{"id":4528,"date":"2023-03-14T06:39:32","date_gmt":"2023-03-14T06:39:32","guid":{"rendered":"\/cybersecurity-blog\/?p=4528"},"modified":"2025-11-13T08:53:32","modified_gmt":"2025-11-13T08:53:32","slug":"anyrun-for-enterprises","status":"publish","type":"post","link":"https:\/\/any.run\/cybersecurity-blog\/anyrun-for-enterprises\/","title":{"rendered":"Manage Large Security Teams \u00a0<br> with ANY.RUN for Enterprises\u00a0"},"content":{"rendered":"\n<p><\/p>\n\n\n\n<p>At ANY.RUN, we offer four pricing plans: Free, Hunter, and <strong>Enterprise<\/strong>. While the first three are perfect for individual researchers and small companies, they may be limiting for work in large corporate environments.\u00a0\u00a0<br>\u00a0<\/p>\n\n\n\n<p>If your Security Operation Center (SOC) or threat research teams have 5 or more members, if you actively manage team access, or need to drive alignment across security departments \u2014 you might benefit from the Enterprise plan.&nbsp;<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"661\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2023\/03\/image-2-1024x661.png\" alt=\"ANY.RUN for Enterprises\" class=\"wp-image-4531\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/03\/image-2-1024x661.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/03\/image-2-300x194.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/03\/image-2-768x496.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/03\/image-2-370x239.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/03\/image-2-270x174.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/03\/image-2-740x477.png 740w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/03\/image-2.png 1071w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\">How the Enterprise plan helps teams stay in sync&nbsp;<\/h2>\n\n\n\n<p><br>We know that managing security teams can be difficult: tracking authorization levels, delegating tasks, and setting task restrictions by either team or individual gets progressively more challenging as the headcount of your department grows.&nbsp;<br>&nbsp;<\/p>\n\n\n\n<p>That\u2019s why ANY.RUN\u2019s Enterprise plan has features designed specifically to increase the productivity of large teams.&nbsp;<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"740\" height=\"427\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2023\/03\/image.png\" alt=\"Manage productivity of large teams in ANY.RUN\" class=\"wp-image-4529\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/03\/image.png 740w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/03\/image-300x173.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/03\/image-370x214.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/03\/image-270x156.png 270w\" sizes=\"(max-width: 740px) 100vw, 740px\" \/><\/figure>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>1. License control<\/strong>&nbsp;<\/h3>\n\n\n\n<p>Makes it much easier for admins to manage ANY.RUN across enterprises. Team leaders can invite colleagues, distribute and revoke licenses, and create temporary seats with an expiration date.&nbsp;<\/p>\n\n\n\n<p><strong>Let us show you how ANY.RUN can help your SOC team &#8211; book a call with us<\/strong> \u2b07\ufe0f<\/p>\n\n\n\n<!-- Calendly inline widget begin -->\n<div class=\"calendly-inline-widget\" data-url=\"https:\/\/calendly.com\/d\/3nd-rzd-xvx\/any-run-demo-blog?hide_event_type_details=1&#038;hide_gdpr_banner=1&#038;primary_color=00b0e8\" style=\"min-width:320px;height:700px;\"><\/div>\n<script type=\"text\/javascript\" src=\"https:\/\/assets.calendly.com\/assets\/external\/widget.js\" async><\/script>\n<!-- Calendly inline widget end -->\n\n\n\n<h3 class=\"wp-block-heading\"><strong>2. Safe work with team privacy<\/strong>&nbsp;<\/h3>\n\n\n\n<p>Control over task visibility is more granular, there is two-factor authentication that can be toggled for each team-member for security, and access rights can be tightly controlled: decide who can delete tasks or view employee history.&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>3. Workspace analytics<\/strong>&nbsp;<\/h3>\n\n\n\n<p>Gain additional visibility into the workspace: monitor each team member&#8217;s activity by day, track the number of tasks completed daily, and filter tasks by assignee or by date.&nbsp;&nbsp;<br>&nbsp;<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"596\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2023\/03\/image-1-1024x596.png\" alt=\"Team management in ANY.RUN\" class=\"wp-image-4530\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/03\/image-1-1024x596.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/03\/image-1-300x174.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/03\/image-1-768x447.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/03\/image-1-370x215.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/03\/image-1-270x157.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/03\/image-1-740x430.png 740w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/03\/image-1.png 1073w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>4. Improved productivity with collaborative workflow<\/strong>&nbsp;<\/h3>\n\n\n\n<p>Add multiple team members to the same task to hold supervised analysis sessions, train new hires or crack tricky cases together.&nbsp;<br>&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>5. Task history via API&nbsp;<\/strong>&nbsp;<\/h3>\n\n\n\n<p>Our REST API is designed for companies who want to integrate ANY.RUN into existing frameworks. Fetch task summaries in JSON, retrieve multiple tasks in MISP for subsequent analysis in an IDS or SIEM system, or download the task history of your entire team into your project management software of choice \u2014 which is a feature reserved for our Enterprise plan.<\/p>\n\n\n\n<!-- Regular Banner START -->\n<div class=\"regular-banner\">\n<!-- Text Content -->\n<p class=\"regular-banner__text\">\nSee how ANY.RUN can help your business. \n<br>Request a <span class=\"highlight\">14-day free<\/span> trial&nbsp;\n<\/p>\n<!-- CTA Link -->\n<a class=\"regular-banner__link\" id=\"article-banner-regular\" href=\"https:\/\/any.run\/demo\/\" rel=\"noopener\" target=\"_blank\">\nGet started\u00a0\n<\/a>\n<\/div>\n<!-- Regular Banner END -->\n<!-- Regular Banner Styles START -->\n\n<style>\n.regular-banner {\ndisplay: flex;\ntext-align: center;\nflex-direction: column;\nalign-items: center;\ngap: 1.5rem;\nwidth: 100%;\npadding: 2rem;\nmargin: 1.5rem 0;\nborder-radius: 0.5rem;\nfont-family: 'Catamaran Bold';\nmargin-inline: auto;\nbackground: rgba(32, 168, 241, 0.1);\nborder: 1px solid rgba(75, 174, 227, 0.32);\n}\n\n.regular-banner__text {\nfont-size: 1.5rem;\nmargin: 0;\n}\n\n.highlight {\ncolor: #ea2526;\n}\n\n.regular-banner__link {\npadding: 0.5rem 1.5rem;\nfont-weight: 500;\ntext-decoration: none;\nborder-radius: 0.5rem;\ncolor: #FFFFFF;\nbackground-color: #1491D4;\ntext-align: center;\ntransition: all 0.2s ease-in;\n}\n\n.regular-banner__link:hover {\nbackground-color: #68CBFF;\ncolor: white;\n}\n<\/style>\n<!-- Regular Banner Styles END -->\n\n\n\n<p>The Enterprise plan also inherits all malware analysis capabilities from the <a href=\"https:\/\/any.run\/cybersecurity-blog\/subscriptions-hunter-plan\/\" target=\"_blank\" rel=\"noreferrer noopener\">Hunter plan<\/a> \u2014 our fullest offering in terms of sandboxing features.&nbsp;<\/p>\n\n\n\n<p>Multiple operating systems and bit options, locale settings to customize execution environment, ability to reboot tasks, network geolocation, and software presets \u2014 all to help you <strong>save time<\/strong> and <strong>increase detection rate.<\/strong>&nbsp;<\/p>\n\n\n\n<p>Here&#8217;s what else the Enterprise plan unlocks for you:&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Add 15 minutes to virtual machines. <\/strong>Do more with longer task completion times and never worry about the time limit.&nbsp;<\/li>\n\n\n\n<li><strong>Analyze files up to 100 MB. <\/strong>&nbsp;Easily analyze malware, no matter the file size.&nbsp;<\/li>\n\n\n\n<li><strong>Control task privacy. <\/strong>Choose between public and private tasks to control who can see them.&nbsp;<\/li>\n\n\n\n<li><strong>Priority in the queue.<\/strong> Launch tasks faster and start process monitoring right away with priority queueing.&nbsp;<\/li>\n\n\n\n<li><strong>Set up a custom VPN. <\/strong>Protect your team&#8217;s privacy with a personalized OpenVPN configuration.&nbsp;<\/li>\n\n\n\n<li><strong>Hunt C2 servers with FakeNet. <\/strong>Intercept HTTP requests and return a 404 error to reveal the Command-and-Control address of malware.&nbsp;<\/li>\n\n\n\n<li><strong>Synchronize security teams with a custom API.<\/strong> Automatically submit files and URLs for analysis or download them from ANY.RUN to keep your security teams in sync.&nbsp;<\/li>\n<\/ul>\n\n\n\n<p>And if the Enterprise plan seems like overkill, don\u2019t forget that ANY.RUN has other pricing options! <\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/any.run\/cybersecurity-blog\/subscriptions-hunter-plan\/\" target=\"_blank\" rel=\"noreferrer noopener\">Hunter plan<\/a>\u00a0<\/li>\n\n\n\n<li><a href=\"https:\/\/any.run\/cybersecurity-blog\/subscriptions-community-plan\/\" target=\"_blank\" rel=\"noreferrer noopener\">Community plan<\/a>&nbsp;<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>At ANY.RUN, we offer four pricing plans: Free, Hunter, and Enterprise. While the first three are perfect for individual researchers and small companies, they may be limiting for work in large corporate environments.\u00a0\u00a0\u00a0 If your Security Operation Center (SOC) or threat research teams have 5 or more members, if you actively manage team access, or [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":4551,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[6],"tags":[57,10,34],"class_list":["post-4528","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-instructions","tag-anyrun","tag-cybersecurity","tag-malware-analysis"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v20.10 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Manage Large Security Teams \u00a0 with ANY.RUN for Enterprises\u00a0 - ANY.RUN&#039;s Cybersecurity Blog<\/title>\n<meta name=\"description\" content=\"ANY.RUN\u2019s Enterprise plan is designed to increase the productivity of your SOC team that has 5+ members. Read about features in the post.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/any.run\/cybersecurity-blog\/anyrun-for-enterprises\/\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jack Zalesskiy\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/anyrun-for-enterprises\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/anyrun-for-enterprises\/\"},\"author\":{\"name\":\"Jack Zalesskiy\",\"@id\":\"https:\/\/any.run\/\"},\"headline\":\"Manage Large Security Teams \u00a0 with ANY.RUN for Enterprises\u00a0\",\"datePublished\":\"2023-03-14T06:39:32+00:00\",\"dateModified\":\"2025-11-13T08:53:32+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/anyrun-for-enterprises\/\"},\"wordCount\":605,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/any.run\/\"},\"keywords\":[\"ANYRUN\",\"cybersecurity\",\"malware analysis\"],\"articleSection\":[\"Instructions on ANY.RUN\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/any.run\/cybersecurity-blog\/anyrun-for-enterprises\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/anyrun-for-enterprises\/\",\"url\":\"https:\/\/any.run\/cybersecurity-blog\/anyrun-for-enterprises\/\",\"name\":\"Manage Large Security Teams \u00a0 with ANY.RUN for Enterprises\u00a0 - ANY.RUN&#039;s Cybersecurity Blog\",\"isPartOf\":{\"@id\":\"https:\/\/any.run\/\"},\"datePublished\":\"2023-03-14T06:39:32+00:00\",\"dateModified\":\"2025-11-13T08:53:32+00:00\",\"description\":\"ANY.RUN\u2019s Enterprise plan is designed to increase the productivity of your SOC team that has 5+ members. Read about features in the post.\",\"breadcrumb\":{\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/anyrun-for-enterprises\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/any.run\/cybersecurity-blog\/anyrun-for-enterprises\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/anyrun-for-enterprises\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/any.run\/cybersecurity-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Instructions on ANY.RUN\",\"item\":\"https:\/\/any.run\/cybersecurity-blog\/category\/instructions\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Manage Large Security Teams \u00a0 with ANY.RUN for Enterprises\u00a0\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/any.run\/\",\"url\":\"https:\/\/any.run\/\",\"name\":\"ANY.RUN&#039;s Cybersecurity Blog\",\"description\":\"Cybersecurity Blog covers topics for experienced professionals as well as for those new to it.\",\"publisher\":{\"@id\":\"https:\/\/any.run\/\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/any.run\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/any.run\/\",\"name\":\"ANY.RUN\",\"url\":\"https:\/\/any.run\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/any.run\/\",\"url\":\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg\",\"contentUrl\":\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg\",\"width\":1,\"height\":1,\"caption\":\"ANY.RUN\"},\"image\":{\"@id\":\"https:\/\/any.run\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/www.any.run\/\",\"https:\/\/twitter.com\/anyrun_app\",\"https:\/\/www.linkedin.com\/company\/30692044\",\"https:\/\/www.youtube.com\/channel\/UCOgCPho7lzmH7m6fPNlukrQ\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/any.run\/\",\"name\":\"Jack Zalesskiy\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/any.run\/\",\"url\":\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/03\/image1-min-1-1-1-1.webp\",\"contentUrl\":\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/03\/image1-min-1-1-1-1.webp\",\"caption\":\"Jack Zalesskiy\"},\"description\":\"Jack Zalesskiy is a technology writer with five years of experience under his belt. He closely follows malware incidents, data breaches, and the way in which cyber threats manifest in our day-to-day lives.\",\"url\":\"#molongui-disabled-link\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Manage Large Security Teams \u00a0 with ANY.RUN for Enterprises\u00a0 - ANY.RUN&#039;s Cybersecurity Blog","description":"ANY.RUN\u2019s Enterprise plan is designed to increase the productivity of your SOC team that has 5+ members. Read about features in the post.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/any.run\/cybersecurity-blog\/anyrun-for-enterprises\/","twitter_misc":{"Written by":"Jack Zalesskiy","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/any.run\/cybersecurity-blog\/anyrun-for-enterprises\/#article","isPartOf":{"@id":"https:\/\/any.run\/cybersecurity-blog\/anyrun-for-enterprises\/"},"author":{"name":"Jack Zalesskiy","@id":"https:\/\/any.run\/"},"headline":"Manage Large Security Teams \u00a0 with ANY.RUN for Enterprises\u00a0","datePublished":"2023-03-14T06:39:32+00:00","dateModified":"2025-11-13T08:53:32+00:00","mainEntityOfPage":{"@id":"https:\/\/any.run\/cybersecurity-blog\/anyrun-for-enterprises\/"},"wordCount":605,"commentCount":0,"publisher":{"@id":"https:\/\/any.run\/"},"keywords":["ANYRUN","cybersecurity","malware analysis"],"articleSection":["Instructions on ANY.RUN"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/any.run\/cybersecurity-blog\/anyrun-for-enterprises\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/any.run\/cybersecurity-blog\/anyrun-for-enterprises\/","url":"https:\/\/any.run\/cybersecurity-blog\/anyrun-for-enterprises\/","name":"Manage Large Security Teams \u00a0 with ANY.RUN for Enterprises\u00a0 - ANY.RUN&#039;s Cybersecurity Blog","isPartOf":{"@id":"https:\/\/any.run\/"},"datePublished":"2023-03-14T06:39:32+00:00","dateModified":"2025-11-13T08:53:32+00:00","description":"ANY.RUN\u2019s Enterprise plan is designed to increase the productivity of your SOC team that has 5+ members. Read about features in the post.","breadcrumb":{"@id":"https:\/\/any.run\/cybersecurity-blog\/anyrun-for-enterprises\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/any.run\/cybersecurity-blog\/anyrun-for-enterprises\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/any.run\/cybersecurity-blog\/anyrun-for-enterprises\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/any.run\/cybersecurity-blog\/"},{"@type":"ListItem","position":2,"name":"Instructions on ANY.RUN","item":"https:\/\/any.run\/cybersecurity-blog\/category\/instructions\/"},{"@type":"ListItem","position":3,"name":"Manage Large Security Teams \u00a0 with ANY.RUN for Enterprises\u00a0"}]},{"@type":"WebSite","@id":"https:\/\/any.run\/","url":"https:\/\/any.run\/","name":"ANY.RUN&#039;s Cybersecurity Blog","description":"Cybersecurity Blog covers topics for experienced professionals as well as for those new to it.","publisher":{"@id":"https:\/\/any.run\/"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/any.run\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/any.run\/","name":"ANY.RUN","url":"https:\/\/any.run\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/any.run\/","url":"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg","contentUrl":"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg","width":1,"height":1,"caption":"ANY.RUN"},"image":{"@id":"https:\/\/any.run\/"},"sameAs":["https:\/\/www.facebook.com\/www.any.run\/","https:\/\/twitter.com\/anyrun_app","https:\/\/www.linkedin.com\/company\/30692044","https:\/\/www.youtube.com\/channel\/UCOgCPho7lzmH7m6fPNlukrQ"]},{"@type":"Person","@id":"https:\/\/any.run\/","name":"Jack Zalesskiy","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/any.run\/","url":"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/03\/image1-min-1-1-1-1.webp","contentUrl":"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/03\/image1-min-1-1-1-1.webp","caption":"Jack Zalesskiy"},"description":"Jack Zalesskiy is a technology writer with five years of experience under his belt. He closely follows malware incidents, data breaches, and the way in which cyber threats manifest in our day-to-day lives.","url":"#molongui-disabled-link"}]}},"_links":{"self":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts\/4528"}],"collection":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/comments?post=4528"}],"version-history":[{"count":19,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts\/4528\/revisions"}],"predecessor-version":[{"id":16765,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts\/4528\/revisions\/16765"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/media\/4551"}],"wp:attachment":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/media?parent=4528"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/categories?post=4528"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/tags?post=4528"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}