{"id":20804,"date":"2026-05-12T11:15:30","date_gmt":"2026-05-12T11:15:30","guid":{"rendered":"https:\/\/any.run\/cybersecurity-blog\/?p=20804"},"modified":"2026-05-12T11:16:08","modified_gmt":"2026-05-12T11:16:08","slug":"anyrun-elastic-security","status":"publish","type":"post","link":"https:\/\/any.run\/cybersecurity-blog\/anyrun-elastic-security\/","title":{"rendered":"ANY.RUN &amp; Elastic Security: Bring\u00a0Threat\u00a0Intelligence into Detection and Investigation Workflows\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0"},"content":{"rendered":"\n<p>Security teams&nbsp;don\u2019t&nbsp;lack data. They lack&nbsp;timely, usable intelligence. Analysts spend too much time&nbsp;validating&nbsp;indicators, switching between tools, and figuring out what&nbsp;actually matters. This introduces delays and puts organizations at risk of a missed incident.&nbsp;&nbsp;<\/p>\n\n\n\n<p><a href=\"https:\/\/any.run\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=anyrun-elastic-security&amp;utm_term=120526&amp;utm_content=linktolanding\" target=\"_blank\" rel=\"noreferrer noopener\">ANY.RUN<\/a>&nbsp;solves this by bringing real-time, behavior-validated threat intelligence from ANY.RUN integrated into&nbsp;<a href=\"https:\/\/www.elastic.co\/security\/siem\" target=\"_blank\" rel=\"noreferrer noopener\">Elastic Security<\/a>,&nbsp;where&nbsp;SOC&nbsp;and MSSP teams detect emerging cyberattacks earlier and respond faster without changing their workflows.&nbsp;&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">ANY.RUN Threat&nbsp;Intelligence&nbsp;Feeds&nbsp;x&nbsp;Elastic Security: About the Integration&nbsp;&nbsp;<\/h2>\n\n\n\n<p><a href=\"https:\/\/www.elastic.co\/docs\/reference\/integrations\/ti_anyrun\" target=\"_blank\" rel=\"noreferrer noopener\">Integrate ANY.RUN\u2019s TI Feeds in Elastic Security \u2192<\/a>&nbsp;<\/p>\n\n\n\n<p>Elastic Security unifies SIEM, endpoint security, and cloud security to help teams protect, investigate, and respond to threats.&nbsp;&nbsp;<\/p>\n\n\n\n<p>Through the ANY.RUN Threat Intelligence Feeds integration, organizations can ingest third-party threat indicators into Elastic Security and use them in detection, investigation, and threat intelligence workflows. This helps analysts bring external threat context into the same platform they use for security operations. &nbsp;&nbsp;<\/p>\n\n\n\n<p>ANY.RUN\u2019s&nbsp;<a href=\"https:\/\/any.run\/threat-intelligence-feeds\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=anyrun-elastic-security&amp;utm_term=120526&amp;utm_content=linktotifeedslanding\" target=\"_blank\" rel=\"noreferrer noopener\">Threat Intelligence Feeds<\/a>&nbsp;are built from&nbsp;<a href=\"https:\/\/any.run\/features\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=anyrun-elastic-security&amp;utm_term=120526&amp;utm_content=linktosandboxlanding\" target=\"_blank\" rel=\"noreferrer noopener\">live sandbox investigations<\/a>&nbsp;across more than 15,000 organizations and 600,000 SOC professionals. Indicators reflect infrastructure actively used in phishing, malware delivery, and attacker campaigns, not delayed or aggregated data. Each&nbsp;<a href=\"https:\/\/any.run\/cybersecurity-blog\/enrich-iocs-with-threat-intelligence\/\" target=\"_blank\" rel=\"noreferrer noopener\">IOC&nbsp;includes context<\/a>&nbsp;and a direct link to the sandbox report, allowing analysts to quickly understand threat behavior and TTPs.&nbsp;&nbsp;<\/p>\n\n\n\n<p>The&nbsp;<a href=\"https:\/\/www.elastic.co\/docs\/reference\/integrations\/ti_anyrun\" target=\"_blank\" rel=\"noreferrer noopener\">integration is available as a plug-and-play solution<\/a>&nbsp;that only requires an active TI Feeds license (via trial or a paid subscription).&nbsp;&nbsp;<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"505\" src=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/05\/Screenshot-2026-05-12-at-11.58.36-1024x505.png\" alt=\"\" class=\"wp-image-20807\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/05\/Screenshot-2026-05-12-at-11.58.36-1024x505.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/05\/Screenshot-2026-05-12-at-11.58.36-300x148.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/05\/Screenshot-2026-05-12-at-11.58.36-768x379.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/05\/Screenshot-2026-05-12-at-11.58.36-1536x757.png 1536w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/05\/Screenshot-2026-05-12-at-11.58.36-2048x1010.png 2048w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/05\/Screenshot-2026-05-12-at-11.58.36-370x182.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/05\/Screenshot-2026-05-12-at-11.58.36-270x133.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/05\/Screenshot-2026-05-12-at-11.58.36-740x365.png 740w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\"><em>IOC overview of Threat Intelligence Feeds&nbsp;inside&nbsp;Elastic Security<\/em>&nbsp;<\/figcaption><\/figure><\/div>\n\n\n<p>Once configured, Elastic&nbsp;Security can ingest indicators such as IPs, domains, and URLs from the integration on a scheduled basis. Those indicators can then be used across supported detection, investigation, and visualization workflows.&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<\/p>\n\n\n\n<p>The&nbsp;additional&nbsp;context associated with ingested indicators can help analysts triage and investigate alerts more efficiently.&nbsp;&nbsp;<\/p>\n\n\n\n<!-- Regular Banner START -->\n<div class=\"regular-banner\">\n<!-- Text Content -->\n<p class=\"regular-banner__text\">\n<span class=\"highlight\">Bring fresh, sandbox-backed IOCs into your SOC workflows.<\/span><br>\nGive your team the context to investigate\u00a0faster and\u00a0reduce business risk.<\/p>\n<!-- CTA Link -->\n<a class=\"regular-banner__link\" id=\"article-banner-regular\" href=\"https:\/\/any.run\/plans-ti\/?utm_source=anyrunblog&#038;utm_medium=article&#038;utm_campaign=anyrun-elastic-security&#038;utm_content=linktotipricing#contact-sales\" rel=\"noopener\" target=\"_blank\">\nContact us\n<\/a>\n<\/div>\n<!-- Regular Banner END -->\n<!-- Regular Banner Styles START -->\n\n<style>\n.regular-banner {\ndisplay: flex;\ntext-align: center;\nflex-direction: column;\nalign-items: center;\ngap: 1.5rem;\nwidth: 100%;\npadding: 2rem;\nmargin: 1.5rem 0;\nborder-radius: 0.5rem;\nfont-family: 'Catamaran Bold';\nmargin-inline: auto;\nbackground: rgba(32, 168, 241, 0.1);\nborder: 1px solid rgba(75, 174, 227, 0.32);\n}\n\n.regular-banner__text {\nfont-size: 1.5rem;\nmargin: 0;\n}\n\n.highlight {\ncolor: #ea2526;\n}\n\n.regular-banner__link {\npadding: 0.5rem 1.5rem;\nfont-weight: 500;\ntext-decoration: none;\nborder-radius: 0.5rem;\ncolor: #FFFFFF;\nbackground-color: #1491D4;\ntext-align: center;\ntransition: all 0.2s ease-in;\n}\n\n.regular-banner__link:hover {\nbackground-color: #68CBFF;\ncolor: white;\n}\n<\/style>\n<!-- Regular Banner Styles END -->\n\n\n\n<h2 class=\"wp-block-heading\">How Threat&nbsp;Intelligence&nbsp;Feeds Improve Detection and Shorten MTTR in Elastic Security&nbsp;&nbsp;<\/h2>\n\n\n\n<p>The integration embeds threat intelligence directly into daily SOC workflows inside Elastic Security. Analysts&nbsp;don\u2019t&nbsp;need to manually check indicators in external tools or move data between systems.&nbsp;&nbsp;<\/p>\n\n\n\n<p>Here is what your team gains:&nbsp;&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Detect threats early:<\/strong>&nbsp;Use fresh indicators from live attacks to&nbsp;identify&nbsp;malicious activity sooner. &nbsp;&nbsp;<\/li>\n\n\n\n<li><strong>Validate alerts with real context:<\/strong>&nbsp;Use sandbox-backed evidence instead of relying only on static indicators. &nbsp;<\/li>\n\n\n\n<li><strong>Reduce manual work:<\/strong>&nbsp;Eliminate&nbsp;repetitive enrichment steps and tool switching.&nbsp;&nbsp;<\/li>\n\n\n\n<li><strong>Improve detection quality:<\/strong>&nbsp;Use high-confidence indicators directly in rules and correlation logic. &nbsp;&nbsp;<\/li>\n\n\n\n<li><strong>Speed up triage and response:<\/strong>&nbsp;Access context instantly and make faster decisions. &nbsp;&nbsp;<\/li>\n<\/ul>\n\n\n\n<p>Together, these improvements help reduce MTTD and MTTR, lower incident response costs, and increase analyst efficiency by enabling teams to handle more cases without expanding headcount.&nbsp;<\/p>\n\n\n\n<p>Better detection coverage and earlier visibility into active threats contribute to overall business risk reduction by limiting the impact and spread of attacks.&nbsp;&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">How to Set Up ANY.RUN\u2019s Threat&nbsp;Intelligence&nbsp;Feeds in Elastic Security&nbsp;&nbsp;<\/h2>\n\n\n\n<p>The integration is designed to be simple and flexible. Once you get an active TI Feeds access, you can&nbsp;<a href=\"https:\/\/www.elastic.co\/docs\/reference\/integrations\/ti_anyrun\" target=\"_blank\" rel=\"noreferrer noopener\">navigate to the integration page<\/a>&nbsp;and follow the instructions.&nbsp;&nbsp;<\/p>\n\n\n\n<p>Indicators are automatically ingested into Elastic and continuously updated. They become part of detection, search, and response workflows.&nbsp;&nbsp;<\/p>\n\n\n\n<p>With ANY.RUN Threat Intelligence Feeds in Elastic Security, teams can:&nbsp;&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Use ingested ANY.RUN indicators in Elastic Security detection workflows&nbsp;&nbsp;<\/li>\n\n\n\n<li>Match threat indicators against relevant security telemetry &nbsp;<\/li>\n\n\n\n<li>Support triage and investigation with&nbsp;additional&nbsp;indicator context&nbsp;&nbsp;<\/li>\n\n\n\n<li>Build dashboards and visualizations for threat intelligence monitoring&nbsp;&nbsp;<\/li>\n\n\n\n<li>Incorporate third-party indicators into detection and hunting workflows&nbsp;&nbsp;<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">Conclusion&nbsp;&nbsp;<\/h2>\n\n\n\n<p>With ANY.RUN Threat Intelligence Feeds integrated into&nbsp;<a href=\"https:\/\/www.elastic.co\/campaigns\/guide-to-high-volume-data-sources-for-siem?utm_campaign=G-TXT-AMER-NA-Security-EN-Lead_Gen-MQL-NB&amp;utm_content=Security-Analytics&amp;utm_source=google&amp;utm_medium=cpc&amp;device=c&amp;utm_term=ai%20and%20cybersecurity&amp;utm_id=7018X0000017RryQAE&amp;gad_source=1&amp;gad_campaignid=22944792370&amp;gbraid=0AAAAADrDgoJf1pYB9GNyHJNWujOBTEoBo&amp;gclid=Cj0KCQjwh-HPBhCIARIsAC0p3cfUJnaxgTtS91g-bKYxYkI1YZ0GXne9dnEoVMo8W2o4xl2MiP3LO_UaAiECEALw_wcB\" target=\"_blank\" rel=\"noreferrer noopener\">Elastic\u2019s Security&nbsp;<\/a>&nbsp;platform can further enhance customer\u2019s security detection with&nbsp;timely, behavior-validated intelligence., Organizations can detect threats early, reduce manual effort, and make fast, confident decisions. &nbsp;&nbsp;<\/p>\n\n\n\n<p>This leads not only to better SOC performance, but also to measurable business impact. Early detection, fast response, and improved signal quality help reduce the likelihood and impact of incidents,&nbsp;ultimately lowering&nbsp;overall business risk.&nbsp;&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">About ANY.RUN&nbsp;&nbsp;<\/h2>\n\n\n\n<p>ANY.RUN helps security teams understand threats faster and&nbsp;take action&nbsp;with confidence. Its solutions are trusted by over 600,000 security professionals and more than&nbsp;<a href=\"https:\/\/any.run\/cybersecurity-blog\/threat-intelligence-from-organizations\/\" target=\"_blank\" rel=\"noreferrer noopener\">15,000 organizations<\/a>&nbsp;across industries where speed and accuracy are critical for effective response.&nbsp;&nbsp;<\/p>\n\n\n\n<p><a href=\"https:\/\/any.run\/features\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=anyrun-elastic-security&amp;utm_term=120526&amp;utm_content=linktosandboxlanding\" target=\"_blank\" rel=\"noreferrer noopener\">ANY.RUN\u2019s Interactive Sandbox<\/a>&nbsp;allows&nbsp;teams to safely analyze suspicious files and URLs,&nbsp;observe&nbsp;real behavior in real time, and confirm threats before they spread.&nbsp;&nbsp;<\/p>\n\n\n\n<p>Combined with&nbsp;<a href=\"https:\/\/any.run\/threat-intelligence-lookup\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=anyrun-elastic-security&amp;utm_term=120526&amp;utm_content=linktotilookuplanding\" target=\"_blank\" rel=\"noreferrer noopener\">Threat Intelligence Lookup<\/a>&nbsp;and&nbsp;<a href=\"https:\/\/any.run\/threat-intelligence-feeds\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=anyrun-elastic-security&amp;utm_term=120526&amp;utm_content=linktotifeedslanding\" target=\"_blank\" rel=\"noreferrer noopener\">Threat Intelligence Feeds<\/a>, it provides the context needed to prioritize alerts, reduce uncertainty, and stop advanced attacks earlier in the response cycle.&nbsp;&nbsp;<\/p>\n\n\n\n<p><a href=\"https:\/\/any.run\/enterprise\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=anyrun-elastic-security&amp;utm_term=120526&amp;utm_content=linktoenterprise#contact-sales\" target=\"_blank\" rel=\"noreferrer noopener\">Request access to ANY.RUN\u2019s solutions \u2192<\/a>&nbsp;&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Security teams&nbsp;don\u2019t&nbsp;lack data. They lack&nbsp;timely, usable intelligence. Analysts spend too much time&nbsp;validating&nbsp;indicators, switching between tools, and figuring out what&nbsp;actually matters. This introduces delays and puts organizations at risk of a missed incident.&nbsp;&nbsp; ANY.RUN&nbsp;solves this by bringing real-time, behavior-validated threat intelligence from ANY.RUN integrated into&nbsp;Elastic Security,&nbsp;where&nbsp;SOC&nbsp;and MSSP teams detect emerging cyberattacks earlier and respond faster without [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":20815,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[9],"tags":[57,10,56],"class_list":["post-20804","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-service-updates","tag-anyrun","tag-cybersecurity","tag-update"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v20.10 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>ANY.RUN &amp; Elastic Security Threat Intelligence Integration<\/title>\n<meta name=\"description\" content=\"Integrate ANY.RUN Threat Intelligence Feeds with Elastic Security to bring real-time, behavior-validated IOCs into detection, investigation, and response.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/any.run\/cybersecurity-blog\/anyrun-elastic-security\/\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"ANY.RUN\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/anyrun-elastic-security\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/anyrun-elastic-security\/\"},\"author\":{\"name\":\"ANY.RUN\",\"@id\":\"https:\/\/any.run\/\"},\"headline\":\"ANY.RUN &amp; Elastic Security: Bring\u00a0Threat\u00a0Intelligence into Detection and Investigation Workflows\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\",\"datePublished\":\"2026-05-12T11:15:30+00:00\",\"dateModified\":\"2026-05-12T11:16:08+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/anyrun-elastic-security\/\"},\"wordCount\":905,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/any.run\/\"},\"keywords\":[\"ANYRUN\",\"cybersecurity\",\"update\"],\"articleSection\":[\"Service Updates\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/any.run\/cybersecurity-blog\/anyrun-elastic-security\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/anyrun-elastic-security\/\",\"url\":\"https:\/\/any.run\/cybersecurity-blog\/anyrun-elastic-security\/\",\"name\":\"ANY.RUN & Elastic Security Threat Intelligence Integration\",\"isPartOf\":{\"@id\":\"https:\/\/any.run\/\"},\"datePublished\":\"2026-05-12T11:15:30+00:00\",\"dateModified\":\"2026-05-12T11:16:08+00:00\",\"description\":\"Integrate ANY.RUN Threat Intelligence Feeds with Elastic Security to bring real-time, behavior-validated IOCs into detection, investigation, and response.\",\"breadcrumb\":{\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/anyrun-elastic-security\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/any.run\/cybersecurity-blog\/anyrun-elastic-security\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/anyrun-elastic-security\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/any.run\/cybersecurity-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Service Updates\",\"item\":\"https:\/\/any.run\/cybersecurity-blog\/category\/service-updates\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"ANY.RUN &amp; Elastic Security: Bring\u00a0Threat\u00a0Intelligence into Detection and Investigation Workflows\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/any.run\/\",\"url\":\"https:\/\/any.run\/\",\"name\":\"ANY.RUN&#039;s Cybersecurity Blog\",\"description\":\"Cybersecurity Blog covers topics for experienced professionals as well as for those new to it.\",\"publisher\":{\"@id\":\"https:\/\/any.run\/\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/any.run\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/any.run\/\",\"name\":\"ANY.RUN\",\"url\":\"https:\/\/any.run\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/any.run\/\",\"url\":\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg\",\"contentUrl\":\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg\",\"width\":1,\"height\":1,\"caption\":\"ANY.RUN\"},\"image\":{\"@id\":\"https:\/\/any.run\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/www.any.run\/\",\"https:\/\/twitter.com\/anyrun_app\",\"https:\/\/www.linkedin.com\/company\/30692044\",\"https:\/\/www.youtube.com\/channel\/UCOgCPho7lzmH7m6fPNlukrQ\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/any.run\/\",\"name\":\"ANY.RUN\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/any.run\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/c4ce3a6c672056b4a8cd6b0110782215?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/c4ce3a6c672056b4a8cd6b0110782215?s=96&d=mm&r=g\",\"caption\":\"ANY.RUN\"},\"url\":\"https:\/\/any.run\/cybersecurity-blog\/author\/a-bespalova\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"ANY.RUN & Elastic Security Threat Intelligence Integration","description":"Integrate ANY.RUN Threat Intelligence Feeds with Elastic Security to bring real-time, behavior-validated IOCs into detection, investigation, and response.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/any.run\/cybersecurity-blog\/anyrun-elastic-security\/","twitter_misc":{"Written by":"ANY.RUN","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/any.run\/cybersecurity-blog\/anyrun-elastic-security\/#article","isPartOf":{"@id":"https:\/\/any.run\/cybersecurity-blog\/anyrun-elastic-security\/"},"author":{"name":"ANY.RUN","@id":"https:\/\/any.run\/"},"headline":"ANY.RUN &amp; Elastic Security: Bring\u00a0Threat\u00a0Intelligence into Detection and Investigation Workflows\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0","datePublished":"2026-05-12T11:15:30+00:00","dateModified":"2026-05-12T11:16:08+00:00","mainEntityOfPage":{"@id":"https:\/\/any.run\/cybersecurity-blog\/anyrun-elastic-security\/"},"wordCount":905,"commentCount":0,"publisher":{"@id":"https:\/\/any.run\/"},"keywords":["ANYRUN","cybersecurity","update"],"articleSection":["Service Updates"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/any.run\/cybersecurity-blog\/anyrun-elastic-security\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/any.run\/cybersecurity-blog\/anyrun-elastic-security\/","url":"https:\/\/any.run\/cybersecurity-blog\/anyrun-elastic-security\/","name":"ANY.RUN & Elastic Security Threat Intelligence Integration","isPartOf":{"@id":"https:\/\/any.run\/"},"datePublished":"2026-05-12T11:15:30+00:00","dateModified":"2026-05-12T11:16:08+00:00","description":"Integrate ANY.RUN Threat Intelligence Feeds with Elastic Security to bring real-time, behavior-validated IOCs into detection, investigation, and response.","breadcrumb":{"@id":"https:\/\/any.run\/cybersecurity-blog\/anyrun-elastic-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/any.run\/cybersecurity-blog\/anyrun-elastic-security\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/any.run\/cybersecurity-blog\/anyrun-elastic-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/any.run\/cybersecurity-blog\/"},{"@type":"ListItem","position":2,"name":"Service Updates","item":"https:\/\/any.run\/cybersecurity-blog\/category\/service-updates\/"},{"@type":"ListItem","position":3,"name":"ANY.RUN &amp; Elastic Security: Bring\u00a0Threat\u00a0Intelligence into Detection and Investigation Workflows\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0"}]},{"@type":"WebSite","@id":"https:\/\/any.run\/","url":"https:\/\/any.run\/","name":"ANY.RUN&#039;s Cybersecurity Blog","description":"Cybersecurity Blog covers topics for experienced professionals as well as for those new to it.","publisher":{"@id":"https:\/\/any.run\/"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/any.run\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/any.run\/","name":"ANY.RUN","url":"https:\/\/any.run\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/any.run\/","url":"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg","contentUrl":"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg","width":1,"height":1,"caption":"ANY.RUN"},"image":{"@id":"https:\/\/any.run\/"},"sameAs":["https:\/\/www.facebook.com\/www.any.run\/","https:\/\/twitter.com\/anyrun_app","https:\/\/www.linkedin.com\/company\/30692044","https:\/\/www.youtube.com\/channel\/UCOgCPho7lzmH7m6fPNlukrQ"]},{"@type":"Person","@id":"https:\/\/any.run\/","name":"ANY.RUN","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/any.run\/","url":"https:\/\/secure.gravatar.com\/avatar\/c4ce3a6c672056b4a8cd6b0110782215?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/c4ce3a6c672056b4a8cd6b0110782215?s=96&d=mm&r=g","caption":"ANY.RUN"},"url":"https:\/\/any.run\/cybersecurity-blog\/author\/a-bespalova\/"}]}},"_links":{"self":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts\/20804"}],"collection":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/comments?post=20804"}],"version-history":[{"count":9,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts\/20804\/revisions"}],"predecessor-version":[{"id":20814,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts\/20804\/revisions\/20814"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/media\/20815"}],"wp:attachment":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/media?parent=20804"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/categories?post=20804"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/tags?post=20804"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}