strong>boosting visibility into the most evasive attacks.&nbsp;<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"576\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2026\/03\/image2-1024x576.png\" alt=\"Automatic SSL decryption\" class=\"wp-image-18855\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/03\/image2-1024x576.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/03\/image2-300x169.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/03\/image2-768x432.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/03\/image2-1536x864.png 1536w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/03\/image2-2048x1152.png 2048w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/03\/image2-370x208.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/03\/image2-270x152.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/03\/image2-740x416.png 740w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\"><em>Automatic SSL decryption provides a major phishing detection boost in the sandbox<\/em><\/figcaption><\/figure><\/div>\n\n\n<p>Here\u2019s&nbsp;how it works:&nbsp;&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>The&nbsp;sandbox&nbsp;detonates the sample.&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Session keys are pulled straight from process memory<\/strong>,&nbsp;instead of relying on external interception or certificate substitution.&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Traffic is decrypted internally with the full plaintext available for analysis.&nbsp;&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/any.run\/cybersecurity-blog\/detection-with-suricata-ids\/\" target=\"_blank\" rel=\"noreferrer noopener\">Suricata&nbsp;IDS rules<\/a>, detection signatures, payload inspection,&nbsp;<a href=\"https:\/\/any.run\/cybersecurity-blog\/enrich-iocs-with-threat-intelligence\/\" target=\"_blank\" rel=\"noreferrer noopener\">IOC&nbsp;extraction<\/a>&nbsp;all work on the decrypted content.&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Malicious traffic gets detected&nbsp;instantly<\/strong>,&nbsp;and a conclusive verdict is delivered along with an actionable report in seconds.&nbsp;<\/li>\n<\/ul>\n\n\n\n<p>By allowing&nbsp;Suricata&nbsp;rules and other detection mechanisms to analyze decrypted content&nbsp;immediately,&nbsp;<strong>phishing&nbsp;gets confirmed without extra steps<\/strong>, saving&nbsp;tens of&nbsp;minutes of analysts\u2019 time.&nbsp;<\/p>\n\n\n\n<p>Since traffic decryption applies to&nbsp;<strong>100% of sandbox sessions<\/strong>, the&nbsp;<strong>phishing detection<\/strong>&nbsp;coverage is now&nbsp;<strong>systematically wider and stronger<\/strong>&nbsp;across every investigation.&nbsp;<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"576\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2026\/03\/SSL_results-1024x576.png\" alt=\"\" class=\"wp-image-18866\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/03\/SSL_results-1024x576.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/03\/SSL_results-300x169.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/03\/SSL_results-768x432.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/03\/SSL_results-1536x864.png 1536w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/03\/SSL_results-2048x1152.png 2048w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/03\/SSL_results-370x208.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/03\/SSL_results-270x152.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/03\/SSL_results-740x416.png 740w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\"><em>The technology made a significant impact on ANY.RUN\u2019s capabilities<\/em><\/figcaption><\/figure><\/div>\n\n\n<p>Our stats show a\u00a0<strong>5x increase in SSL-decrypted phishing\u00a0detection <\/strong>after implementing the\u00a0new technology\u00a0in the sandbox.\u00a0This also provided an\u00a0<strong>extra 60K confirmed malicious URLs\u00a0<\/strong>to <a href=\"https:\/\/any.run\/threat-intelligence-lookup\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=automatic-ssl-decryption&amp;utm_term=030326&amp;utm_content=linktotilookuplanding\" target=\"_blank\" rel=\"noreferrer noopener\">Threat Intelligence Lookup<\/a> monthly.\u00a0<\/p>\n\n\n\n<p>For your SOC,&nbsp;this means:&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Higher detection rate:&nbsp;<\/strong>Analysts now can see&nbsp;phishing&nbsp;that&nbsp;is&nbsp;missed by most detection systems, bringing down the risk of&nbsp;incidents.&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Faster MTTD &amp; MTTR:&nbsp;<\/strong>SOC confirms malicious behavior earlier and blocks&nbsp;phishing&nbsp;before it harms your infrastructure.&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Reduced Tier 1-to-Tier 2 escalation volume:&nbsp;<\/strong>Tier-1 closes more cases independently, escalating only truly complex incidents.&nbsp;<\/li>\n<\/ul>\n\n\n\n<p>By raising the&nbsp;sandbox\u2019s capability to catch evasive attacks,&nbsp;<strong>ANY.RUN transforms your entire triage &amp; response&nbsp;<\/strong>pipeline to be&nbsp;<strong>quicker and more effective<\/strong>.&nbsp;&nbsp;<\/p>\n\n\n\n<!-- Regular Banner START -->\n<div class=\"regular-banner\">\n<!-- Text Content -->\n<p class=\"regular-banner__text\">\n<span class=\"highlight\">Reduce exposure \n<\/span>to phishing attacks in your company <br>Integrate ANY.RUN as part of <span class=\"highlight\">your SOC\u2019s triage &#038; response<\/span>\n&nbsp;   \n<\/p>\n<!-- CTA Link -->\n<a class=\"regular-banner__link\" id=\"article-banner-regular\" href=\"https:\/\/any.run\/enterprise\/?utm_source=anyrunblog&#038;utm_medium=article&#038;utm_campaign=automatic-ssl-decryption&#038;utm_term=030326&#038;utm_content=linktoenterprise#contact-sales\" rel=\"noopener\" target=\"_blank\">\nRequest access for your team \n<\/a>\n<\/div>\n<!-- Regular Banner END -->\n<!-- Regular Banner Styles START -->\n\n<style>\n.regular-banner {\ndisplay: flex;\ntext-align: center;\nflex-direction: column;\nalign-items: center;\ngap: 1.5rem;\nwidth: 100%;\npadding: 2rem;\nmargin: 1.5rem 0;\nborder-radius: 0.5rem;\nfont-family: 'Catamaran Bold';\nmargin-inline: auto;\nbackground: rgba(32, 168, 241, 0.1);\nborder: 1px solid rgba(75, 174, 227, 0.32);\n}\n\n.regular-banner__text {\nfont-size: 1.5rem;\nmargin: 0;\n}\n\n.highlight {\ncolor: #ea2526;\n}\n\n.regular-banner__link {\npadding: 0.5rem 1.5rem;\nfont-weight: 500;\ntext-decoration: none;\nborder-radius: 0.5rem;\ncolor: #FFFFFF;\nbackground-color: #1491D4;\ntext-align: center;\ntransition: all 0.2s ease-in;\n}\n\n.regular-banner__link:hover {\nbackground-color: #68CBFF;\ncolor: white;\n}\n<\/style>\n<!-- Regular Banner Styles END -->\n\n\n\n<h2 class=\"wp-block-heading\">Wider&nbsp;Phishing&nbsp;Coverage&nbsp;for the Entire ANY.RUN Ecosystem&nbsp;<\/h2>\n\n\n\n<p>As the SSL decryption helps us detect more&nbsp;phishing&nbsp;at scale, each validated case further boosts the capabilities of all&nbsp;ANY.RUN\u2019s&nbsp;solutions, driving even wider coverage of new attacks for your SOC.&nbsp;&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Interactive&nbsp;Sandbox: More Rules for Identifying Emerging Threats&nbsp;<\/h3>\n\n\n\n<p>Automatic SSL decryption increases the number of&nbsp;phishing&nbsp;cases that are fully confirmed during analysis. This gives our research team a&nbsp;larger set of real-world attack patterns&nbsp;for building&nbsp;powerful&nbsp;detection rules.&nbsp;<\/p>\n\n\n\n<p>As detection&nbsp;is&nbsp;refined using confirmed behavior,&nbsp;new&nbsp;phishing&nbsp;techniques and campaigns are<strong>&nbsp;identified&nbsp;earlier and more consistently<\/strong>. This means higher detection rate over time and fewer attacks slipping through unnoticed.&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">TI&nbsp;Lookup: Deeper Context on Active&nbsp;Phishing&nbsp;Campaigns&nbsp;<\/h3>\n\n\n\n<p>More confirmed phishing sessions mean&nbsp;<strong>more reliable indicators&nbsp;<\/strong>of compromise (<a href=\"https:\/\/any.run\/cybersecurity-blog\/indicators-of-compromise\/\" target=\"_blank\" rel=\"noreferrer noopener\">IOCs<\/a>), behavior (IOBs), and action (IOAs)&nbsp;entering&nbsp;<a href=\"https:\/\/any.run\/threat-intelligence-lookup\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=automatic-ssl-decryption&amp;utm_term=030326&amp;utm_content=linktotilookuplanding\" target=\"_blank\" rel=\"noreferrer noopener\">Threat Intelligence Lookup<\/a>.&nbsp;For malicious URLs alone, TI Lookup now adds an&nbsp;<strong>average of 60,000 more per month<\/strong>.&nbsp;<\/p>\n\n\n\n<p>With clearer relationships between domains and assets,&nbsp;analysts spend <strong>less time validating&nbsp;indicators&nbsp;and more time acting on confirmed&nbsp;threats<\/strong>.&nbsp;<\/p>\n\n\n\n<p>This increases investigative speed while improving the attribution, helping SOC and MSSP teams respond to&nbsp;phishing&nbsp;campaigns with clearer context and stronger confidence.&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">TI&nbsp;Feeds: Fresh, Unique Intel on the Latest Attacks&nbsp;<\/h3>\n\n\n\n<p>Since more&nbsp;phishing&nbsp;activity is&nbsp;validated&nbsp;during analysis,&nbsp;<a href=\"https:\/\/any.run\/threat-intelligence-feeds\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=automatic-ssl-decryption&amp;utm_term=030326&amp;utm_content=linktotifeedslanding\" target=\"_blank\" rel=\"noreferrer noopener\">Threat Intelligence&nbsp;Feeds<\/a>&nbsp;also get&nbsp;<strong>more,&nbsp;fully validated network&nbsp;IOCs&nbsp;<\/strong>(IPs, domains, URLs) belonging to the threats that are currently facing over 15K organizations worldwide.&nbsp;<\/p>\n\n\n\n<p>Those signals reflect confirmed attack behavior, not just suspicious metadata.&nbsp;<\/p>\n\n\n\n<p>As a result,&nbsp;<strong>active&nbsp;phishing&nbsp;infrastructure is&nbsp;identified&nbsp;in your SIEM and EDR<\/strong>, allowing your team to prevent attacks before they escalate.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Real-World Example: Detecting Salty2FA Phishing Campaign<\/h2>\n\n\n\n<p><a href=\"https:\/\/any.run\/malware-trends\/salty2fa\/\" target=\"_blank\" rel=\"noreferrer noopener\">Salty2FA<\/a>, a&nbsp;Phishing-as-a-Service&nbsp;kit,&nbsp;is&nbsp;designed to steal Microsoft 365 credentials and bypass MFA through session hijacking.&nbsp;It relies entirely on encrypted HTTPS communication&nbsp;for fake login pages, redirect flows, and credential exfiltration,&nbsp;which is exactly why it often&nbsp;looks&nbsp;harmless at first glance.&nbsp;<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"578\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2026\/03\/3image-1024x578.png\" alt=\"An ordinary-looking page acts as the starting point for the\u00a0phishing\u00a0attack\" class=\"wp-image-18857\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/03\/3image-1024x578.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/03\/3image-300x169.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/03\/3image-768x434.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/03\/3image-370x209.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/03\/3image-270x152.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/03\/3image-740x418.png 740w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/03\/3image.png 1360w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\"><em>An ordinary-looking page acts as the starting point for the&nbsp;phishing&nbsp;attack<\/em><\/figcaption><\/figure><\/div>\n\n\n<p>In real SOC conditions, this type of attack often&nbsp;looks like routine HTTPS activity. A&nbsp;seemingly harmless&nbsp;CAPTCHA page becomes the entry point, while credential capture and session reuse happen inside encrypted flows.&nbsp;<\/p>\n\n\n\n<p>Without automatic decryption, confirming malicious intent would require&nbsp;additional&nbsp;validation steps or escalation. That delay increases the likelihood of successful credential compromise.&nbsp;<\/p>\n\n\n\n<p>But thanks to the&nbsp;new technology,&nbsp;<a href=\"https:\/\/any.run\/features\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=automatic-ssl-decryption&amp;utm_term=030326&amp;utm_content=linktosandboxlanding\" target=\"_blank\" rel=\"noreferrer noopener\">ANY.RUN\u2019s Interactive&nbsp;Sandbox<\/a>&nbsp;<strong>decrypts the HTTPS session&nbsp;<\/strong>during the first run&nbsp;and&nbsp;<strong>marks it as malicious<\/strong>.&nbsp;<\/p>\n\n\n\n<p><a href=\"https:\/\/app.any.run\/tasks\/73fb8a10-2721-4da4-9f9b-a340a6eac370?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=automatic-ssl-decryption&amp;utm_term=030326&amp;utm_content=linktoservice\" target=\"_blank\" rel=\"noreferrer noopener\">Check out the attack analysis<\/a><\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"582\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2026\/03\/4image2-1024x582.png\" alt=\"The\u00a0sandbox\u00a0provides connection details\" class=\"wp-image-18858\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/03\/4image2-1024x582.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/03\/4image2-300x170.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/03\/4image2-768x436.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/03\/4image2-1536x873.png 1536w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/03\/4image2-370x210.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/03\/4image2-270x153.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/03\/4image2-740x420.png 740w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/03\/4image2.png 1788w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\"><em>The&nbsp;sandbox&nbsp;provides connection details, showing HTTPS traffic<\/em><\/figcaption><\/figure><\/div>\n\n\n<p>We can see that the threat tries to&nbsp;establish&nbsp;an HTTPS connection using&nbsp;the port&nbsp;443. At the network level, this traffic appears legitimate, but with&nbsp;the&nbsp;sandbox, the threat becomes visible instantly.&nbsp;<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"577\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2026\/03\/6image3-1024x577.png\" alt=\"A triggered\u00a0Suricata\u00a0IDS rule exposes the link as malicious\" class=\"wp-image-18859\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/03\/6image3-1024x577.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/03\/6image3-300x169.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/03\/6image3-768x432.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/03\/6image3-1536x865.png 1536w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/03\/6image3-370x208.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/03\/6image3-270x152.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/03\/6image3-740x417.png 740w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/03\/6image3.png 1822w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\"><em>A triggered&nbsp;Suricata&nbsp;IDS rule exposes the link as malicious<\/em><\/figcaption><\/figure><\/div>\n\n\n<p>Thanks to traffic decryption, a relevant&nbsp;Suricata&nbsp;IDS rule is applied without any problem, allowing the&nbsp;sandbox&nbsp;to&nbsp;identify&nbsp;the threat.&nbsp;<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"568\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2026\/03\/8image4-1024x568.png\" alt=\"response-ready report for SOC\" class=\"wp-image-18860\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/03\/8image4-1024x568.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/03\/8image4-300x166.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/03\/8image4-768x426.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/03\/8image4-1536x852.png 1536w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/03\/8image4-370x205.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/03\/8image4-270x150.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/03\/8image4-740x410.png 740w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/03\/8image4.png 1697w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\"><em>The response-ready report gives your SOC a confident verdict and details for containment<\/em><\/figcaption><\/figure><\/div>\n\n\n<p><strong>Within 40 seconds<\/strong>, sandbox produces a response-ready report, containing;confirmed indicators, decrypted traffic evidence, and <strong>validated malicious behavior<\/strong>.&nbsp;<\/p>\n\n\n\n<!-- Regular Banner START -->\n<div class=\"regular-banner\">\n<!-- Text Content -->\n<p class=\"regular-banner__text\">\nDecrypt suspicious HTTPS sessions <span class=\"highlight\"> instantly\n<\/span> <br><span class=\"highlight\">Validate phishing faster<\/span>  with real evidence\n&nbsp;   \n<\/p>\n<!-- CTA Link -->\n<a class=\"regular-banner__link\" id=\"article-banner-regular\" href=\"https:\/\/app.any.run\/?utm_source=anyrunblog&#038;utm_medium=article&#038;utm_campaign=automatic-ssl-decryption&#038;utm_term=030326&#038;utm_content=linktoregistration\" rel=\"noopener\" target=\"_blank\">\nRegister now\n<\/a>\n<\/div>\n<!-- Regular Banner END -->\n<!-- Regular Banner Styles START -->\n\n<style>\n.regular-banner {\ndisplay: flex;\ntext-align: center;\nflex-direction: column;\nalign-items: center;\ngap: 1.5rem;\nwidth: 100%;\npadding: 2rem;\nmargin: 1.5rem 0;\nborder-radius: 0.5rem;\nfont-family: 'Catamaran Bold';\nmargin-inline: auto;\nbackground: rgba(32, 168, 241, 0.1);\nborder: 1px solid rgba(75, 174, 227, 0.32);\n}\n\n.regular-banner__text {\nfont-size: 1.5rem;\nmargin: 0;\n}\n\n.highlight {\ncolor: #ea2526;\n}\n\n.regular-banner__link {\npadding: 0.5rem 1.5rem;\nfont-weight: 500;\ntext-decoration: none;\nborder-radius: 0.5rem;\ncolor: #FFFFFF;\nbackground-color: #1491D4;\ntext-align: center;\ntransition: all 0.2s ease-in;\n}\n\n.regular-banner__link:hover {\nbackground-color: #68CBFF;\ncolor: white;\n}\n<\/style>\n<!-- Regular Banner Styles END -->\n\n\n\n<p>For the business, this means an&nbsp;<strong>early detection of an attack&nbsp;<\/strong>that might have gone unnoticed and caused data theft.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Conclusion&nbsp;<\/h2>\n\n\n\n<p>Phishing&nbsp;is now encrypted by default. HTTPS is no longer a signal of trust; it is simply the delivery channel.&nbsp;<\/p>\n\n\n\n<p>Detection effectiveness increasingly depends on the ability to analyze encrypted traffic without delay or instability. Automatic SSL Decryption strengthens confirmation at the&nbsp;sandbox&nbsp;layer by exposing&nbsp;phishing&nbsp;behavior during the first analysis run.&nbsp;<\/p>\n\n\n\n<p>By embedding decryption directly into the&nbsp;sandbox&nbsp;architecture and making it&nbsp;broadly accessible, ANY.RUN reinforces&nbsp;phishing&nbsp;detection coverage at a structural level.&nbsp;<\/p>\n\n\n\n<p>This is not an isolated feature release. It is a deliberate expansion of&nbsp;encrypted-layer&nbsp;coverage designed to improve&nbsp;detection&nbsp;resilience against modern&nbsp;phishing&nbsp;campaigns.&nbsp;<\/p>\n\n\n\n<p>As&nbsp;phishing&nbsp;evolves, detection must evolve with it. Expanding coverage at the encrypted layer ensures SOC teams can confirm, correlate, and respond to&nbsp;phishing&nbsp;threats before they escalate into business-impacting incidents.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">About ANY.RUN&nbsp;<\/h2>\n\n\n\n<p><a href=\"https:\/\/any.run\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=automatic-ssl-decryption&amp;utm_term=030326&amp;utm_content=linktolanding\" target=\"_blank\" rel=\"noreferrer noopener\">ANY.RUN<\/a>, a leading provider of interactive malware analysis and threat intelligence solutions, integrates seamlessly into modern SOC operations and supports investigations from the first alert through containment and detection improvement.&nbsp;<\/p>\n\n\n\n<p>Security teams use&nbsp;<a href=\"https:\/\/any.run\/features\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=automatic-ssl-decryption&amp;utm_term=030326&amp;utm_content=linktosandboxlanding\" target=\"_blank\" rel=\"noreferrer noopener\">ANY.RUN\u2019s&nbsp;Sandbox<\/a>&nbsp;to safely execute suspicious files and URLs,&nbsp;observe&nbsp;real behavior in controlled environments, extract actionable indicators, and enrich findings instantly through&nbsp;<a href=\"https:\/\/any.run\/threat-intelligence-lookup\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=automatic-ssl-decryption&amp;utm_term=030326&amp;utm_content=linktotilookuplanding\" target=\"_blank\" rel=\"noreferrer noopener\">TI&nbsp;Lookup<\/a>&nbsp;and&nbsp;<a href=\"https:\/\/any.run\/threat-intelligence-feeds\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=automatic-ssl-decryption&amp;utm_term=030326&amp;utm_content=linktotifeedslanding\" target=\"_blank\" rel=\"noreferrer noopener\">Threat Intelligence&nbsp;Feeds<\/a>. This unified approach reduces uncertainty, improves validation accuracy, and strengthens response consistency across the organization.&nbsp;<\/p>\n\n\n\n<p>Today, more than&nbsp;<strong>600,000 security professionals across 15,000+ organizations<\/strong>&nbsp;rely on ANY.RUN to accelerate investigations, enhance detection resilience, and stay ahead of evolving&nbsp;phishingand malware campaigns.&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>90% of modern cyberattacks&nbsp;start with&nbsp;phishing&nbsp;and&nbsp;it\u2019s&nbsp;getting worse.&nbsp;The volume&nbsp;of compromise attempts&nbsp;keeps&nbsp;surging, leaving companies&nbsp;more exposed&nbsp;to credential theft&nbsp;and heavy financial hits.&nbsp; As&nbsp;phishing&nbsp;evolves,&nbsp;we&nbsp;focus&nbsp;on&nbsp;countering&nbsp;the&nbsp;core tactics&nbsp;that make it effective.&nbsp;That\u2019s&nbsp;why&nbsp;ANY.RUN&nbsp;is&nbsp;upgrading the threat detection capabilities of the&nbsp;Interactive&nbsp;Sandbox&nbsp;across all subscription tiers with&nbsp;the&nbsp;new SSL decryption technology.&nbsp; By extracting encryption keys directly from process memory, it&nbsp;increases the detection rate of&nbsp;phishing&nbsp;inside the&nbsp;sandbox, helping every user and SOC team [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":18871,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[9],"tags":[57,10,56],"class_list":["post-18853","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-service-updates","tag-anyrun","tag-cybersecurity","tag-update"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v20.10 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Automatic SSL Decryption for Phishing Detection<\/title>\n<meta name=\"description\" content=\"Automatically decrypt HTTPS in ANY.RUN\u2019s Interactive Sandbox to expose phishing faster and reduce SOC response time.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/any.run\/cybersecurity-blog\/automatic-ssl-decryption\/\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"ANY.RUN\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"8 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/automatic-ssl-decryption\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/automatic-ssl-decryption\/\"},\"author\":{\"name\":\"ANY.RUN\",\"@id\":\"https:\/\/any.run\/\"},\"headline\":\"Expanding\u00a0Phishing\u00a0Detection\u00a0at Scale\u00a0with Automatic SSL Decryption\",\"datePublished\":\"2026-03-03T10:46:37+00:00\",\"dateModified\":\"2026-03-04T16:23:09+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/automatic-ssl-decryption\/\"},\"wordCount\":1678,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/any.run\/\"},\"keywords\":[\"ANYRUN\",\"cybersecurity\",\"update\"],\"articleSection\":[\"Service Updates\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/any.run\/cybersecurity-blog\/automatic-ssl-decryption\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/automatic-ssl-decryption\/\",\"url\":\"https:\/\/any.run\/cybersecurity-blog\/automatic-ssl-decryption\/\",\"name\":\"Automatic SSL Decryption for Phishing Detection\",\"isPartOf\":{\"@id\":\"https:\/\/any.run\/\"},\"datePublished\":\"2026-03-03T10:46:37+00:00\",\"dateModified\":\"2026-03-04T16:23:09+00:00\",\"description\":\"Automatically decrypt HTTPS in ANY.RUN\u2019s Interactive Sandbox to expose phishing faster and reduce SOC response time.\",\"breadcrumb\":{\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/automatic-ssl-decryption\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/any.run\/cybersecurity-blog\/automatic-ssl-decryption\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/automatic-ssl-decryption\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/any.run\/cybersecurity-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Service Updates\",\"item\":\"https:\/\/any.run\/cybersecurity-blog\/category\/service-updates\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Expanding\u00a0Phishing\u00a0Detection\u00a0at Scale\u00a0with Automatic SSL Decryption\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/any.run\/\",\"url\":\"https:\/\/any.run\/\",\"name\":\"ANY.RUN&#039;s Cybersecurity Blog\",\"description\":\"Cybersecurity Blog covers topics for experienced professionals as well as for those new to it.\",\"publisher\":{\"@id\":\"https:\/\/any.run\/\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/any.run\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/any.run\/\",\"name\":\"ANY.RUN\",\"url\":\"https:\/\/any.run\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/any.run\/\",\"url\":\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg\",\"contentUrl\":\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg\",\"width\":1,\"height\":1,\"caption\":\"ANY.RUN\"},\"image\":{\"@id\":\"https:\/\/any.run\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/www.any.run\/\",\"https:\/\/twitter.com\/anyrun_app\",\"https:\/\/www.linkedin.com\/company\/30692044\",\"https:\/\/www.youtube.com\/channel\/UCOgCPho7lzmH7m6fPNlukrQ\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/any.run\/\",\"name\":\"ANY.RUN\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/any.run\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/c4ce3a6c672056b4a8cd6b0110782215?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/c4ce3a6c672056b4a8cd6b0110782215?s=96&d=mm&r=g\",\"caption\":\"ANY.RUN\"},\"url\":\"https:\/\/any.run\/cybersecurity-blog\/author\/a-bespalova\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Automatic SSL Decryption for Phishing Detection","description":"Automatically decrypt HTTPS in ANY.RUN\u2019s Interactive Sandbox to expose phishing faster and reduce SOC response time.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/any.run\/cybersecurity-blog\/automatic-ssl-decryption\/","twitter_misc":{"Written by":"ANY.RUN","Est. reading time":"8 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/any.run\/cybersecurity-blog\/automatic-ssl-decryption\/#article","isPartOf":{"@id":"https:\/\/any.run\/cybersecurity-blog\/automatic-ssl-decryption\/"},"author":{"name":"ANY.RUN","@id":"https:\/\/any.run\/"},"headline":"Expanding\u00a0Phishing\u00a0Detection\u00a0at Scale\u00a0with Automatic SSL Decryption","datePublished":"2026-03-03T10:46:37+00:00","dateModified":"2026-03-04T16:23:09+00:00","mainEntityOfPage":{"@id":"https:\/\/any.run\/cybersecurity-blog\/automatic-ssl-decryption\/"},"wordCount":1678,"commentCount":0,"publisher":{"@id":"https:\/\/any.run\/"},"keywords":["ANYRUN","cybersecurity","update"],"articleSection":["Service Updates"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/any.run\/cybersecurity-blog\/automatic-ssl-decryption\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/any.run\/cybersecurity-blog\/automatic-ssl-decryption\/","url":"https:\/\/any.run\/cybersecurity-blog\/automatic-ssl-decryption\/","name":"Automatic SSL Decryption for Phishing Detection","isPartOf":{"@id":"https:\/\/any.run\/"},"datePublished":"2026-03-03T10:46:37+00:00","dateModified":"2026-03-04T16:23:09+00:00","description":"Automatically decrypt HTTPS in ANY.RUN\u2019s Interactive Sandbox to expose phishing faster and reduce SOC response time.","breadcrumb":{"@id":"https:\/\/any.run\/cybersecurity-blog\/automatic-ssl-decryption\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/any.run\/cybersecurity-blog\/automatic-ssl-decryption\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/any.run\/cybersecurity-blog\/automatic-ssl-decryption\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/any.run\/cybersecurity-blog\/"},{"@type":"ListItem","position":2,"name":"Service Updates","item":"https:\/\/any.run\/cybersecurity-blog\/category\/service-updates\/"},{"@type":"ListItem","position":3,"name":"Expanding\u00a0Phishing\u00a0Detection\u00a0at Scale\u00a0with Automatic SSL Decryption"}]},{"@type":"WebSite","@id":"https:\/\/any.run\/","url":"https:\/\/any.run\/","name":"ANY.RUN&#039;s Cybersecurity Blog","description":"Cybersecurity Blog covers topics for experienced professionals as well as for those new to it.","publisher":{"@id":"https:\/\/any.run\/"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/any.run\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/any.run\/","name":"ANY.RUN","url":"https:\/\/any.run\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/any.run\/","url":"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg","contentUrl":"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg","width":1,"height":1,"caption":"ANY.RUN"},"image":{"@id":"https:\/\/any.run\/"},"sameAs":["https:\/\/www.facebook.com\/www.any.run\/","https:\/\/twitter.com\/anyrun_app","https:\/\/www.linkedin.com\/company\/30692044","https:\/\/www.youtube.com\/channel\/UCOgCPho7lzmH7m6fPNlukrQ"]},{"@type":"Person","@id":"https:\/\/any.run\/","name":"ANY.RUN","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/any.run\/","url":"https:\/\/secure.gravatar.com\/avatar\/c4ce3a6c672056b4a8cd6b0110782215?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/c4ce3a6c672056b4a8cd6b0110782215?s=96&d=mm&r=g","caption":"ANY.RUN"},"url":"https:\/\/any.run\/cybersecurity-blog\/author\/a-bespalova\/"}]}},"_links":{"self":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts\/18853"}],"collection":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/comments?post=18853"}],"version-history":[{"count":26,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts\/18853\/revisions"}],"predecessor-version":[{"id":18948,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts\/18853\/revisions\/18948"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/media\/18871"}],"wp:attachment":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/media?parent=18853"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/categories?post=18853"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/tags?post=18853"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}