{"id":19313,"date":"2026-03-19T13:10:04","date_gmt":"2026-03-19T13:10:04","guid":{"rendered":"\/cybersecurity-blog\/?p=19313"},"modified":"2026-04-06T05:45:25","modified_gmt":"2026-04-06T05:45:25","slug":"anyrun-macos-sandbox","status":"publish","type":"post","link":"\/cybersecurity-blog\/anyrun-macos-sandbox\/","title":{"rendered":"Ready for\u00a0macOS\u00a0Threats: Expanding Your SOC\u2019s Cross-Platform\u00a0Analysis with ANY.RUN\u00a0"},"content":{"rendered":"\n<p>Enterprise security teams are no longer defending a single-platform environment. They are expected&nbsp;to&nbsp;investigate threats&nbsp;across multiple platforms every day,&nbsp;often under constant pressure to move faster and make the right call early.&nbsp;When analysis workflows are split across different tools and environments, triage slows down, investigations take longer, and&nbsp;business&nbsp;risks&nbsp;grow.&nbsp;<\/p>\n\n\n\n<p>To help SOC and <a href=\"https:\/\/any.run\/mssp\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=anyrun-macOS-sandbox&amp;utm_term=190326&amp;utm_content=linktomssp\" target=\"_blank\" rel=\"noreferrer noopener\">MSSP teams<\/a> handle cross-platform threats more efficiently, ANY.RUN now extends its sandbox OS coverage to include macOS, so more investigations can be handled in one environment.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Multi-Platform Infrastructure Creates Challenges&nbsp;for SOCs&nbsp;<\/h2>\n\n\n\n<p>Modern organizations operate across multiple operating systems, and security teams already rely on <a href=\"https:\/\/any.run\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=ANYRUN-macOS-sandbox&amp;utm_term=190326&amp;utm_content=linktolanding\" target=\"_blank\" rel=\"noreferrer noopener\">ANY.RUN<\/a> to investigate threats in <a href=\"https:\/\/any.run\/cybersecurity-blog\/windows-10-sandbox\/\" target=\"_blank\" rel=\"noreferrer noopener\">Windows<\/a>, <a href=\"https:\/\/any.run\/cybersecurity-blog\/linux-malware-analysis-sandbox\/\" target=\"_blank\" rel=\"noreferrer noopener\">Linux<\/a>, and <a href=\"https:\/\/any.run\/cybersecurity-blog\/android-malware-analysis\/\" target=\"_blank\" rel=\"noreferrer noopener\">Android<\/a> environments. As macOS adoption continues to grow across enterprise settings, security teams need to be ready to investigate threats on this platform with the same speed and visibility.<\/p>\n\n\n\n<p>That need is especially important as macOS devices are widely used by engineering, product, and leadership teams.&nbsp;These users often have access to critical systems, internal repositories, and sensitive business data.&nbsp;Threat actors increasingly target these environments with platform-specific malware&nbsp;and phishing,&nbsp;including&nbsp;credential stealers and&nbsp;BEC.&nbsp;<\/p>\n\n\n\n<p>However, many security investigation workflows have not evolved at the same pace.&nbsp;<\/p>\n\n\n\n<p>In many SOCs, <strong>analyzing threats across different operating systems<\/strong> still requires separate solutions or environments. This fragmentation slows down security operations.<\/p>\n\n\n\n<p>Instead of quickly&nbsp;validating&nbsp;suspicious files or URLs, analysts spend time navigating multiple tools and workflows. Over time, this leads to several operational challenges:&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Slower alert triage&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Longer investigation cycles&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Growing alert backlogs&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Increased Mean Time to Respond (<a href=\"https:\/\/any.run\/cybersecurity-blog\/soc-leaders-playbook-faster-mttr\/\" target=\"_blank\" rel=\"noreferrer noopener\">MTTR<\/a>)&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Higher analyst workload and burnout&nbsp;<\/li>\n<\/ul>\n\n\n\n<p>When investigation workflows slow down,&nbsp;<strong>the risk of delayed or missed detections increases.<\/strong>&nbsp;<\/p>\n\n\n\n<p>Security teams need a consistent way to investigate threats across operating systems without adding complexity to their workflows.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Expanding&nbsp;Your&nbsp;SOC\u2019s&nbsp;Cross-Platform Threat Analysis with macOS&nbsp;Sandbox&nbsp;<\/h2>\n\n\n\n<p>To support modern enterprise environments, ANY.RUN is expanding its&nbsp;sandbox&nbsp;with macOS virtual machines, now available in&nbsp;beta&nbsp;for<strong>&nbsp;<\/strong><a href=\"https:\/\/any.run\/plans\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=anyrun-macOS-sandbox&amp;utm_term=190326&amp;utm_content=linktoplans\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>Enterprise Suite<\/strong><\/a><strong>&nbsp;<\/strong>users.&nbsp;<\/p>\n\n\n\n<p>This addition&nbsp;<strong>boosts cross-platform analysis capabilities<\/strong>, allowing SOC teams to&nbsp;investigate suspicious files and URLs&nbsp;to&nbsp;quickly detect threats.&nbsp;&nbsp;<\/p>\n\n\n\n<p>Instead of relying on separate&nbsp;solutions&nbsp;for different operating systems,&nbsp;analysts can conduct investigations within a single&nbsp;sandbox&nbsp;workflow across Windows, Linux, Android, and now macOS environments.&nbsp;<\/p>\n\n\n\n<p>Even if macOS-specific incidents occur less&nbsp;frequently&nbsp;in some organizations, SOC teams still need to be ready to investigate platform-specific samples without delay. macOS offers strong built-in security, but it is not a complete safeguard against modern threats, especially those aimed at stealing credentials, data, or business-critical access. <\/p>\n\n\n\n<p>With macOS now included in the&nbsp;sandbox&nbsp;workflow, analysts can examine Apple-targeted threats without turning to external environments or building separate testing infrastructure.&nbsp;<\/p>\n\n\n\n<!-- Regular Banner START -->\n<div class=\"regular-banner\">\n<!-- Text Content -->\n<p class=\"regular-banner__text\">\nExpand\u00a0your SOC\u2019s <span class=\"highlight\">cross-platform threat visibility\n<\/span> <br> <span class=\"highlight\">Reduce breach risk<\/span> with analysis across 4 major OS\n<\/p>\n<!-- CTA Link -->\n<a class=\"regular-banner__link\" id=\"article-banner-regular\" href=\"https:\/\/any.run\/plans\/?utm_source=anyrunblog&#038;utm_medium=article&#038;utm_campaign=anyrun-macos-sandbox&#038;utm_content=linktoplans&#038;utm_term=190326#macos_blog\" rel=\"noopener\" target=\"_blank\">\nRequest for Your Team\n<\/a>\n<\/div>\n<!-- Regular Banner END -->\n<!-- Regular Banner Styles START -->\n\n<style>\n.regular-banner {\ndisplay: flex;\ntext-align: center;\nflex-direction: column;\nalign-items: center;\ngap: 1.5rem;\nwidth: 100%;\npadding: 2rem;\nmargin: 1.5rem 0;\nborder-radius: 0.5rem;\nfont-family: 'Catamaran Bold';\nmargin-inline: auto;\nbackground: rgba(32, 168, 241, 0.1);\nborder: 1px solid rgba(75, 174, 227, 0.32);\n}\n\n.regular-banner__text {\nfont-size: 1.5rem;\nmargin: 0;\n}\n\n.highlight {\ncolor: #ea2526;\n}\n\n.regular-banner__link {\npadding: 0.5rem 1.5rem;\nfont-weight: 500;\ntext-decoration: none;\nborder-radius: 0.5rem;\ncolor: #FFFFFF;\nbackground-color: #1491D4;\ntext-align: center;\ntransition: all 0.2s ease-in;\n}\n\n.regular-banner__link:hover {\nbackground-color: #68CBFF;\ncolor: white;\n}\n<\/style>\n<!-- Regular Banner Styles END -->\n\n\n\n<h2 class=\"wp-block-heading\">Why Interactive&nbsp;macOS&nbsp;Threat Analysis Is Essential for Modern Security&nbsp;<\/h2>\n\n\n\n<p>A key capability that&nbsp;ANY.RUN makes available with&nbsp;macOS threat analysis is&nbsp;<a href=\"https:\/\/any.run\/features\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=anyrun-macOS-sandbox&amp;utm_term=190326&amp;utm_content=linktosandboxlanding\" target=\"_blank\" rel=\"noreferrer noopener\">interactive&nbsp;sandboxing<\/a>.&nbsp;<\/p>\n\n\n\n<p>Some&nbsp;macOS threats are designed to remain inactive until a user performs specific actions.&nbsp;This may include entering a password, approving a system dialog. Traditional automated&nbsp;sandboxes often&nbsp;fail to&nbsp;trigger these behaviors, which can cause malicious activity to remain hidden during analysis.&nbsp;<\/p>\n\n\n\n<p>ANY.RUN\u2019s interactive environment allows analysts to replicate real user behavior during&nbsp;sandbox&nbsp;execution. This&nbsp;makes it possible to reveal behaviors that automated analysis may miss, such as:&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Credential harvesting through fake authentication dialogs&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Staged execution chains triggered by user interaction&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>File collection or data exfiltration that begins only after authentication&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Social engineering techniques embedded directly in malware execution&nbsp;<\/li>\n<\/ul>\n\n\n\n<p>As a result, analysts gain a clearer understanding of threat intent and impact, helping them&nbsp;<strong>reach investigation decisions faster and with greater confidence<\/strong>.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">How Integrating ANY.RUN\u2019s Sandbox Boosts SOC Performance and Business Security<\/h2>\n\n\n\n<p>Cross-platform&nbsp;<a href=\"https:\/\/any.run\/features\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=anyrun-macOS-sandbox&amp;utm_term=190326&amp;utm_content=linktosandboxlanding\" target=\"_blank\" rel=\"noreferrer noopener\">sandbox&nbsp;analysis<\/a>&nbsp;improves how security teams handle suspicious activity in&nbsp;<strong>daily&nbsp;triage and response&nbsp;operations<\/strong>.&nbsp;<\/p>\n\n\n\n<p>When analysts can investigate threats across operating systems within a single environment, they can <strong>validate alerts faster and reach incident containment decisions <\/strong>with greater confidence.<\/p>\n\n\n\n<p>This operational improvement leads to measurable outcomes:&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Faster validation of suspicious files and URLs:&nbsp;<\/strong>Quick behavioral analysis during alert triage helps analysts confirm malicious activity within minutes.&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Shorter investigation cycles during triage:<\/strong>&nbsp;Analysts&nbsp;observe&nbsp;full execution behavior&nbsp;immediately, reducing manual correlation across multiple investigation tools.&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Improved detection coverage across operating systems:<\/strong>&nbsp;Security teams&nbsp;analyze&nbsp;platform-specific threats across macOS, Windows, Linux, and Android environments.&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Higher analyst productivity per shift:<\/strong>&nbsp;Unified investigation workflows reduce context switching and allow analysts to process more alerts.&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Reduced alert backlog during peak activity:<\/strong>&nbsp;Faster triage decisions help SOC teams stabilize alert queues during phishing campaigns or malware outbreaks.&nbsp;<\/li>\n<\/ul>\n\n\n\n<p>By reducing investigation friction, security teams can focus more time on real threats rather than navigating fragmented tooling.&nbsp;<\/p>\n\n\n\n<p>This directly improves the speed and consistency of detection and response.&nbsp;<\/p>\n\n\n\n<p><a href=\"https:\/\/any.run\/plans\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=anyrun-macos-sandbox&amp;utm_content=linktoplans&amp;utm_term=190326#macos_blog\" target=\"_blank\" rel=\"noreferrer noopener\">Accelerate cross-platform investigations with behavior-based evidence \u279c<\/a>&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Real-World Example:&nbsp;Detecting a macOS Credential Stealer&nbsp;<\/h2>\n\n\n\n<p>As macOS adoption grows in corporate environments, threat actors increasingly develop malware specifically targeting these systems.&nbsp;<\/p>\n\n\n\n<p>One example is <strong>Miolab Stealer<\/strong>, a macOS malware sample analyzed in the <a href=\"https:\/\/any.run\/features\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=anyrun-macOS-sandbox&amp;utm_term=190326&amp;utm_content=linktosandboxlanding\" target=\"_blank\" rel=\"noreferrer noopener\">ANY.RUN sandbox<\/a>.<\/p>\n\n\n\n<p><a href=\"https:\/\/app.any.run\/tasks\/65678bab-2c5f-47b8-b0d4-cb0870b1a3c8?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=anyrun-macOS-sandbox&amp;utm_term=190326&amp;utm_content=linktoservice\" target=\"_blank\" rel=\"noreferrer noopener\">View full&nbsp;sandbox&nbsp;analysis<\/a>&nbsp;<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"569\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2026\/03\/Screenshot-2026-04-06-at-07.42.56-1024x569.png\" alt=\"Miolab\u00a0Stealer analyzed inside ANY.RUN\u00a0sandbox\" class=\"wp-image-19820\" srcset=\"\/cybersecurity-blog\/wp-content\/uploads\/2026\/03\/Screenshot-2026-04-06-at-07.42.56-1024x569.png 1024w, \/cybersecurity-blog\/wp-content\/uploads\/2026\/03\/Screenshot-2026-04-06-at-07.42.56-300x167.png 300w, \/cybersecurity-blog\/wp-content\/uploads\/2026\/03\/Screenshot-2026-04-06-at-07.42.56-768x427.png 768w, \/cybersecurity-blog\/wp-content\/uploads\/2026\/03\/Screenshot-2026-04-06-at-07.42.56-1536x853.png 1536w, \/cybersecurity-blog\/wp-content\/uploads\/2026\/03\/Screenshot-2026-04-06-at-07.42.56-2048x1138.png 2048w, \/cybersecurity-blog\/wp-content\/uploads\/2026\/03\/Screenshot-2026-04-06-at-07.42.56-370x206.png 370w, \/cybersecurity-blog\/wp-content\/uploads\/2026\/03\/Screenshot-2026-04-06-at-07.42.56-270x150.png 270w, \/cybersecurity-blog\/wp-content\/uploads\/2026\/03\/Screenshot-2026-04-06-at-07.42.56-740x411.png 740w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\"><em>Miolab\u00a0Stealer analyzed inside ANY.RUN\u00a0sandbox<\/em><\/figcaption><\/figure><\/div>\n\n\n<p>The sample&nbsp;operates&nbsp;as a credential-stealing tool that first&nbsp;attempts&nbsp;to obtain the user\u2019s system password. It displays a fake system dialog requesting authentication and&nbsp;validates&nbsp;the entered password through the&nbsp;dscl&nbsp;-authonly&nbsp;command.&nbsp;&nbsp;<\/p>\n\n\n\n<p>The window is designed to look&nbsp;very similar&nbsp;to a legitimate macOS system message, making it less likely to raise suspicion. Without a valid password, the malware does not&nbsp;proceed&nbsp;further.&nbsp;<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"512\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2026\/03\/Screenshot-2026-03-13-at-07.59.20-1024x512.png\" alt=\"Legitimate-looking window with\u00a0macOS system message\" class=\"wp-image-19326\" srcset=\"\/cybersecurity-blog\/wp-content\/uploads\/2026\/03\/Screenshot-2026-03-13-at-07.59.20-1024x512.png 1024w, \/cybersecurity-blog\/wp-content\/uploads\/2026\/03\/Screenshot-2026-03-13-at-07.59.20-300x150.png 300w, \/cybersecurity-blog\/wp-content\/uploads\/2026\/03\/Screenshot-2026-03-13-at-07.59.20-768x384.png 768w, \/cybersecurity-blog\/wp-content\/uploads\/2026\/03\/Screenshot-2026-03-13-at-07.59.20-1536x768.png 1536w, \/cybersecurity-blog\/wp-content\/uploads\/2026\/03\/Screenshot-2026-03-13-at-07.59.20-370x185.png 370w, \/cybersecurity-blog\/wp-content\/uploads\/2026\/03\/Screenshot-2026-03-13-at-07.59.20-270x135.png 270w, \/cybersecurity-blog\/wp-content\/uploads\/2026\/03\/Screenshot-2026-03-13-at-07.59.20-740x370.png 740w, \/cybersecurity-blog\/wp-content\/uploads\/2026\/03\/Screenshot-2026-03-13-at-07.59.20.png 1648w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\"><em>Legitimate-looking window with&nbsp;macOS system message&nbsp;demonstrated&nbsp;inside ANY.RUN&nbsp;sandbox<\/em>&nbsp;<\/figcaption><\/figure><\/div>\n\n\n<p>Once authentication succeeds, the malware collects system and hardware information using the&nbsp;system_profiler&nbsp;utility.&nbsp;<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"338\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2026\/03\/Screenshot-2026-03-13-at-08.01.48-1024x338.png\" alt=\"\" class=\"wp-image-19327\" srcset=\"\/cybersecurity-blog\/wp-content\/uploads\/2026\/03\/Screenshot-2026-03-13-at-08.01.48-1024x338.png 1024w, \/cybersecurity-blog\/wp-content\/uploads\/2026\/03\/Screenshot-2026-03-13-at-08.01.48-300x99.png 300w, \/cybersecurity-blog\/wp-content\/uploads\/2026\/03\/Screenshot-2026-03-13-at-08.01.48-768x253.png 768w, \/cybersecurity-blog\/wp-content\/uploads\/2026\/03\/Screenshot-2026-03-13-at-08.01.48-370x122.png 370w, \/cybersecurity-blog\/wp-content\/uploads\/2026\/03\/Screenshot-2026-03-13-at-08.01.48-270x89.png 270w, \/cybersecurity-blog\/wp-content\/uploads\/2026\/03\/Screenshot-2026-03-13-at-08.01.48-740x244.png 740w, \/cybersecurity-blog\/wp-content\/uploads\/2026\/03\/Screenshot-2026-03-13-at-08.01.48.png 1292w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\"><em>Collection of system and hardware info via&nbsp;system_profiler<\/em>&nbsp;<\/figcaption><\/figure><\/div>\n\n\n<p>Next, it launches an AppleScript-based file collection routine that scans user directories such as&nbsp;<strong>Desktop, Documents, and Downloads<\/strong>. It selectively copies files with extensions like PDF, TXT, and RTF into a hidden temporary directory. The files are renamed&nbsp;sequentially&nbsp;and the total collection size is limited to approximately 10 MB.&nbsp;<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"169\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2026\/03\/Screenshot-2026-03-13-at-08.05.32-1024x169.png\" alt=\"AppleScript execution\u00a0observed\u00a0in the ANY.RUN macOS\u00a0sandbox\" class=\"wp-image-19328\" srcset=\"\/cybersecurity-blog\/wp-content\/uploads\/2026\/03\/Screenshot-2026-03-13-at-08.05.32-1024x169.png 1024w, \/cybersecurity-blog\/wp-content\/uploads\/2026\/03\/Screenshot-2026-03-13-at-08.05.32-300x50.png 300w, \/cybersecurity-blog\/wp-content\/uploads\/2026\/03\/Screenshot-2026-03-13-at-08.05.32-768x127.png 768w, \/cybersecurity-blog\/wp-content\/uploads\/2026\/03\/Screenshot-2026-03-13-at-08.05.32-370x61.png 370w, \/cybersecurity-blog\/wp-content\/uploads\/2026\/03\/Screenshot-2026-03-13-at-08.05.32-270x45.png 270w, \/cybersecurity-blog\/wp-content\/uploads\/2026\/03\/Screenshot-2026-03-13-at-08.05.32-740x122.png 740w, \/cybersecurity-blog\/wp-content\/uploads\/2026\/03\/Screenshot-2026-03-13-at-08.05.32.png 1354w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\"><em>AppleScript execution&nbsp;observed&nbsp;in the ANY.RUN macOS&nbsp;sandbox&nbsp;initiating&nbsp;file collection from user directories<\/em>&nbsp;<\/figcaption><\/figure><\/div>\n\n\n<p>The gathered data is then compressed into a ZIP archive using the ditto utility and exfiltrated to a command-and-control server through an HTTP POST request executed with curl.&nbsp;<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"472\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2026\/03\/Screenshot-2026-03-13-at-08.08.46-1024x472.png\" alt=\"ANY.RUN\u00a0sandbox\u00a0detects the behavior of data exfiltration via curl POST\" class=\"wp-image-19329\" srcset=\"\/cybersecurity-blog\/wp-content\/uploads\/2026\/03\/Screenshot-2026-03-13-at-08.08.46-1024x472.png 1024w, \/cybersecurity-blog\/wp-content\/uploads\/2026\/03\/Screenshot-2026-03-13-at-08.08.46-300x138.png 300w, \/cybersecurity-blog\/wp-content\/uploads\/2026\/03\/Screenshot-2026-03-13-at-08.08.46-768x354.png 768w, \/cybersecurity-blog\/wp-content\/uploads\/2026\/03\/Screenshot-2026-03-13-at-08.08.46-370x170.png 370w, \/cybersecurity-blog\/wp-content\/uploads\/2026\/03\/Screenshot-2026-03-13-at-08.08.46-270x124.png 270w, \/cybersecurity-blog\/wp-content\/uploads\/2026\/03\/Screenshot-2026-03-13-at-08.08.46-740x341.png 740w, \/cybersecurity-blog\/wp-content\/uploads\/2026\/03\/Screenshot-2026-03-13-at-08.08.46.png 1198w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\"><em>ANY.RUN&nbsp;sandbox&nbsp;detects the behavior of data exfiltration via curl POST<\/em><\/figcaption><\/figure><\/div>\n\n\n<p>Finally, the malware displays another fake error message to disguise its activity and make the operation appear as a failed system action.&nbsp;<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"469\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2026\/03\/Screenshot-2026-03-13-at-08.10.44-1024x469.png\" alt=\"\" class=\"wp-image-19330\" style=\"width:576px;height:auto\" srcset=\"\/cybersecurity-blog\/wp-content\/uploads\/2026\/03\/Screenshot-2026-03-13-at-08.10.44-1024x469.png 1024w, \/cybersecurity-blog\/wp-content\/uploads\/2026\/03\/Screenshot-2026-03-13-at-08.10.44-300x137.png 300w, \/cybersecurity-blog\/wp-content\/uploads\/2026\/03\/Screenshot-2026-03-13-at-08.10.44-768x352.png 768w, \/cybersecurity-blog\/wp-content\/uploads\/2026\/03\/Screenshot-2026-03-13-at-08.10.44-370x169.png 370w, \/cybersecurity-blog\/wp-content\/uploads\/2026\/03\/Screenshot-2026-03-13-at-08.10.44-270x124.png 270w, \/cybersecurity-blog\/wp-content\/uploads\/2026\/03\/Screenshot-2026-03-13-at-08.10.44-740x339.png 740w, \/cybersecurity-blog\/wp-content\/uploads\/2026\/03\/Screenshot-2026-03-13-at-08.10.44.png 1258w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\"><em>Fake error message to hide malicious activity<\/em><\/figcaption><\/figure><\/div>\n\n\n<p>From a detection perspective, this activity chain can be&nbsp;identified&nbsp;by a combination of behavioral indicators, including:&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Execution of&nbsp;osascript&nbsp;displaying deceptive system dialogs&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>AppleScript-driven file collection from user directories&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Use of ditto for archive creation&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Outbound data upload using curl&nbsp;<\/li>\n<\/ul>\n\n\n\n<p>Observing this behavior in the&nbsp;sandbox&nbsp;gives analysts immediate clarity on the sample\u2019s intent, capabilities, and potential business impact, allowing them to move faster from uncertainty to confident response.&nbsp;<\/p>\n\n\n\n<!-- Regular Banner START -->\n<div class=\"regular-banner\">\n<!-- Text Content -->\n<p class=\"regular-banner__text\">\nInvestigate threats across <span class=\"highlight\">4\u00a0major\u00a0enterprise environments\n<\/span> <br> <span class=\"highlight\">Reduce triage delays<\/span>  and respond with confidence \n<\/p>\n<!-- CTA Link -->\n<a class=\"regular-banner__link\" id=\"article-banner-regular\" href=\"https:\/\/any.run\/plans\/?utm_source=anyrunblog&#038;utm_medium=article&#038;utm_campaign=anyrun-macos-sandbox&#038;utm_content=linktoplans&#038;utm_term=190326#macos_blog\" rel=\"noopener\" target=\"_blank\">\nRequest for your SOC\n<\/a>\n<\/div>\n<!-- Regular Banner END -->\n<!-- Regular Banner Styles START -->\n\n<style>\n.regular-banner {\ndisplay: flex;\ntext-align: center;\nflex-direction: column;\nalign-items: center;\ngap: 1.5rem;\nwidth: 100%;\npadding: 2rem;\nmargin: 1.5rem 0;\nborder-radius: 0.5rem;\nfont-family: 'Catamaran Bold';\nmargin-inline: auto;\nbackground: rgba(32, 168, 241, 0.1);\nborder: 1px solid rgba(75, 174, 227, 0.32);\n}\n\n.regular-banner__text {\nfont-size: 1.5rem;\nmargin: 0;\n}\n\n.highlight {\ncolor: #ea2526;\n}\n\n.regular-banner__link {\npadding: 0.5rem 1.5rem;\nfont-weight: 500;\ntext-decoration: none;\nborder-radius: 0.5rem;\ncolor: #FFFFFF;\nbackground-color: #1491D4;\ntext-align: center;\ntransition: all 0.2s ease-in;\n}\n\n.regular-banner__link:hover {\nbackground-color: #68CBFF;\ncolor: white;\n}\n<\/style>\n<!-- Regular Banner Styles END -->\n\n\n\n<h2 class=\"wp-block-heading\">About ANY.RUN&nbsp;<\/h2>\n\n\n\n<p><a href=\"https:\/\/any.run\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=ANYRUN-macOS-sandbox&amp;utm_term=190326&amp;utm_content=linktolanding\" target=\"_blank\" rel=\"noreferrer noopener\">ANY.RUN<\/a>, a leading provider of interactive malware analysis and threat intelligence solutions, helps security teams investigate threats faster and with greater clarity across modern enterprise environments.&nbsp;<\/p>\n\n\n\n<p>It allows teams to safely execute suspicious files and URLs,&nbsp;observe&nbsp;real behavior in an&nbsp;<a href=\"https:\/\/any.run\/features\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=anyrun-macOS-sandbox&amp;utm_term=190326&amp;utm_content=linktosandboxlanding\" target=\"_blank\" rel=\"noreferrer noopener\">Interactive&nbsp;Sandbox<\/a>, enrich&nbsp;indicators&nbsp;with immediate context through&nbsp;<a href=\"https:\/\/any.run\/threat-intelligence-lookup\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=anyrun-macOS-sandbox&amp;utm_term=190326&amp;utm_content=linktotilookuplanding\" target=\"_blank\" rel=\"noreferrer noopener\">TI Lookup<\/a>, and&nbsp;monitor&nbsp;emerging malicious infrastructure using&nbsp;<a href=\"https:\/\/any.run\/threat-intelligence-feeds\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=anyrun-macOS-sandbox&amp;utm_term=190326&amp;utm_content=linktotifeedslanding\" target=\"_blank\" rel=\"noreferrer noopener\">Threat Intelligence Feeds<\/a>. Together, these capabilities help reduce investigation uncertainty, accelerate triage, and limit unnecessary escalations across the SOC.&nbsp;<\/p>\n\n\n\n<p>ANY.RUN is trusted by thousands of organizations worldwide and meets enterprise security and compliance expectations. It is&nbsp;<a href=\"https:\/\/any.run\/compliance\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=anyrun-macOS-sandbox&amp;utm_term=190326&amp;utm_content=linktocompliance\" target=\"_blank\" rel=\"noreferrer noopener\">SOC 2 Type II certified<\/a>,&nbsp;demonstrating&nbsp;its commitment to protecting customer data and&nbsp;maintaining&nbsp;strong security controls.&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Enterprise security teams are no longer defending a single-platform environment. They are expected&nbsp;to&nbsp;investigate threats&nbsp;across multiple platforms every day,&nbsp;often under constant pressure to move faster and make the right call early.&nbsp;When analysis workflows are split across different tools and environments, triage slows down, investigations take longer, and&nbsp;business&nbsp;risks&nbsp;grow.&nbsp; To help SOC and MSSP teams handle cross-platform threats [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":19344,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[9],"tags":[57,10,56],"class_list":["post-19313","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-service-updates","tag-anyrun","tag-cybersecurity","tag-update"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v20.10 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Ready for macOS Threats: Cross-Platform SOC Analysis with ANY.RUN<\/title>\n<meta name=\"description\" content=\"macOS threats are targeting enterprise environments. See how SOC teams can investigate cross-platform malware faster with interactive sandbox.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/any.run\/cybersecurity-blog\/anyrun-macos-sandbox\/\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"ANY.RUN\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\n\t    \"@context\": \"https:\/\/schema.org\",\n\t    \"@graph\": [\n\t        {\n\t            \"@type\": \"Article\",\n\t            \"@id\": \"https:\/\/any.run\/cybersecurity-blog\/anyrun-macos-sandbox\/#article\",\n\t            \"isPartOf\": {\n\t                \"@id\": \"https:\/\/any.run\/cybersecurity-blog\/anyrun-macos-sandbox\/\"\n\t            },\n\t            \"author\": {\n\t                \"name\": \"ANY.RUN\",\n\t                \"@id\": \"https:\/\/any.run\/\"\n\t            },\n\t            \"headline\": \"Ready for\u00a0macOS\u00a0Threats: Expanding Your SOC\u2019s Cross-Platform\u00a0Analysis with ANY.RUN\u00a0\",\n\t            \"datePublished\": \"2026-03-19T13:10:04+00:00\",\n\t            \"dateModified\": \"2026-04-06T05:45:25+00:00\",\n\t            \"mainEntityOfPage\": {\n\t                \"@id\": \"https:\/\/any.run\/cybersecurity-blog\/anyrun-macos-sandbox\/\"\n\t            },\n\t            \"wordCount\": 1491,\n\t            \"commentCount\": 0,\n\t            \"publisher\": {\n\t                \"@id\": \"https:\/\/any.run\/\"\n\t            },\n\t            \"keywords\": [\n\t                \"ANYRUN\",\n\t                \"cybersecurity\",\n\t                \"update\"\n\t            ],\n\t            \"articleSection\": [\n\t                \"Service Updates\"\n\t            ],\n\t            \"inLanguage\": \"en-US\",\n\t            \"potentialAction\": [\n\t                {\n\t                    \"@type\": \"CommentAction\",\n\t                    \"name\": \"Comment\",\n\t                    \"target\": [\n\t                        \"https:\/\/any.run\/cybersecurity-blog\/anyrun-macos-sandbox\/#respond\"\n\t                    ]\n\t                }\n\t            ]\n\t        },\n\t        {\n\t            \"@type\": \"WebPage\",\n\t            \"@id\": \"https:\/\/any.run\/cybersecurity-blog\/anyrun-macos-sandbox\/\",\n\t            \"url\": \"https:\/\/any.run\/cybersecurity-blog\/anyrun-macos-sandbox\/\",\n\t            \"name\": \"Ready for macOS Threats: Cross-Platform SOC Analysis with ANY.RUN\",\n\t            \"isPartOf\": {\n\t                \"@id\": \"https:\/\/any.run\/\"\n\t            },\n\t            \"datePublished\": \"2026-03-19T13:10:04+00:00\",\n\t            \"dateModified\": \"2026-04-06T05:45:25+00:00\",\n\t            \"description\": \"macOS threats are targeting enterprise environments. See how SOC teams can investigate cross-platform malware faster with interactive sandbox.\",\n\t            \"breadcrumb\": {\n\t                \"@id\": \"https:\/\/any.run\/cybersecurity-blog\/anyrun-macos-sandbox\/#breadcrumb\"\n\t            },\n\t            \"inLanguage\": \"en-US\",\n\t            \"potentialAction\": [\n\t                {\n\t                    \"@type\": \"ReadAction\",\n\t                    \"target\": [\n\t                        \"https:\/\/any.run\/cybersecurity-blog\/anyrun-macos-sandbox\/\"\n\t                    ]\n\t                }\n\t            ]\n\t        },\n\t        {\n\t            \"@type\": \"BreadcrumbList\",\n\t            \"@id\": \"https:\/\/any.run\/cybersecurity-blog\/anyrun-macos-sandbox\/#breadcrumb\",\n\t            \"itemListElement\": [\n\t                {\n\t                    \"@type\": \"ListItem\",\n\t                    \"position\": 1,\n\t                    \"name\": \"Home\",\n\t                    \"item\": \"https:\/\/any.run\/cybersecurity-blog\/\"\n\t                },\n\t                {\n\t                    \"@type\": \"ListItem\",\n\t                    \"position\": 2,\n\t                    \"name\": \"Service Updates\",\n\t                    \"item\": \"https:\/\/any.run\/cybersecurity-blog\/category\/service-updates\/\"\n\t                },\n\t                {\n\t                    \"@type\": \"ListItem\",\n\t                    \"position\": 3,\n\t                    \"name\": \"Ready for\u00a0macOS\u00a0Threats: Expanding Your SOC\u2019s Cross-Platform\u00a0Analysis with ANY.RUN\u00a0\"\n\t                }\n\t            ]\n\t        },\n\t        {\n\t            \"@type\": \"WebSite\",\n\t            \"@id\": \"https:\/\/any.run\/\",\n\t            \"url\": \"https:\/\/any.run\/\",\n\t            \"name\": \"ANY.RUN&#039;s Cybersecurity Blog\",\n\t            \"description\": \"Cybersecurity Blog covers topics for experienced professionals as well as for those new to it.\",\n\t            \"publisher\": {\n\t                \"@id\": \"https:\/\/any.run\/\"\n\t            },\n\t            \"potentialAction\": [\n\t                {\n\t                    \"@type\": \"SearchAction\",\n\t                    \"target\": {\n\t                        \"@type\": \"EntryPoint\",\n\t                        \"urlTemplate\": \"https:\/\/any.run\/?s={search_term_string}\"\n\t                    },\n\t                    \"query-input\": \"required name=search_term_string\"\n\t                }\n\t            ],\n\t            \"inLanguage\": \"en-US\"\n\t        },\n\t        {\n\t            \"@type\": \"Organization\",\n\t            \"@id\": \"https:\/\/any.run\/\",\n\t            \"name\": \"ANY.RUN\",\n\t            \"url\": \"https:\/\/any.run\/\",\n\t            \"logo\": {\n\t                \"@type\": \"ImageObject\",\n\t                \"inLanguage\": \"en-US\",\n\t                \"@id\": \"https:\/\/any.run\/\",\n\t                \"url\": \"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg\",\n\t                \"contentUrl\": \"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg\",\n\t                \"width\": 1,\n\t                \"height\": 1,\n\t                \"caption\": \"ANY.RUN\"\n\t            },\n\t            \"image\": {\n\t                \"@id\": \"https:\/\/any.run\/\"\n\t            },\n\t            \"sameAs\": [\n\t                \"https:\/\/www.facebook.com\/www.any.run\/\",\n\t                \"https:\/\/twitter.com\/anyrun_app\",\n\t                \"https:\/\/www.linkedin.com\/company\/30692044\",\n\t                \"https:\/\/www.youtube.com\/channel\/UCOgCPho7lzmH7m6fPNlukrQ\"\n\t            ]\n\t        },\n\t        {\n\t            \"@type\": \"Person\",\n\t            \"@id\": \"https:\/\/any.run\/\",\n\t            \"name\": \"ANY.RUN\",\n\t            \"image\": {\n\t                \"@type\": \"ImageObject\",\n\t                \"inLanguage\": \"en-US\",\n\t                \"@id\": \"https:\/\/any.run\/\",\n\t                \"url\": \"https:\/\/secure.gravatar.com\/avatar\/c4ce3a6c672056b4a8cd6b0110782215?s=96&d=mm&r=g\",\n\t                \"contentUrl\": \"https:\/\/secure.gravatar.com\/avatar\/c4ce3a6c672056b4a8cd6b0110782215?s=96&d=mm&r=g\",\n\t                \"caption\": \"ANY.RUN\"\n\t            },\n\t            \"url\": \"https:\/\/any.run\/cybersecurity-blog\/author\/a-bespalova\/\"\n\t        }\n\t    ]\n\t}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Ready for macOS Threats: Cross-Platform SOC Analysis with ANY.RUN","description":"macOS threats are targeting enterprise environments. See how SOC teams can investigate cross-platform malware faster with interactive sandbox.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/any.run\/cybersecurity-blog\/anyrun-macos-sandbox\/","twitter_misc":{"Written by":"ANY.RUN","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/any.run\/cybersecurity-blog\/anyrun-macos-sandbox\/#article","isPartOf":{"@id":"https:\/\/any.run\/cybersecurity-blog\/anyrun-macos-sandbox\/"},"author":{"name":"ANY.RUN","@id":"https:\/\/any.run\/"},"headline":"Ready for\u00a0macOS\u00a0Threats: Expanding Your SOC\u2019s Cross-Platform\u00a0Analysis with ANY.RUN\u00a0","datePublished":"2026-03-19T13:10:04+00:00","dateModified":"2026-04-06T05:45:25+00:00","mainEntityOfPage":{"@id":"https:\/\/any.run\/cybersecurity-blog\/anyrun-macos-sandbox\/"},"wordCount":1491,"commentCount":0,"publisher":{"@id":"https:\/\/any.run\/"},"keywords":["ANYRUN","cybersecurity","update"],"articleSection":["Service Updates"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/any.run\/cybersecurity-blog\/anyrun-macos-sandbox\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/any.run\/cybersecurity-blog\/anyrun-macos-sandbox\/","url":"https:\/\/any.run\/cybersecurity-blog\/anyrun-macos-sandbox\/","name":"Ready for macOS Threats: Cross-Platform SOC Analysis with ANY.RUN","isPartOf":{"@id":"https:\/\/any.run\/"},"datePublished":"2026-03-19T13:10:04+00:00","dateModified":"2026-04-06T05:45:25+00:00","description":"macOS threats are targeting enterprise environments. See how SOC teams can investigate cross-platform malware faster with interactive sandbox.","breadcrumb":{"@id":"https:\/\/any.run\/cybersecurity-blog\/anyrun-macos-sandbox\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/any.run\/cybersecurity-blog\/anyrun-macos-sandbox\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/any.run\/cybersecurity-blog\/anyrun-macos-sandbox\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/any.run\/cybersecurity-blog\/"},{"@type":"ListItem","position":2,"name":"Service Updates","item":"https:\/\/any.run\/cybersecurity-blog\/category\/service-updates\/"},{"@type":"ListItem","position":3,"name":"Ready for\u00a0macOS\u00a0Threats: Expanding Your SOC\u2019s Cross-Platform\u00a0Analysis with ANY.RUN\u00a0"}]},{"@type":"WebSite","@id":"https:\/\/any.run\/","url":"https:\/\/any.run\/","name":"ANY.RUN&#039;s Cybersecurity Blog","description":"Cybersecurity Blog covers topics for experienced professionals as well as for those new to it.","publisher":{"@id":"https:\/\/any.run\/"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/any.run\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/any.run\/","name":"ANY.RUN","url":"https:\/\/any.run\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/any.run\/","url":"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg","contentUrl":"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg","width":1,"height":1,"caption":"ANY.RUN"},"image":{"@id":"https:\/\/any.run\/"},"sameAs":["https:\/\/www.facebook.com\/www.any.run\/","https:\/\/twitter.com\/anyrun_app","https:\/\/www.linkedin.com\/company\/30692044","https:\/\/www.youtube.com\/channel\/UCOgCPho7lzmH7m6fPNlukrQ"]},{"@type":"Person","@id":"https:\/\/any.run\/","name":"ANY.RUN","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/any.run\/","url":"https:\/\/secure.gravatar.com\/avatar\/c4ce3a6c672056b4a8cd6b0110782215?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/c4ce3a6c672056b4a8cd6b0110782215?s=96&d=mm&r=g","caption":"ANY.RUN"},"url":"https:\/\/any.run\/cybersecurity-blog\/author\/a-bespalova\/"}]}},"_links":{"self":[{"href":"\/cybersecurity-blog\/wp-json\/wp\/v2\/posts\/19313"}],"collection":[{"href":"\/cybersecurity-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"\/cybersecurity-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"\/cybersecurity-blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"\/cybersecurity-blog\/wp-json\/wp\/v2\/comments?post=19313"}],"version-history":[{"count":45,"href":"\/cybersecurity-blog\/wp-json\/wp\/v2\/posts\/19313\/revisions"}],"predecessor-version":[{"id":19821,"href":"\/cybersecurity-blog\/wp-json\/wp\/v2\/posts\/19313\/revisions\/19821"}],"wp:featuredmedia":[{"embeddable":true,"href":"\/cybersecurity-blog\/wp-json\/wp\/v2\/media\/19344"}],"wp:attachment":[{"href":"\/cybersecurity-blog\/wp-json\/wp\/v2\/media?parent=19313"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"\/cybersecurity-blog\/wp-json\/wp\/v2\/categories?post=19313"},{"taxonomy":"post_tag","embeddable":true,"href":"\/cybersecurity-blog\/wp-json\/wp\/v2\/tags?post=19313"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}