{"id":4136,"date":"2022-12-20T00:36:00","date_gmt":"2022-12-20T00:36:00","guid":{"rendered":"\/cybersecurity-blog\/?p=4136"},"modified":"2022-12-21T09:26:22","modified_gmt":"2022-12-21T09:26:22","slug":"any-run-malware-monitoring-innovators-2022","status":"publish","type":"post","link":"https:\/\/any.run\/cybersecurity-blog\/any-run-malware-monitoring-innovators-2022\/","title":{"rendered":"ANY.RUN Named Twice as Malware Monitoring Innovators 2022"},"content":{"rendered":"\n<p><a rel=\"noreferrer noopener\" aria-label=\"ANY.RUN, an online malware sandbox (opens in a new tab)\" href=\"https:\/\/any.run\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=innovators22&amp;utm_content=landing\" target=\"_blank\">ANY.RUN, a malware sandbox<\/a> is recognized as <strong>Monitoring &amp; Analysis Innovators\u00a02022<\/strong> by the Technology Innovator Awards 2022 and <strong>Malware\u00a0Monitoring Innovators of the Year<\/strong> by Global Awards 2022\/23.\u00a0<\/p>\n\n\n\n<p>\u201cIt is an honor for our team to receive double recognition as a malware monitoring innovator of the year from our peers in the wider business community,\u201d said <strong>Alexey\u00a0Lapshin<\/strong>, CEO of ANY.RUN.\u00a0 \u201cIt also highlights the tremendous opportunity we have to enhance cybersecurity and make it accessible for everyone.\u201d<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">About awards<\/h3>\n\n\n\n<div class=\"wp-block-media-text alignwide\" style=\"grid-template-columns:18% auto\"><figure class=\"wp-block-media-text__media\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"1024\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2022\/12\/Innovation-in-Business-1024x1024.png\" alt=\"\" class=\"wp-image-4154\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2022\/12\/Innovation-in-Business-1024x1024.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2022\/12\/Innovation-in-Business-300x300.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2022\/12\/Innovation-in-Business-150x150.png 150w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2022\/12\/Innovation-in-Business-768x768.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2022\/12\/Innovation-in-Business-1536x1536.png 1536w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2022\/12\/Innovation-in-Business-70x70.png 70w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2022\/12\/Innovation-in-Business-370x370.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2022\/12\/Innovation-in-Business-270x270.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2022\/12\/Innovation-in-Business-740x740.png 740w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2022\/12\/Innovation-in-Business.png 1976w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure><div class=\"wp-block-media-text__content\">\n<p class=\"has-normal-font-size\">This year Innovation in Business has organized the<a rel=\"noreferrer noopener\" href=\"https:\/\/www.innovationinbusiness.com\/awards\/technology-innovator-awards\/\" target=\"_blank\"> 2022 Technology Innovator Awards<\/a>. Technology pioneers able to provide solutions to meet a wide range of needs are sought for the award.\u00a0<br><\/p>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-media-text alignwide\" style=\"grid-template-columns:19% auto\"><figure class=\"wp-block-media-text__media\"><img loading=\"lazy\" decoding=\"async\" width=\"790\" height=\"774\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2022\/12\/Global-1.jpg\" alt=\"\" class=\"wp-image-4156\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2022\/12\/Global-1.jpg 790w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2022\/12\/Global-1-300x294.jpg 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2022\/12\/Global-1-768x752.jpg 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2022\/12\/Global-1-70x70.jpg 70w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2022\/12\/Global-1-370x363.jpg 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2022\/12\/Global-1-270x265.jpg 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2022\/12\/Global-1-740x725.jpg 740w\" sizes=\"(max-width: 790px) 100vw, 790px\" \/><\/figure><div class=\"wp-block-media-text__content\">\n<p class=\"has-normal-font-size\"><a rel=\"noreferrer noopener\" href=\"https:\/\/prestigeawards.co.uk\/prestige-awards\/\" target=\"_blank\">Global Awards 2022\/23<\/a> recognize and reward small and medium-sized businesses that stand out in their industries. Awarded to the exemplars of success in their respective fields, the award represents the pinnacle of accomplishment within the business world.<br><\/p>\n<\/div><\/div>\n","protected":false},"excerpt":{"rendered":"<p>ANY.RUN, a malware sandbox is recognized as Monitoring &amp; Analysis Innovators\u00a02022 by the Technology Innovator Awards 2022 and Malware\u00a0Monitoring Innovators of the Year by Global Awards 2022\/23.\u00a0 \u201cIt is an honor for our team to receive double recognition as a malware monitoring innovator of the year from our peers in the wider business community,\u201d said [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":4139,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[60],"tags":[10],"class_list":["post-4136","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news","tag-cybersecurity"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v20.10 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>ANY.RUN Named Twice as Malware Monitoring Innovators 2022<\/title>\n<meta name=\"description\" content=\"ANY.RUN is thrilled to become Malware Monitoring &amp; Analysis Innovators 2022 by Technology Innovator Awards 2022 and Global Awards 2022\/23.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/any.run\/cybersecurity-blog\/any-run-malware-monitoring-innovators-2022\/\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"ANY.RUN\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/any-run-malware-monitoring-innovators-2022\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/any-run-malware-monitoring-innovators-2022\/\"},\"author\":{\"name\":\"ANY.RUN\",\"@id\":\"https:\/\/any.run\/\"},\"headline\":\"ANY.RUN Named Twice as Malware Monitoring Innovators 2022\",\"datePublished\":\"2022-12-20T00:36:00+00:00\",\"dateModified\":\"2022-12-21T09:26:22+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/any-run-malware-monitoring-innovators-2022\/\"},\"wordCount\":153,\"commentCount\":4,\"publisher\":{\"@id\":\"https:\/\/any.run\/\"},\"keywords\":[\"cybersecurity\"],\"articleSection\":[\"News\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/any.run\/cybersecurity-blog\/any-run-malware-monitoring-innovators-2022\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/any-run-malware-monitoring-innovators-2022\/\",\"url\":\"https:\/\/any.run\/cybersecurity-blog\/any-run-malware-monitoring-innovators-2022\/\",\"name\":\"ANY.RUN Named Twice as Malware Monitoring Innovators 2022\",\"isPartOf\":{\"@id\":\"https:\/\/any.run\/\"},\"datePublished\":\"2022-12-20T00:36:00+00:00\",\"dateModified\":\"2022-12-21T09:26:22+00:00\",\"description\":\"ANY.RUN is thrilled to become Malware Monitoring & Analysis Innovators 2022 by Technology Innovator Awards 2022 and Global Awards 2022\/23.\",\"breadcrumb\":{\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/any-run-malware-monitoring-innovators-2022\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/any.run\/cybersecurity-blog\/any-run-malware-monitoring-innovators-2022\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/any-run-malware-monitoring-innovators-2022\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/any.run\/cybersecurity-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"News\",\"item\":\"https:\/\/any.run\/cybersecurity-blog\/category\/news\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"ANY.RUN Named Twice as Malware Monitoring Innovators 2022\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/any.run\/\",\"url\":\"https:\/\/any.run\/\",\"name\":\"ANY.RUN&#039;s Cybersecurity Blog\",\"description\":\"Cybersecurity Blog covers topics for experienced professionals as well as for those new to it.\",\"publisher\":{\"@id\":\"https:\/\/any.run\/\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/any.run\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/any.run\/\",\"name\":\"ANY.RUN\",\"url\":\"https:\/\/any.run\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/any.run\/\",\"url\":\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg\",\"contentUrl\":\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg\",\"width\":1,\"height\":1,\"caption\":\"ANY.RUN\"},\"image\":{\"@id\":\"https:\/\/any.run\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/www.any.run\/\",\"https:\/\/twitter.com\/anyrun_app\",\"https:\/\/www.linkedin.com\/company\/30692044\",\"https:\/\/www.youtube.com\/channel\/UCOgCPho7lzmH7m6fPNlukrQ\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/any.run\/\",\"name\":\"ANY.RUN\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/any.run\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/c4ce3a6c672056b4a8cd6b0110782215?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/c4ce3a6c672056b4a8cd6b0110782215?s=96&d=mm&r=g\",\"caption\":\"ANY.RUN\"},\"url\":\"https:\/\/any.run\/cybersecurity-blog\/author\/a-bespalova\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"ANY.RUN Named Twice as Malware Monitoring Innovators 2022","description":"ANY.RUN is thrilled to become Malware Monitoring & Analysis Innovators 2022 by Technology Innovator Awards 2022 and Global Awards 2022\/23.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/any.run\/cybersecurity-blog\/any-run-malware-monitoring-innovators-2022\/","twitter_misc":{"Written by":"ANY.RUN","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/any.run\/cybersecurity-blog\/any-run-malware-monitoring-innovators-2022\/#article","isPartOf":{"@id":"https:\/\/any.run\/cybersecurity-blog\/any-run-malware-monitoring-innovators-2022\/"},"author":{"name":"ANY.RUN","@id":"https:\/\/any.run\/"},"headline":"ANY.RUN Named Twice as Malware Monitoring Innovators 2022","datePublished":"2022-12-20T00:36:00+00:00","dateModified":"2022-12-21T09:26:22+00:00","mainEntityOfPage":{"@id":"https:\/\/any.run\/cybersecurity-blog\/any-run-malware-monitoring-innovators-2022\/"},"wordCount":153,"commentCount":4,"publisher":{"@id":"https:\/\/any.run\/"},"keywords":["cybersecurity"],"articleSection":["News"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/any.run\/cybersecurity-blog\/any-run-malware-monitoring-innovators-2022\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/any.run\/cybersecurity-blog\/any-run-malware-monitoring-innovators-2022\/","url":"https:\/\/any.run\/cybersecurity-blog\/any-run-malware-monitoring-innovators-2022\/","name":"ANY.RUN Named Twice as Malware Monitoring Innovators 2022","isPartOf":{"@id":"https:\/\/any.run\/"},"datePublished":"2022-12-20T00:36:00+00:00","dateModified":"2022-12-21T09:26:22+00:00","description":"ANY.RUN is thrilled to become Malware Monitoring & Analysis Innovators 2022 by Technology Innovator Awards 2022 and Global Awards 2022\/23.","breadcrumb":{"@id":"https:\/\/any.run\/cybersecurity-blog\/any-run-malware-monitoring-innovators-2022\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/any.run\/cybersecurity-blog\/any-run-malware-monitoring-innovators-2022\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/any.run\/cybersecurity-blog\/any-run-malware-monitoring-innovators-2022\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/any.run\/cybersecurity-blog\/"},{"@type":"ListItem","position":2,"name":"News","item":"https:\/\/any.run\/cybersecurity-blog\/category\/news\/"},{"@type":"ListItem","position":3,"name":"ANY.RUN Named Twice as Malware Monitoring Innovators 2022"}]},{"@type":"WebSite","@id":"https:\/\/any.run\/","url":"https:\/\/any.run\/","name":"ANY.RUN&#039;s Cybersecurity Blog","description":"Cybersecurity Blog covers topics for experienced professionals as well as for those new to it.","publisher":{"@id":"https:\/\/any.run\/"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/any.run\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/any.run\/","name":"ANY.RUN","url":"https:\/\/any.run\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/any.run\/","url":"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg","contentUrl":"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg","width":1,"height":1,"caption":"ANY.RUN"},"image":{"@id":"https:\/\/any.run\/"},"sameAs":["https:\/\/www.facebook.com\/www.any.run\/","https:\/\/twitter.com\/anyrun_app","https:\/\/www.linkedin.com\/company\/30692044","https:\/\/www.youtube.com\/channel\/UCOgCPho7lzmH7m6fPNlukrQ"]},{"@type":"Person","@id":"https:\/\/any.run\/","name":"ANY.RUN","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/any.run\/","url":"https:\/\/secure.gravatar.com\/avatar\/c4ce3a6c672056b4a8cd6b0110782215?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/c4ce3a6c672056b4a8cd6b0110782215?s=96&d=mm&r=g","caption":"ANY.RUN"},"url":"https:\/\/any.run\/cybersecurity-blog\/author\/a-bespalova\/"}]}},"_links":{"self":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts\/4136"}],"collection":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/comments?post=4136"}],"version-history":[{"count":15,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts\/4136\/revisions"}],"predecessor-version":[{"id":4162,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts\/4136\/revisions\/4162"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/media\/4139"}],"wp:attachment":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/media?parent=4136"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/categories?post=4136"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/tags?post=4136"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}