{"id":19180,"date":"2026-03-16T10:48:00","date_gmt":"2026-03-16T10:48:00","guid":{"rendered":"\/cybersecurity-blog\/?p=19180"},"modified":"2026-03-16T10:48:01","modified_gmt":"2026-03-16T10:48:01","slug":"anyrun-rootedcon-2026","status":"publish","type":"post","link":"\/cybersecurity-blog\/anyrun-rootedcon-2026\/","title":{"rendered":"ANY.RUN at\u00a0RootedCON\u00a02026:\u00a0Meeting Security Teams and Showcasing New Capabilities\u00a0"},"content":{"rendered":"\n<p>From March 5 to March 7, the&nbsp;<a href=\"https:\/\/any.run\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=anyrun-rootedcon-2026&amp;utm_term=160326&amp;utm_content=linktolanding\" target=\"_blank\" rel=\"noreferrer noopener\">ANY.RUN<\/a>&nbsp;team attended&nbsp;RootedCON&nbsp;2026 in Madrid and&nbsp;showcase&nbsp;some of&nbsp;our&nbsp;latest capabilities developed for modern SOC environments at the conference expo.&nbsp;<\/p>\n\n\n\n<p>The event&nbsp;provided&nbsp;a great opportunity&nbsp;to meet&nbsp;our existing clients&nbsp;and&nbsp;connect&nbsp;with security teams exploring advanced threat detection&nbsp;solutions.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Meeting the Community and Partners&nbsp;<\/h2>\n\n\n\n<p><a href=\"https:\/\/rootedcon.com\/\" target=\"_blank\" rel=\"noreferrer noopener\">RootedCON<\/a>&nbsp;is&nbsp;one of the largest cybersecurity conferences in Europe, bringing together thousands of security researchers, SOC analysts, and industry professionals every year.&nbsp;<\/p>\n\n\n\n<p>For us, it was a great chance to meet many of our users face-to-face, hear how SOC teams integrate ANY.RUN\u2019s solutions into their investigation workflows, and exchange ideas with practitioners working on real-world threats every day.&nbsp;&nbsp;<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"723\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2026\/03\/image-1-1024x723.jpg\" alt=\"Meeting clients at RootedCON 2026\" class=\"wp-image-19183\" srcset=\"\/cybersecurity-blog\/wp-content\/uploads\/2026\/03\/image-1-1024x723.jpg 1024w, \/cybersecurity-blog\/wp-content\/uploads\/2026\/03\/image-1-300x212.jpg 300w, \/cybersecurity-blog\/wp-content\/uploads\/2026\/03\/image-1-768x543.jpg 768w, \/cybersecurity-blog\/wp-content\/uploads\/2026\/03\/image-1-1536x1085.jpg 1536w, \/cybersecurity-blog\/wp-content\/uploads\/2026\/03\/image-1-2048x1447.jpg 2048w, \/cybersecurity-blog\/wp-content\/uploads\/2026\/03\/image-1-370x261.jpg 370w, \/cybersecurity-blog\/wp-content\/uploads\/2026\/03\/image-1-270x191.jpg 270w, \/cybersecurity-blog\/wp-content\/uploads\/2026\/03\/image-1-740x523.jpg 740w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\"><em>It was a pleasure to meet so many of our clients<\/em><\/figcaption><\/figure><\/div>\n\n\n<p>It was great to connect with so many of our customers and discuss how they use our threat analysis and intelligence in their daily security operations.&nbsp;<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"683\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2026\/03\/image2-2-1024x683.jpg\" alt=\"ANY.RUN swag\" class=\"wp-image-19184\" srcset=\"\/cybersecurity-blog\/wp-content\/uploads\/2026\/03\/image2-2-1024x683.jpg 1024w, \/cybersecurity-blog\/wp-content\/uploads\/2026\/03\/image2-2-300x200.jpg 300w, \/cybersecurity-blog\/wp-content\/uploads\/2026\/03\/image2-2-768x512.jpg 768w, \/cybersecurity-blog\/wp-content\/uploads\/2026\/03\/image2-2-370x247.jpg 370w, \/cybersecurity-blog\/wp-content\/uploads\/2026\/03\/image2-2-270x180.jpg 270w, \/cybersecurity-blog\/wp-content\/uploads\/2026\/03\/image2-2-740x493.jpg 740w, \/cybersecurity-blog\/wp-content\/uploads\/2026\/03\/image2-2.jpg 1536w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\"><em>We also brought ANY.RUN swag,\u00a0which\u00a0didn\u2019t\u00a0stay at the booth for long<\/em>\u00a0<\/figcaption><\/figure><\/div>\n\n\n<p>We also had the pleasure of meeting many new companies and potential partners who were exploring ways to strengthen their threat detection and&nbsp;analysis&nbsp;workflows. Conversations like these are always&nbsp;valuable,&nbsp;they help us better understand how security teams&nbsp;operate&nbsp;and what challenges they face in modern SOC environments.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Demonstrating New Capabilities and Exclusives&nbsp;<\/h2>\n\n\n\n<p>At the booth, visitors were able to see both existing ANY.RUN solutions and several new capabilities that expand&nbsp;our&nbsp;products&#8217;&nbsp;visibility and detection power. Some of these updates were shown publicly for the first time.&nbsp;<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"723\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2026\/03\/image3-1-1024x723.jpg\" alt=\"RootedCON visitors\u00a0were among\u00a0the first to see ANY.RUN\u2019s newest capabilities\u00a0\" class=\"wp-image-19185\" srcset=\"\/cybersecurity-blog\/wp-content\/uploads\/2026\/03\/image3-1-1024x723.jpg 1024w, \/cybersecurity-blog\/wp-content\/uploads\/2026\/03\/image3-1-300x212.jpg 300w, \/cybersecurity-blog\/wp-content\/uploads\/2026\/03\/image3-1-768x543.jpg 768w, \/cybersecurity-blog\/wp-content\/uploads\/2026\/03\/image3-1-1536x1085.jpg 1536w, \/cybersecurity-blog\/wp-content\/uploads\/2026\/03\/image3-1-2048x1447.jpg 2048w, \/cybersecurity-blog\/wp-content\/uploads\/2026\/03\/image3-1-370x261.jpg 370w, \/cybersecurity-blog\/wp-content\/uploads\/2026\/03\/image3-1-270x191.jpg 270w, \/cybersecurity-blog\/wp-content\/uploads\/2026\/03\/image3-1-740x523.jpg 740w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\"><em>RootedCON visitors\u00a0were among\u00a0the first to see ANY.RUN\u2019s newest capabilities<\/em>\u00a0<\/figcaption><\/figure><\/div>\n\n\n<p>One of the&nbsp;new technologies&nbsp;we&nbsp;demonstrated&nbsp;was&nbsp;<a href=\"https:\/\/any.run\/cybersecurity-blog\/automatic-ssl-decryption\/\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>automatic SSL decryption<\/strong><\/a><strong>&nbsp;<\/strong>in the&nbsp;<a href=\"https:\/\/any.run\/features\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=anyrun-rootedcon-2026&amp;utm_term=160326&amp;utm_content=linktosandboxlanding\" target=\"_blank\" rel=\"noreferrer noopener\">Interactive Sandbox<\/a>.&nbsp;&nbsp;<\/p>\n\n\n\n<p>As phishing infrastructure increasingly relies on encrypted HTTPS traffic, many malicious actions can appear as normal web activity.&nbsp;&nbsp;<\/p>\n\n\n\n<p>By automatically extracting session keys from process memory and decrypting traffic internally during analysis, the sandbox provides full visibility into encrypted sessions and&nbsp;<strong>helps&nbsp;security teams increase the phishing detection rate and drive down the MTTR<\/strong>.&nbsp;<\/p>\n\n\n\n<!-- Regular Banner START -->\n<div class=\"regular-banner\">\n<!-- Text Content -->\n<p class=\"regular-banner__text\">\n<span class=\"highlight\">Improve SOC detection\n<\/span>and investigation speed <br>Reveal threats faster with <span class=\"highlight\">behavior-based evidence<\/span>   \n<\/p>\n<!-- CTA Link -->\n<a class=\"regular-banner__link\" id=\"article-banner-regular\" href=\"https:\/\/any.run\/enterprise\/?utm_source=anyrunblog&#038;utm_medium=article&#038;utm_campaign=anyrun-rootedcon-2026&#038;utm_term=160326&#038;utm_content=linktoenterprise#contact-sales\" rel=\"noopener\" target=\"_blank\">\nPower up your SOC\n<\/a>\n<\/div>\n<!-- Regular Banner END -->\n<!-- Regular Banner Styles START -->\n\n<style>\n.regular-banner {\ndisplay: flex;\ntext-align: center;\nflex-direction: column;\nalign-items: center;\ngap: 1.5rem;\nwidth: 100%;\npadding: 2rem;\nmargin: 1.5rem 0;\nborder-radius: 0.5rem;\nfont-family: 'Catamaran Bold';\nmargin-inline: auto;\nbackground: rgba(32, 168, 241, 0.1);\nborder: 1px solid rgba(75, 174, 227, 0.32);\n}\n\n.regular-banner__text {\nfont-size: 1.5rem;\nmargin: 0;\n}\n\n.highlight {\ncolor: #ea2526;\n}\n\n.regular-banner__link {\npadding: 0.5rem 1.5rem;\nfont-weight: 500;\ntext-decoration: none;\nborder-radius: 0.5rem;\ncolor: #FFFFFF;\nbackground-color: #1491D4;\ntext-align: center;\ntransition: all 0.2s ease-in;\n}\n\n.regular-banner__link:hover {\nbackground-color: #68CBFF;\ncolor: white;\n}\n<\/style>\n<!-- Regular Banner Styles END -->\n\n\n\n<p>And\u00a0that\u2019s\u00a0just one example of how ANY.RUN continues to evolve. More capabilities are already in development to further strengthen threat detection,\u00a0investigation\u00a0workflows, and cross-platform visibility for modern SOC teams.\u00a0<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">See You Next Year&nbsp;<\/h2>\n\n\n\n<p>We\u2019re&nbsp;grateful to everyone who stopped by the ANY.RUN booth to talk with the team, share feedback, or simply say hello. Events like&nbsp;RootedCON&nbsp;are always a great reminder of how strong and collaborative the cybersecurity community is.&nbsp;<\/p>\n\n\n\n<p>We\u2019re&nbsp;already looking forward to returning next year.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">About ANY.RUN&nbsp;<\/h2>\n\n\n\n<p><a href=\"https:\/\/any.run\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=anyrun-rootedcon-2026&amp;utm_term=160326&amp;utm_content=linktolanding\" target=\"_blank\" rel=\"noreferrer noopener\">ANY.RUN<\/a>&nbsp;provides interactive malware analysis and actionable threat intelligence used by more than 15,000 organizations and&nbsp;600,000&nbsp;security professionals worldwide.&nbsp;&nbsp;<\/p>\n\n\n\n<p>The combined solution stack that includes the&nbsp;<a href=\"https:\/\/any.run\/features\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=anyrun-rootedcon-2026&amp;utm_term=160326&amp;utm_content=linktosandboxlanding\" target=\"_blank\" rel=\"noreferrer noopener\">Interactive Sandbox<\/a>,&nbsp;<a href=\"https:\/\/any.run\/threat-intelligence-lookup\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=anyrun-rootedcon-2026&amp;utm_term=160326&amp;utm_content=linktotilookuplanding\" target=\"_blank\" rel=\"noreferrer noopener\">Threat Intelligence Lookup<\/a>, and&nbsp;<a href=\"https:\/\/any.run\/threat-intelligence-feeds\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=anyrun-rootedcon-2026&amp;utm_term=160326&amp;utm_content=linktotifeedslanding\" target=\"_blank\" rel=\"noreferrer noopener\">Threat Intelligence Feeds<\/a>&nbsp;helps&nbsp;SOC&nbsp;and MSSP&nbsp;teams analyze threats faster, investigate incidents with deeper context, and detect emerging attacks earlier.&nbsp;&nbsp;<\/p>\n\n\n\n<p>ANY.RUN also meets enterprise security and compliance expectations. The company is&nbsp;<a href=\"https:\/\/any.run\/compliance\/\" target=\"_blank\" rel=\"noreferrer noopener\">SOC 2 Type II certified,<\/a>&nbsp;reinforcing its commitment to protecting customer data and&nbsp;maintaining&nbsp;strong security controls.&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>From March 5 to March 7, the&nbsp;ANY.RUN&nbsp;team attended&nbsp;RootedCON&nbsp;2026 in Madrid and&nbsp;showcase&nbsp;some of&nbsp;our&nbsp;latest capabilities developed for modern SOC environments at the conference expo.&nbsp; The event&nbsp;provided&nbsp;a great opportunity&nbsp;to meet&nbsp;our existing clients&nbsp;and&nbsp;connect&nbsp;with security teams exploring advanced threat detection&nbsp;solutions.&nbsp; Meeting the Community and Partners&nbsp; RootedCON&nbsp;is&nbsp;one of the largest cybersecurity conferences in Europe, bringing together thousands of security researchers, SOC [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":19194,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[60],"tags":[57,69,10],"class_list":["post-19180","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news","tag-anyrun","tag-conference","tag-cybersecurity"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v20.10 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>ANY.RUN at RootedCON 2026: Showcasing New Capabilities for SOCs<\/title>\n<meta name=\"description\" content=\"ANY.RUN joined RootedCON 2026 to showcase new capabilities for SOC teams, including SSL decryption and cross-platform analysis.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/any.run\/cybersecurity-blog\/anyrun-rootedcon-2026\/\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"ANY.RUN\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\n\t    \"@context\": \"https:\/\/schema.org\",\n\t    \"@graph\": [\n\t        {\n\t            \"@type\": \"Article\",\n\t            \"@id\": \"https:\/\/any.run\/cybersecurity-blog\/anyrun-rootedcon-2026\/#article\",\n\t            \"isPartOf\": {\n\t                \"@id\": \"https:\/\/any.run\/cybersecurity-blog\/anyrun-rootedcon-2026\/\"\n\t            },\n\t            \"author\": {\n\t                \"name\": \"ANY.RUN\",\n\t                \"@id\": \"https:\/\/any.run\/\"\n\t            },\n\t            \"headline\": \"ANY.RUN at\u00a0RootedCON\u00a02026:\u00a0Meeting Security Teams and Showcasing New Capabilities\u00a0\",\n\t            \"datePublished\": \"2026-03-16T10:48:00+00:00\",\n\t            \"dateModified\": \"2026-03-16T10:48:01+00:00\",\n\t            \"mainEntityOfPage\": {\n\t                \"@id\": \"https:\/\/any.run\/cybersecurity-blog\/anyrun-rootedcon-2026\/\"\n\t            },\n\t            \"wordCount\": 614,\n\t            \"commentCount\": 0,\n\t            \"publisher\": {\n\t                \"@id\": \"https:\/\/any.run\/\"\n\t            },\n\t            \"keywords\": [\n\t                \"ANYRUN\",\n\t                \"conference\",\n\t                \"cybersecurity\"\n\t            ],\n\t            \"articleSection\": [\n\t                \"News\"\n\t            ],\n\t            \"inLanguage\": \"en-US\",\n\t            \"potentialAction\": [\n\t                {\n\t                    \"@type\": \"CommentAction\",\n\t                    \"name\": \"Comment\",\n\t                    \"target\": [\n\t                        \"https:\/\/any.run\/cybersecurity-blog\/anyrun-rootedcon-2026\/#respond\"\n\t                    ]\n\t                }\n\t            ]\n\t        },\n\t        {\n\t            \"@type\": \"WebPage\",\n\t            \"@id\": \"https:\/\/any.run\/cybersecurity-blog\/anyrun-rootedcon-2026\/\",\n\t            \"url\": \"https:\/\/any.run\/cybersecurity-blog\/anyrun-rootedcon-2026\/\",\n\t            \"name\": \"ANY.RUN at RootedCON 2026: Showcasing New Capabilities for SOCs\",\n\t            \"isPartOf\": {\n\t                \"@id\": \"https:\/\/any.run\/\"\n\t            },\n\t            \"datePublished\": \"2026-03-16T10:48:00+00:00\",\n\t            \"dateModified\": \"2026-03-16T10:48:01+00:00\",\n\t            \"description\": \"ANY.RUN joined RootedCON 2026 to showcase new capabilities for SOC teams, including SSL decryption and cross-platform analysis.\",\n\t            \"breadcrumb\": {\n\t                \"@id\": \"https:\/\/any.run\/cybersecurity-blog\/anyrun-rootedcon-2026\/#breadcrumb\"\n\t            },\n\t            \"inLanguage\": \"en-US\",\n\t            \"potentialAction\": [\n\t                {\n\t                    \"@type\": \"ReadAction\",\n\t                    \"target\": [\n\t                        \"https:\/\/any.run\/cybersecurity-blog\/anyrun-rootedcon-2026\/\"\n\t                    ]\n\t                }\n\t            ]\n\t        },\n\t        {\n\t            \"@type\": \"BreadcrumbList\",\n\t            \"@id\": \"https:\/\/any.run\/cybersecurity-blog\/anyrun-rootedcon-2026\/#breadcrumb\",\n\t            \"itemListElement\": [\n\t                {\n\t                    \"@type\": \"ListItem\",\n\t                    \"position\": 1,\n\t                    \"name\": \"Home\",\n\t                    \"item\": \"https:\/\/any.run\/cybersecurity-blog\/\"\n\t                },\n\t                {\n\t                    \"@type\": \"ListItem\",\n\t                    \"position\": 2,\n\t                    \"name\": \"News\",\n\t                    \"item\": \"https:\/\/any.run\/cybersecurity-blog\/category\/news\/\"\n\t                },\n\t                {\n\t                    \"@type\": \"ListItem\",\n\t                    \"position\": 3,\n\t                    \"name\": \"ANY.RUN at\u00a0RootedCON\u00a02026:\u00a0Meeting Security Teams and Showcasing New Capabilities\u00a0\"\n\t                }\n\t            ]\n\t        },\n\t        {\n\t            \"@type\": \"WebSite\",\n\t            \"@id\": \"https:\/\/any.run\/\",\n\t            \"url\": \"https:\/\/any.run\/\",\n\t            \"name\": \"ANY.RUN&#039;s Cybersecurity Blog\",\n\t            \"description\": \"Cybersecurity Blog covers topics for experienced professionals as well as for those new to it.\",\n\t            \"publisher\": {\n\t                \"@id\": \"https:\/\/any.run\/\"\n\t            },\n\t            \"potentialAction\": [\n\t                {\n\t                    \"@type\": \"SearchAction\",\n\t                    \"target\": {\n\t                        \"@type\": \"EntryPoint\",\n\t                        \"urlTemplate\": \"https:\/\/any.run\/?s={search_term_string}\"\n\t                    },\n\t                    \"query-input\": \"required name=search_term_string\"\n\t                }\n\t            ],\n\t            \"inLanguage\": \"en-US\"\n\t        },\n\t        {\n\t            \"@type\": \"Organization\",\n\t            \"@id\": \"https:\/\/any.run\/\",\n\t            \"name\": \"ANY.RUN\",\n\t            \"url\": \"https:\/\/any.run\/\",\n\t            \"logo\": {\n\t                \"@type\": \"ImageObject\",\n\t                \"inLanguage\": \"en-US\",\n\t                \"@id\": \"https:\/\/any.run\/\",\n\t                \"url\": \"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg\",\n\t                \"contentUrl\": \"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg\",\n\t                \"width\": 1,\n\t                \"height\": 1,\n\t                \"caption\": \"ANY.RUN\"\n\t            },\n\t            \"image\": {\n\t                \"@id\": \"https:\/\/any.run\/\"\n\t            },\n\t            \"sameAs\": [\n\t                \"https:\/\/www.facebook.com\/www.any.run\/\",\n\t                \"https:\/\/twitter.com\/anyrun_app\",\n\t                \"https:\/\/www.linkedin.com\/company\/30692044\",\n\t                \"https:\/\/www.youtube.com\/channel\/UCOgCPho7lzmH7m6fPNlukrQ\"\n\t            ]\n\t        },\n\t        {\n\t            \"@type\": \"Person\",\n\t            \"@id\": \"https:\/\/any.run\/\",\n\t            \"name\": \"ANY.RUN\",\n\t            \"image\": {\n\t                \"@type\": \"ImageObject\",\n\t                \"inLanguage\": \"en-US\",\n\t                \"@id\": \"https:\/\/any.run\/\",\n\t                \"url\": \"https:\/\/secure.gravatar.com\/avatar\/c4ce3a6c672056b4a8cd6b0110782215?s=96&d=mm&r=g\",\n\t                \"contentUrl\": \"https:\/\/secure.gravatar.com\/avatar\/c4ce3a6c672056b4a8cd6b0110782215?s=96&d=mm&r=g\",\n\t                \"caption\": \"ANY.RUN\"\n\t            },\n\t            \"url\": \"https:\/\/any.run\/cybersecurity-blog\/author\/a-bespalova\/\"\n\t        }\n\t    ]\n\t}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"ANY.RUN at RootedCON 2026: Showcasing New Capabilities for SOCs","description":"ANY.RUN joined RootedCON 2026 to showcase new capabilities for SOC teams, including SSL decryption and cross-platform analysis.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/any.run\/cybersecurity-blog\/anyrun-rootedcon-2026\/","twitter_misc":{"Written by":"ANY.RUN","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/any.run\/cybersecurity-blog\/anyrun-rootedcon-2026\/#article","isPartOf":{"@id":"https:\/\/any.run\/cybersecurity-blog\/anyrun-rootedcon-2026\/"},"author":{"name":"ANY.RUN","@id":"https:\/\/any.run\/"},"headline":"ANY.RUN at\u00a0RootedCON\u00a02026:\u00a0Meeting Security Teams and Showcasing New Capabilities\u00a0","datePublished":"2026-03-16T10:48:00+00:00","dateModified":"2026-03-16T10:48:01+00:00","mainEntityOfPage":{"@id":"https:\/\/any.run\/cybersecurity-blog\/anyrun-rootedcon-2026\/"},"wordCount":614,"commentCount":0,"publisher":{"@id":"https:\/\/any.run\/"},"keywords":["ANYRUN","conference","cybersecurity"],"articleSection":["News"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/any.run\/cybersecurity-blog\/anyrun-rootedcon-2026\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/any.run\/cybersecurity-blog\/anyrun-rootedcon-2026\/","url":"https:\/\/any.run\/cybersecurity-blog\/anyrun-rootedcon-2026\/","name":"ANY.RUN at RootedCON 2026: Showcasing New Capabilities for SOCs","isPartOf":{"@id":"https:\/\/any.run\/"},"datePublished":"2026-03-16T10:48:00+00:00","dateModified":"2026-03-16T10:48:01+00:00","description":"ANY.RUN joined RootedCON 2026 to showcase new capabilities for SOC teams, including SSL decryption and cross-platform analysis.","breadcrumb":{"@id":"https:\/\/any.run\/cybersecurity-blog\/anyrun-rootedcon-2026\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/any.run\/cybersecurity-blog\/anyrun-rootedcon-2026\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/any.run\/cybersecurity-blog\/anyrun-rootedcon-2026\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/any.run\/cybersecurity-blog\/"},{"@type":"ListItem","position":2,"name":"News","item":"https:\/\/any.run\/cybersecurity-blog\/category\/news\/"},{"@type":"ListItem","position":3,"name":"ANY.RUN at\u00a0RootedCON\u00a02026:\u00a0Meeting Security Teams and Showcasing New Capabilities\u00a0"}]},{"@type":"WebSite","@id":"https:\/\/any.run\/","url":"https:\/\/any.run\/","name":"ANY.RUN&#039;s Cybersecurity Blog","description":"Cybersecurity Blog covers topics for experienced professionals as well as for those new to it.","publisher":{"@id":"https:\/\/any.run\/"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/any.run\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/any.run\/","name":"ANY.RUN","url":"https:\/\/any.run\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/any.run\/","url":"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg","contentUrl":"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg","width":1,"height":1,"caption":"ANY.RUN"},"image":{"@id":"https:\/\/any.run\/"},"sameAs":["https:\/\/www.facebook.com\/www.any.run\/","https:\/\/twitter.com\/anyrun_app","https:\/\/www.linkedin.com\/company\/30692044","https:\/\/www.youtube.com\/channel\/UCOgCPho7lzmH7m6fPNlukrQ"]},{"@type":"Person","@id":"https:\/\/any.run\/","name":"ANY.RUN","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/any.run\/","url":"https:\/\/secure.gravatar.com\/avatar\/c4ce3a6c672056b4a8cd6b0110782215?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/c4ce3a6c672056b4a8cd6b0110782215?s=96&d=mm&r=g","caption":"ANY.RUN"},"url":"https:\/\/any.run\/cybersecurity-blog\/author\/a-bespalova\/"}]}},"_links":{"self":[{"href":"\/cybersecurity-blog\/wp-json\/wp\/v2\/posts\/19180"}],"collection":[{"href":"\/cybersecurity-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"\/cybersecurity-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"\/cybersecurity-blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"\/cybersecurity-blog\/wp-json\/wp\/v2\/comments?post=19180"}],"version-history":[{"count":14,"href":"\/cybersecurity-blog\/wp-json\/wp\/v2\/posts\/19180\/revisions"}],"predecessor-version":[{"id":19199,"href":"\/cybersecurity-blog\/wp-json\/wp\/v2\/posts\/19180\/revisions\/19199"}],"wp:featuredmedia":[{"embeddable":true,"href":"\/cybersecurity-blog\/wp-json\/wp\/v2\/media\/19194"}],"wp:attachment":[{"href":"\/cybersecurity-blog\/wp-json\/wp\/v2\/media?parent=19180"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"\/cybersecurity-blog\/wp-json\/wp\/v2\/categories?post=19180"},{"taxonomy":"post_tag","embeddable":true,"href":"\/cybersecurity-blog\/wp-json\/wp\/v2\/tags?post=19180"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}