{"id":1957,"date":"2022-01-21T00:57:00","date_gmt":"2022-01-21T00:57:00","guid":{"rendered":"\/cybersecurity-blog\/?p=1957"},"modified":"2022-12-21T06:48:17","modified_gmt":"2022-12-21T06:48:17","slug":"annual-report-2021","status":"publish","type":"post","link":"https:\/\/any.run\/cybersecurity-blog\/annual-report-2021\/","title":{"rendered":"Annual Report 2021"},"content":{"rendered":"\n<p>2021 was rich in incidents in cybersecurity. Today we discuss significant events that happened in the past year. And how the industry will develop in the future. ANY.RUN is ready to share the trends in our annual report.<br><\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Cybersecurity 2021 review&nbsp;<\/h3>\n\n\n\n<ol class=\"wp-block-list\" start=\"1\"><li>Countries have started cooperating. And all actors of cyberattacks had to face the consequences in real life. Several gangs <a href=\"https:\/\/www.europol.europa.eu\/media-press\/newsroom\/news\/five-affiliates-to-sodinokibi\/revil-unplugged\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">were arrested:<\/a> members of GandGrab, REvil, DarkSide, Cl0p. Their activities were shut down globally. Unfortunately, it doesn\u2019t mean that they will disappear for good. Rebranding, redesign, and gangs are back on track. <a href=\"https:\/\/any.run\/malware-trends\/emotet\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">Emotet<\/a> really drove this message home.<\/li><\/ol>\n\n\n\n<figure class=\"wp-block-embed-twitter wp-block-embed is-type-rich is-provider-twitter\"><div class=\"wp-block-embed__wrapper\">\n<blockquote class=\"twitter-tweet\" data-width=\"550\" data-dnt=\"true\"><p lang=\"en\" dir=\"ltr\"><a href=\"https:\/\/twitter.com\/hashtag\/Emotet?src=hash&amp;ref_src=twsrc%5Etfw\">#Emotet<\/a> is reborn again! The botnet delivers both malicious documents and payloads from C2 right now. The maldocs for distribution are Excel and Word files. But there is no sign for active spam yet. Don&#39;t miss the latest news about <a href=\"https:\/\/twitter.com\/hashtag\/Emotet?src=hash&amp;ref_src=twsrc%5Etfw\">#Emotet<\/a> with ANYRUN! <a href=\"https:\/\/t.co\/ZwuicNpZcc\">https:\/\/t.co\/ZwuicNpZcc<\/a><\/p>&mdash; ANY.RUN (@anyrun_app) <a href=\"https:\/\/twitter.com\/anyrun_app\/status\/1460502788404924419?ref_src=twsrc%5Etfw\">November 16, 2021<\/a><\/blockquote><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script>\n<\/div><\/figure>\n\n\n\n<ol class=\"wp-block-list\" start=\"2\"><li>Gangs leveled up. If we speak about hackers now, the image of rookies in the basements is fading away. Crooks of 2021 started to look like a large organization, well-structured, with quite good talents that they hire and modern tools. Attackers have become an even more severe danger than we have known before.<\/li><\/ol>\n\n\n\n<ol class=\"wp-block-list\" start=\"3\"><li>The aftermath of an incident is growing. Cybersecurity is a part of everyday life for SOC specialists and any users. Hacker attacks started to influence the lives of all society. Common apps and services find themselves in danger. And people began to be aware of it. <a href=\"https:\/\/www.businessinsider.com\/solarwinds-hack-us-government-agencies-cisa-fireeye-microsoft-2020-12?r=kc-sub\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">Solarwinds<\/a> and <a href=\"https:\/\/www.nytimes.com\/2021\/05\/14\/us\/politics\/pipeline-hack.html\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">American Pipeline<\/a> examples made a terrible statement \u2013 a quarter of a country can become a target of an attack.&nbsp;<\/li><\/ol>\n\n\n\n<ol class=\"wp-block-list\" start=\"4\"><li>Life after the pandemic is coming back on rails. The world got used to new conditions, and cybersecurity as an industry started to grow again. According to the research, at least a 20% rise can be monitored in this sector.<\/li><\/ol>\n\n\n\n<ol class=\"wp-block-list\" start=\"5\"><li>Cyber training has become popular. Companies understand that it\u2019s no longer enough to use tools for defense. The staff needs to be trained regularly, the demand for qualified specialists is growing. The best way is to experience an actual attack in a safe environment, like <a href=\"https:\/\/any.run\/cybersecurity-blog\/red-and-blue-teams-training\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">red and blue training<\/a>. And it is also a great way to improve your skills as an expert.&nbsp;<\/li><\/ol>\n\n\n\n<ol class=\"wp-block-list\" start=\"6\"><li>Development of new tools. As specialists in our sphere are always lacking, companies decided to change their strategies. Now they rather have less staff and rely less on experts while designing defense strategies. And here appeared:&nbsp;<\/li><\/ol>\n\n\n\n<p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;-sandboxes<\/p>\n\n\n\n<p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;-ATP for industrial, financial, and health companies<\/p>\n\n\n\n<p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;-SIEM systems<br><\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Malware 2021 review&nbsp;<\/h3>\n\n\n\n<p>The number of malware has increased considerably. Every <a href=\"https:\/\/techjury.net\/blog\/how-many-cyber-attacks-per-day\/#gref\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">39 seconds<\/a> a unique attack happens. Ransomware was on the top, Emotet came back, a bold rookie REdLine conquered all ratings.<br><\/p>\n\n\n\n<p><a href=\"https:\/\/any.run\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=in-house&amp;utm_content=report_2021\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">ANY.RUN<\/a> is also glad to show you some numbers. This year 2,239,643 samples were analyzed on the service. In the figure below, you can see the statistics of top threats by uploads for 2021:&nbsp;<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/lh3.googleusercontent.com\/3t5uQj4erpyLMj50JQl0SD1GceBfM6mSFxdK8qSLsw-8tTZN9Q-0ZCdx69iyxuvAS-56-okq_osWZIdJ-NRxcn0d-ckYME5Tts1keCyaiOHRxw9TkWkSgermpz5aIKFdMo01DXEe\" alt=\"Top malware in 2021\"\/><figcaption>Top malware in 2021<\/figcaption><\/figure>\n\n\n\n<p>We also have results of the most widespread malware types uploaded in ANY.RUN. Have a look at the graph below. And build your defense strategies keeping this rating in mind.&nbsp;<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/lh4.googleusercontent.com\/kaNmILzmCjm8H1G7U0el81KWs-m6V529UTzv8d9N1FWbn70STIq_RfB3Q009gDOViQTmxPRIQuL_nCiD2XJA8iQPFbuDLp6n4bXNqwgVSmuBwHsiqLXfT15rgI0KSXjq2MDyCC_8\" alt=\"Top malware types in 2021\"\/><figcaption>Top malware types in 2021<\/figcaption><\/figure>\n\n\n\n<h3 class=\"wp-block-heading\">ANY.RUN in 2021<\/h3>\n\n\n\n<p>As you may notice, 2021 was a year of changes for ANY.RUN. We hope service upgrades come in handy for your work. Let\u2019s recap some significant platform\u2019s transformations:<br><\/p>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>Interface<\/strong><br><\/h4>\n\n\n\n<p>During the year, the interface of almost the whole service was done. All modal windows got redesigned and improved, including:<br><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>New task.<\/strong> The configuration and command-line presets were added.<\/li><li><a href=\"https:\/\/any.run\/cybersecurity-blog\/mitre-attack\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\"><strong>MITRE ATT&amp;CK Matrix<\/strong><\/a><strong>.<\/strong> Analysis has become more structural, intuitive, and convenient with considered groups with sub-techniques.&nbsp;<\/li><li><strong>Network Streams.<\/strong> Now dealing with traffic is way more convenient, and all the data is more informative.<\/li><li><strong>Techniques details.<\/strong> Regrouped events and more data to make your analysis.&nbsp;<\/li><li><strong>Interactive tutorials<\/strong>. We introduced a detailed guide on how to analyze threats.<\/li><\/ul>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>Service<\/strong>&nbsp;<br><\/h4>\n\n\n\n<ul class=\"wp-block-list\"><li>In 2021 our main priority was to improve <a href=\"https:\/\/any.run\/cybersecurity-blog\/detection-with-suricata-ids\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">malware detection<\/a>. It allows identifying threats faster and more effectively.&nbsp;<\/li><li>We enhanced monitoring and service efficiency.<\/li><li>The design team worked on NPS metrics to find out how satisfied the clients were. The results were astonishing \u2013 the positive response outperformed the market. Users appreciate our service and like investigating malware on the platform. Thank you!&nbsp;<\/li><\/ul>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>Behind the scenes<\/strong><br><\/h4>\n\n\n\n<ul class=\"wp-block-list\"><li>The QA team had detailed test cases, and the quality of testing rocketed. We focused on automated testing as well.&nbsp;<\/li><li>Architectural approaches and working processes improvement let us prepare quite a bunch of new features that you will see in the upcoming year.&nbsp;<\/li><li>The development team got rid of old technologies and libraries and renewed the stack completely.<\/li><li>The deployment process got more accessible and faster.<\/li><\/ul>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>ANY.RUN team&nbsp;<\/strong><br><\/h4>\n\n\n\n<p>We have evolved profoundly. Staff doubled in size, got rebalanced, and reorganized. Proud to say that we are not just a set of specialists and experts but a real crew with a strong partnership. Great vibes, support, and high communication are a must for us, even <a href=\"https:\/\/any.run\/cybersecurity-blog\/working-remotely-in-cybersecurity\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">working remotely<\/a>. Moreover, motivation to work better is growing, encouraging constant self-development. Go, team!<br><\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Cybersecurity trends for 2022<\/h3>\n\n\n\n<p>2021 wasn\u2019t an easy year for cybersecurity. However, the industry is growing, and we hope that this tendency will continue this year. In our opinion, we can expect the following trends in 2022:&nbsp;<br><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>DevSecOps and other technologies for safe programming will be in use.<\/li><li>The community needs to expand: sharing the best practices, <a href=\"https:\/\/any.run\/cybersecurity-blog\/indicators-of-compromise\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">IOCs<\/a>, expertise, <a href=\"https:\/\/any.run\/cybersecurity-blog\/threat-hunting\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">threat hunting<\/a>.&nbsp;<\/li><li>AI development and its defense methods form correct datasets for machine learning.<\/li><li>Cloud security will become a priority. Especially with the growth of platforms with different security solutions.<\/li><\/ul>\n\n\n\n<p>ANY.RUN is also planning to have some significant changes in 2022. Stay tuned for news, and thank you for staying with us!<br><\/p>\n\n\n\n<p>Do you think 2022 brings something else, or would you like to share your opinion on the past year? Feel free to leave a comment down below.&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>2021 was rich in incidents in cybersecurity. Today we discuss significant events that happened in the past year. And how the industry will develop in the future. ANY.RUN is ready to share the trends in our annual report. Cybersecurity 2021 review&nbsp; Countries have started cooperating. And all actors of cyberattacks had to face the consequences [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":3664,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[9],"tags":[57],"class_list":["post-1957","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-service-updates","tag-anyrun"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v20.10 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Annual Report 2021 - ANY.RUN&#039;s Cybersecurity Blog<\/title>\n<meta name=\"description\" content=\"The service&#039;s review of the year with up-to-date statistics. You will learn about the top malware by uploads and significant events of the past year.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/any.run\/cybersecurity-blog\/annual-report-2021\/\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"ANY.RUN\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/annual-report-2021\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/annual-report-2021\/\"},\"author\":{\"name\":\"ANY.RUN\",\"@id\":\"https:\/\/any.run\/\"},\"headline\":\"Annual Report 2021\",\"datePublished\":\"2022-01-21T00:57:00+00:00\",\"dateModified\":\"2022-12-21T06:48:17+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/annual-report-2021\/\"},\"wordCount\":977,\"commentCount\":1,\"publisher\":{\"@id\":\"https:\/\/any.run\/\"},\"keywords\":[\"ANYRUN\"],\"articleSection\":[\"Service Updates\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/any.run\/cybersecurity-blog\/annual-report-2021\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/annual-report-2021\/\",\"url\":\"https:\/\/any.run\/cybersecurity-blog\/annual-report-2021\/\",\"name\":\"Annual Report 2021 - ANY.RUN&#039;s Cybersecurity Blog\",\"isPartOf\":{\"@id\":\"https:\/\/any.run\/\"},\"datePublished\":\"2022-01-21T00:57:00+00:00\",\"dateModified\":\"2022-12-21T06:48:17+00:00\",\"description\":\"The service's review of the year with up-to-date statistics. You will learn about the top malware by uploads and significant events of the past year.\",\"breadcrumb\":{\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/annual-report-2021\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/any.run\/cybersecurity-blog\/annual-report-2021\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/annual-report-2021\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/any.run\/cybersecurity-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"teamwork\",\"item\":\"https:\/\/any.run\/tag\/teamwork\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Annual Report 2021\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/any.run\/\",\"url\":\"https:\/\/any.run\/\",\"name\":\"ANY.RUN&#039;s Cybersecurity Blog\",\"description\":\"Cybersecurity Blog covers topics for experienced professionals as well as for those new to it.\",\"publisher\":{\"@id\":\"https:\/\/any.run\/\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/any.run\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/any.run\/\",\"name\":\"ANY.RUN\",\"url\":\"https:\/\/any.run\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/any.run\/\",\"url\":\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg\",\"contentUrl\":\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg\",\"width\":1,\"height\":1,\"caption\":\"ANY.RUN\"},\"image\":{\"@id\":\"https:\/\/any.run\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/www.any.run\/\",\"https:\/\/twitter.com\/anyrun_app\",\"https:\/\/www.linkedin.com\/company\/30692044\",\"https:\/\/www.youtube.com\/channel\/UCOgCPho7lzmH7m6fPNlukrQ\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/any.run\/\",\"name\":\"ANY.RUN\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/any.run\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/c4ce3a6c672056b4a8cd6b0110782215?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/c4ce3a6c672056b4a8cd6b0110782215?s=96&d=mm&r=g\",\"caption\":\"ANY.RUN\"},\"url\":\"https:\/\/any.run\/cybersecurity-blog\/author\/a-bespalova\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Annual Report 2021 - ANY.RUN&#039;s Cybersecurity Blog","description":"The service's review of the year with up-to-date statistics. You will learn about the top malware by uploads and significant events of the past year.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/any.run\/cybersecurity-blog\/annual-report-2021\/","twitter_misc":{"Written by":"ANY.RUN","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/any.run\/cybersecurity-blog\/annual-report-2021\/#article","isPartOf":{"@id":"https:\/\/any.run\/cybersecurity-blog\/annual-report-2021\/"},"author":{"name":"ANY.RUN","@id":"https:\/\/any.run\/"},"headline":"Annual Report 2021","datePublished":"2022-01-21T00:57:00+00:00","dateModified":"2022-12-21T06:48:17+00:00","mainEntityOfPage":{"@id":"https:\/\/any.run\/cybersecurity-blog\/annual-report-2021\/"},"wordCount":977,"commentCount":1,"publisher":{"@id":"https:\/\/any.run\/"},"keywords":["ANYRUN"],"articleSection":["Service Updates"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/any.run\/cybersecurity-blog\/annual-report-2021\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/any.run\/cybersecurity-blog\/annual-report-2021\/","url":"https:\/\/any.run\/cybersecurity-blog\/annual-report-2021\/","name":"Annual Report 2021 - ANY.RUN&#039;s Cybersecurity Blog","isPartOf":{"@id":"https:\/\/any.run\/"},"datePublished":"2022-01-21T00:57:00+00:00","dateModified":"2022-12-21T06:48:17+00:00","description":"The service's review of the year with up-to-date statistics. You will learn about the top malware by uploads and significant events of the past year.","breadcrumb":{"@id":"https:\/\/any.run\/cybersecurity-blog\/annual-report-2021\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/any.run\/cybersecurity-blog\/annual-report-2021\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/any.run\/cybersecurity-blog\/annual-report-2021\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/any.run\/cybersecurity-blog\/"},{"@type":"ListItem","position":2,"name":"teamwork","item":"https:\/\/any.run\/tag\/teamwork\/"},{"@type":"ListItem","position":3,"name":"Annual Report 2021"}]},{"@type":"WebSite","@id":"https:\/\/any.run\/","url":"https:\/\/any.run\/","name":"ANY.RUN&#039;s Cybersecurity Blog","description":"Cybersecurity Blog covers topics for experienced professionals as well as for those new to it.","publisher":{"@id":"https:\/\/any.run\/"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/any.run\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/any.run\/","name":"ANY.RUN","url":"https:\/\/any.run\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/any.run\/","url":"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg","contentUrl":"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg","width":1,"height":1,"caption":"ANY.RUN"},"image":{"@id":"https:\/\/any.run\/"},"sameAs":["https:\/\/www.facebook.com\/www.any.run\/","https:\/\/twitter.com\/anyrun_app","https:\/\/www.linkedin.com\/company\/30692044","https:\/\/www.youtube.com\/channel\/UCOgCPho7lzmH7m6fPNlukrQ"]},{"@type":"Person","@id":"https:\/\/any.run\/","name":"ANY.RUN","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/any.run\/","url":"https:\/\/secure.gravatar.com\/avatar\/c4ce3a6c672056b4a8cd6b0110782215?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/c4ce3a6c672056b4a8cd6b0110782215?s=96&d=mm&r=g","caption":"ANY.RUN"},"url":"https:\/\/any.run\/cybersecurity-blog\/author\/a-bespalova\/"}]}},"_links":{"self":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts\/1957"}],"collection":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/comments?post=1957"}],"version-history":[{"count":1,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts\/1957\/revisions"}],"predecessor-version":[{"id":3731,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts\/1957\/revisions\/3731"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/media\/3664"}],"wp:attachment":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/media?parent=1957"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/categories?post=1957"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/tags?post=1957"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}