{"id":7991,"date":"2024-06-14T09:20:38","date_gmt":"2024-06-14T09:20:38","guid":{"rendered":"\/cybersecurity-blog\/?p=7991"},"modified":"2024-06-18T10:16:15","modified_gmt":"2024-06-18T10:16:15","slug":"bsides-cybersec-2024","status":"publish","type":"post","link":"https:\/\/any.run\/cybersecurity-blog\/bsides-cybersec-2024\/","title":{"rendered":"ANY.RUN Represented at BSides Canada and Cybersec Europe 2024\u00a0"},"content":{"rendered":"\n<p>ANY.RUN friends, Lena Yu (aka <a href=\"https:\/\/x.com\/LambdaMamba\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">@LambdaMamba<\/a>) and <a href=\"https:\/\/fr.linkedin.com\/in\/tissot\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Guillaume Tissot<\/a> <\/br>from SoftCryptum, represented ANY.RUN at two recent cybersec events: <a href=\"https:\/\/www.bsidesvancouver.com\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">BSides Vancouver 2024<\/a> and <a href=\"https:\/\/www.cyberseceurope.com\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Cybersec Europe 2024<\/a>.&nbsp;<\/p>\n\n\n\n<p>Thank you for sharing your knowledge about ANY.RUN with the cybersecurity world!&nbsp;<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"667\" height=\"1024\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2024\/06\/image-min-2-667x1024.png\" alt=\"\" class=\"wp-image-7992\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/06\/image-min-2-667x1024.png 667w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/06\/image-min-2-196x300.png 196w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/06\/image-min-2-768x1178.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/06\/image-min-2-1001x1536.png 1001w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/06\/image-min-2-370x568.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/06\/image-min-2-270x414.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/06\/image-min-2-740x1135.png 740w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/06\/image-min-2.png 1157w\" sizes=\"(max-width: 667px) 100vw, 667px\" \/><figcaption class=\"wp-element-caption\">ANY.RUN ambassador, Lena @ BSides Vancouver&nbsp;<\/figcaption><\/figure><\/div>\n\n\n<p>We believe that&nbsp;events like these are super important \u2014 not only do they allow us to share what we&#8217;re doing at ANY.RUN to make malware analysis easier and faster, but they also provide important insights to help security professionals defend against new threats.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">ANY.RUN at Bsides Vancouver&nbsp;<\/h2>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"768\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2024\/06\/image2-min-1-1024x768.png\" alt=\"\" class=\"wp-image-7993\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/06\/image2-min-1-1024x768.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/06\/image2-min-1-300x225.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/06\/image2-min-1-768x576.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/06\/image2-min-1-1536x1152.png 1536w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/06\/image2-min-1-370x278.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/06\/image2-min-1-270x203.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/06\/image2-min-1-740x555.png 740w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/06\/image2-min-1-80x60.png 80w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/06\/image2-min-1.png 2048w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\">Lena opens up her talk at BSides Vancouver<\/figcaption><\/figure><\/div>\n\n\n<p>With this in mind, Lena gave a talk on a \u201cmalware symphony\u201d she discovered at BSides Vancouver 2024.\u00a0<\/p>\n\n\n\n<p>(<a href=\"https:\/\/any.run\/cybersecurity-blog\/crackedcantil-breakdown\/\" target=\"_blank\" rel=\"noreferrer noopener\">Read Lena\u2019s analysis of malware symphony in ANY.RUN\u2019s blog<\/a>)&nbsp;<\/p>\n\n\n\n<p><strong>About BSides<\/strong>: BSides is an attendee-driven cybersecurity conference that has been held in many iterations since 2009. It&#8217;s named after the &#8220;B-side&#8221; of a record.&nbsp;<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"768\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2024\/06\/image-1024x768.jpg\" alt=\"\" class=\"wp-image-7994\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/06\/image-1024x768.jpg 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/06\/image-300x225.jpg 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/06\/image-768x576.jpg 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/06\/image-1536x1152.jpg 1536w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/06\/image-370x278.jpg 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/06\/image-270x203.jpg 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/06\/image-740x555.jpg 740w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/06\/image-80x60.jpg 80w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/06\/image.jpg 2048w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\">Lena explains her findings at BSides Vancouver<\/figcaption><\/figure><\/div>\n\n\n<p>Lena defines \u201cmalware symphony\u201d as a threat that involves multiple families performing a coordinated malicious act. &nbsp;<\/p>\n\n\n\n<p>She walked the audience through her analysis process using ANY.RUN and showed how our platform simplifies the investigation of complex threats.&nbsp;<\/p>\n\n\n\n<!-- Regular Banner START -->\n<div class=\"regular-banner\">\n<!-- Text Content -->\n<p class=\"regular-banner__text\">\nEasily analyze malware in <span class=\"highlight\">ANY.RUN sandbox<\/span>&nbsp;\n<\/p>\n<!-- CTA Link -->\n<a class=\"regular-banner__link\" id=\"article-banner-regular\" href=\"https:\/\/app.any.run\/?utm_source=anyrunblog&#038;utm_medium=article&#038;utm_campaign=bsides_cybersec_24&#038;utm_term=140624&#038;utm_content=linktoregistration#register\" rel=\"noopener\" target=\"_blank\">\nRegister for free\u00a0\n<\/a>\n<\/div>\n<!-- Regular Banner END -->\n<!-- Regular Banner Styles START -->\n\n<style>\n.regular-banner {\ndisplay: flex;\ntext-align: center;\nflex-direction: column;\nalign-items: center;\ngap: 1.5rem;\nwidth: 100%;\npadding: 2rem;\nmargin: 1.5rem 0;\nborder-radius: 0.5rem;\nfont-family: 'Catamaran Bold';\nmargin-inline: auto;\nbackground: rgba(32, 168, 241, 0.1);\nborder: 1px solid rgba(75, 174, 227, 0.32);\n}\n\n.regular-banner__text {\nfont-size: 1.5rem;\nmargin: 0;\n}\n\n.highlight {\ncolor: #ea2526;\n}\n\n.regular-banner__link {\npadding: 0.5rem 1.5rem;\nfont-weight: 500;\ntext-decoration: none;\nborder-radius: 0.5rem;\ncolor: #FFFFFF;\nbackground-color: #1491D4;\ntext-align: center;\ntransition: all 0.2s ease-in;\n}\n\n.regular-banner__link:hover {\nbackground-color: #68CBFF;\ncolor: white;\n}\n<\/style>\n<!-- Regular Banner Styles END -->\n\n\n\n<h2 class=\"wp-block-heading\">ANY.RUN at Cybersec Europe&nbsp;<\/h2>\n\n\n\n<p>At another exciting event, Guillaume TISSOT from SoftCryptum flew the ANY.RUN flag at Cybersec Europe 2024 in Brussels.&nbsp;<\/p>\n\n\n\n<p><strong>About Cybersec<\/strong>: Cybersec represents some of the largest conferences in Europe, soon to expand to Asia. The conferences focus on cybersecurity strategy, IT protection, data protection and privacy, as well as many other security topics.&nbsp;<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"1024\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2024\/06\/image3-min-1024x1024.png\" alt=\"\" class=\"wp-image-7995\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/06\/image3-min-1024x1024.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/06\/image3-min-300x300.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/06\/image3-min-150x150.png 150w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/06\/image3-min-768x768.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/06\/image3-min-70x70.png 70w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/06\/image3-min-370x370.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/06\/image3-min-270x270.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/06\/image3-min-740x740.png 740w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/06\/image3-min.png 1536w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\">Guillaume showing off ANY.RUN at Cybersec Europe<\/figcaption><\/figure><\/div>\n\n\n<p>Guillaume expertly presented ANY.RUN.<\/p>\n\n\n\n<p>During the conference, attendees were able to visit the booth and learn how our products both streamline malware analysis through the interactive sandbox and expand threat intelligence capabilities through Threat Intelligence Lookup, YARA Search and Feeds.&nbsp;<\/p>\n\n\n\n<p>A big thanks to Lena and Guillaume for representing ANY.RUN so well at these industry events. We really appreciate you sharing your knowledge and connecting with the community.&nbsp;<\/p>\n\n\n\n<p>We&#8217;re looking forward to attending more of these events in the future. They&#8217;re a fantastic opportunity to collaborate with peers, learn from each other&#8217;s experiences, and push the boundaries of malware analysis!&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">About ANY.RUN&nbsp;&nbsp;<\/h2>\n\n\n\n<p><a href=\"https:\/\/any.run\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=bsides_cybersec_24&amp;utm_term=140624&amp;utm_content=linktolanding\" target=\"_blank\" rel=\"noreferrer noopener\">ANY.RUN<\/a> helps more than 400,000 cybersecurity professionals worldwide. Our interactive sandbox simplifies malware analysis of threats that target both Windows and Linux systems. Our threat intelligence products, <a href=\"https:\/\/any.run\/cybersecurity-blog\/introducing-any-run-threat-intelligence-lookup\/\" target=\"_blank\" rel=\"noreferrer noopener\">TI Lookup<\/a>, <a href=\"https:\/\/any.run\/cybersecurity-blog\/yara-search\/\" target=\"_blank\" rel=\"noreferrer noopener\">Yara Search<\/a>, and <a href=\"https:\/\/any.run\/cybersecurity-blog\/threat-intelligence-feeds\/\" target=\"_blank\" rel=\"noreferrer noopener\">Feeds<\/a>, help you find IOCs or files to learn more about the threats and respond to incidents faster.&nbsp;&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Advantages of ANY.RUN&nbsp;&nbsp;<\/h3>\n\n\n\n<p>ANY.RUN helps you analyze threats faster while improving detection rates. The platform detects common malware families with YARA and Suricata rules and identifies malware behavior with signatures when detection by family is not possible.&nbsp;<\/p>\n\n\n\n<p><strong>With ANY.RUN you can:<\/strong>&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Detect malware in under 40s.&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Interact with samples in real time.&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Save time and money on sandbox setup and maintenance&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Record and study all aspects of malware behavior.&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Collaborate with your team&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Scale as you need.&nbsp;<\/li>\n<\/ul>\n\n\n\n<p>Try the full power of ANY.RUN for free&nbsp;<\/p>\n\n\n\n<p><a href=\"https:\/\/any.run\/demo\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=bsides_cybersec_24&amp;utm_term=140624&amp;utm_content=linktodemo\" target=\"_blank\" rel=\"noreferrer noopener\">Request free trial \u2192<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>ANY.RUN friends, Lena Yu (aka @LambdaMamba) and Guillaume Tissot from SoftCryptum, represented ANY.RUN at two recent cybersec events: BSides Vancouver 2024 and Cybersec Europe 2024.&nbsp; Thank you for sharing your knowledge about ANY.RUN with the cybersecurity world!&nbsp; We believe that&nbsp;events like these are super important \u2014 not only do they allow us to share what [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":7997,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[60],"tags":[57,69,10],"class_list":["post-7991","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news","tag-anyrun","tag-conference","tag-cybersecurity"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v20.10 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>ANY.RUN at BSides Canada and Cybersec Europe 2024\u00a0<\/title>\n<meta name=\"description\" content=\"Learn about ANY.RUN&#039;s recent participation in two cybersecurity events: BSides Vancouver 2024 and Cybersec Europe 2024.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/any.run\/cybersecurity-blog\/bsides-cybersec-2024\/\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"ANY.RUN\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/bsides-cybersec-2024\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/bsides-cybersec-2024\/\"},\"author\":{\"name\":\"ANY.RUN\",\"@id\":\"https:\/\/any.run\/\"},\"headline\":\"ANY.RUN Represented at BSides Canada and Cybersec Europe 2024\u00a0\",\"datePublished\":\"2024-06-14T09:20:38+00:00\",\"dateModified\":\"2024-06-18T10:16:15+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/bsides-cybersec-2024\/\"},\"wordCount\":568,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/any.run\/\"},\"keywords\":[\"ANYRUN\",\"conference\",\"cybersecurity\"],\"articleSection\":[\"News\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/any.run\/cybersecurity-blog\/bsides-cybersec-2024\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/bsides-cybersec-2024\/\",\"url\":\"https:\/\/any.run\/cybersecurity-blog\/bsides-cybersec-2024\/\",\"name\":\"ANY.RUN at BSides Canada and Cybersec Europe 2024\u00a0\",\"isPartOf\":{\"@id\":\"https:\/\/any.run\/\"},\"datePublished\":\"2024-06-14T09:20:38+00:00\",\"dateModified\":\"2024-06-18T10:16:15+00:00\",\"description\":\"Learn about ANY.RUN's recent participation in two cybersecurity events: BSides Vancouver 2024 and Cybersec Europe 2024.\",\"breadcrumb\":{\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/bsides-cybersec-2024\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/any.run\/cybersecurity-blog\/bsides-cybersec-2024\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/bsides-cybersec-2024\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/any.run\/cybersecurity-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"News\",\"item\":\"https:\/\/any.run\/cybersecurity-blog\/category\/news\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"ANY.RUN Represented at BSides Canada and Cybersec Europe 2024\u00a0\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/any.run\/\",\"url\":\"https:\/\/any.run\/\",\"name\":\"ANY.RUN&#039;s Cybersecurity Blog\",\"description\":\"Cybersecurity Blog covers topics for experienced professionals as well as for those new to it.\",\"publisher\":{\"@id\":\"https:\/\/any.run\/\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/any.run\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/any.run\/\",\"name\":\"ANY.RUN\",\"url\":\"https:\/\/any.run\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/any.run\/\",\"url\":\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg\",\"contentUrl\":\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg\",\"width\":1,\"height\":1,\"caption\":\"ANY.RUN\"},\"image\":{\"@id\":\"https:\/\/any.run\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/www.any.run\/\",\"https:\/\/twitter.com\/anyrun_app\",\"https:\/\/www.linkedin.com\/company\/30692044\",\"https:\/\/www.youtube.com\/channel\/UCOgCPho7lzmH7m6fPNlukrQ\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/any.run\/\",\"name\":\"ANY.RUN\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/any.run\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/c4ce3a6c672056b4a8cd6b0110782215?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/c4ce3a6c672056b4a8cd6b0110782215?s=96&d=mm&r=g\",\"caption\":\"ANY.RUN\"},\"url\":\"https:\/\/any.run\/cybersecurity-blog\/author\/a-bespalova\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"ANY.RUN at BSides Canada and Cybersec Europe 2024\u00a0","description":"Learn about ANY.RUN's recent participation in two cybersecurity events: BSides Vancouver 2024 and Cybersec Europe 2024.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/any.run\/cybersecurity-blog\/bsides-cybersec-2024\/","twitter_misc":{"Written by":"ANY.RUN","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/any.run\/cybersecurity-blog\/bsides-cybersec-2024\/#article","isPartOf":{"@id":"https:\/\/any.run\/cybersecurity-blog\/bsides-cybersec-2024\/"},"author":{"name":"ANY.RUN","@id":"https:\/\/any.run\/"},"headline":"ANY.RUN Represented at BSides Canada and Cybersec Europe 2024\u00a0","datePublished":"2024-06-14T09:20:38+00:00","dateModified":"2024-06-18T10:16:15+00:00","mainEntityOfPage":{"@id":"https:\/\/any.run\/cybersecurity-blog\/bsides-cybersec-2024\/"},"wordCount":568,"commentCount":0,"publisher":{"@id":"https:\/\/any.run\/"},"keywords":["ANYRUN","conference","cybersecurity"],"articleSection":["News"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/any.run\/cybersecurity-blog\/bsides-cybersec-2024\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/any.run\/cybersecurity-blog\/bsides-cybersec-2024\/","url":"https:\/\/any.run\/cybersecurity-blog\/bsides-cybersec-2024\/","name":"ANY.RUN at BSides Canada and Cybersec Europe 2024\u00a0","isPartOf":{"@id":"https:\/\/any.run\/"},"datePublished":"2024-06-14T09:20:38+00:00","dateModified":"2024-06-18T10:16:15+00:00","description":"Learn about ANY.RUN's recent participation in two cybersecurity events: BSides Vancouver 2024 and Cybersec Europe 2024.","breadcrumb":{"@id":"https:\/\/any.run\/cybersecurity-blog\/bsides-cybersec-2024\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/any.run\/cybersecurity-blog\/bsides-cybersec-2024\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/any.run\/cybersecurity-blog\/bsides-cybersec-2024\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/any.run\/cybersecurity-blog\/"},{"@type":"ListItem","position":2,"name":"News","item":"https:\/\/any.run\/cybersecurity-blog\/category\/news\/"},{"@type":"ListItem","position":3,"name":"ANY.RUN Represented at BSides Canada and Cybersec Europe 2024\u00a0"}]},{"@type":"WebSite","@id":"https:\/\/any.run\/","url":"https:\/\/any.run\/","name":"ANY.RUN&#039;s Cybersecurity Blog","description":"Cybersecurity Blog covers topics for experienced professionals as well as for those new to it.","publisher":{"@id":"https:\/\/any.run\/"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/any.run\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/any.run\/","name":"ANY.RUN","url":"https:\/\/any.run\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/any.run\/","url":"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg","contentUrl":"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg","width":1,"height":1,"caption":"ANY.RUN"},"image":{"@id":"https:\/\/any.run\/"},"sameAs":["https:\/\/www.facebook.com\/www.any.run\/","https:\/\/twitter.com\/anyrun_app","https:\/\/www.linkedin.com\/company\/30692044","https:\/\/www.youtube.com\/channel\/UCOgCPho7lzmH7m6fPNlukrQ"]},{"@type":"Person","@id":"https:\/\/any.run\/","name":"ANY.RUN","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/any.run\/","url":"https:\/\/secure.gravatar.com\/avatar\/c4ce3a6c672056b4a8cd6b0110782215?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/c4ce3a6c672056b4a8cd6b0110782215?s=96&d=mm&r=g","caption":"ANY.RUN"},"url":"https:\/\/any.run\/cybersecurity-blog\/author\/a-bespalova\/"}]}},"_links":{"self":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts\/7991"}],"collection":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/comments?post=7991"}],"version-history":[{"count":10,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts\/7991\/revisions"}],"predecessor-version":[{"id":8028,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts\/7991\/revisions\/8028"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/media\/7997"}],"wp:attachment":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/media?parent=7991"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/categories?post=7991"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/tags?post=7991"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}