{"id":8509,"date":"2024-08-01T08:56:20","date_gmt":"2024-08-01T08:56:20","guid":{"rendered":"\/cybersecurity-blog\/?p=8509"},"modified":"2024-08-20T09:36:51","modified_gmt":"2024-08-20T09:36:51","slug":"release-notes-july-2024","status":"publish","type":"post","link":"\/cybersecurity-blog\/release-notes-july-2024\/","title":{"rendered":"Release Notes: New IOCs in TI Lookup, Network Threats Tab, Free Windows 10 VM, and More"},"content":{"rendered":"\n<p>Welcome to <a href=\"https:\/\/any.run\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release_notes_july24&amp;utm_term=010824&amp;utm_content=linktolanding\" target=\"_blank\" rel=\"noreferrer noopener\">ANY.RUN<\/a>&#8216;s monthly updates, where we share our team&#8217;s achievements over the past month. &nbsp;<\/p>\n\n\n\n<p>In July, we introduced new features in <a href=\"https:\/\/any.run\/cybersecurity-blog\/introducing-any-run-threat-intelligence-lookup\/\" target=\"_blank\" rel=\"noreferrer noopener\">Threat Intelligence Lookup<\/a>, added Windows 10 for free users, reduced task startup time, implemented numerous YARA rules and signatures, and expanded our Suricata ruleset. &nbsp;<\/p>\n\n\n\n<p>Let\u2019s break down what\u2019s new in ANY.RUN step by step.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Product Updates&nbsp;<\/h2>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"576\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2024\/08\/image-1024x576.png\" alt=\"\" class=\"wp-image-8510\" srcset=\"\/cybersecurity-blog\/wp-content\/uploads\/2024\/08\/image-1024x576.png 1024w, \/cybersecurity-blog\/wp-content\/uploads\/2024\/08\/image-300x169.png 300w, \/cybersecurity-blog\/wp-content\/uploads\/2024\/08\/image-768x432.png 768w, \/cybersecurity-blog\/wp-content\/uploads\/2024\/08\/image-370x208.png 370w, \/cybersecurity-blog\/wp-content\/uploads\/2024\/08\/image-270x152.png 270w, \/cybersecurity-blog\/wp-content\/uploads\/2024\/08\/image-740x416.png 740w, \/cybersecurity-blog\/wp-content\/uploads\/2024\/08\/image.png 1395w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\">Search query for finding domains from Remcos\u2019s configs <\/figcaption><\/figure><\/div>\n\n\n<h3 class=\"wp-block-heading\">IOCs from malware configurations in TI Lookup<\/h3>\n\n\n\n<p>IOCs extracted directly from malware configurations are the most reliable&nbsp;means to identify attackers\u2019 infrastructure.&nbsp;<a href=\"https:\/\/intelligence.any.run\/analysis\/lookup\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release_notes_july24&amp;utm_term=010824&amp;utm_content=linktolookup\" target=\"_blank\" rel=\"noreferrer noopener\">TI Lookup<\/a> now gives you access to these IOCs, labeling them with the \u201cmalconf\u201d tag.<\/p>\n\n\n\n<p><a href=\"https:\/\/any.run\/cybersecurity-blog\/malconf-in-ti-lookup\/\" target=\"_blank\" rel=\"noreferrer noopener\">Learn more<\/a><\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"683\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2024\/08\/image2-1-1-1024x683.png\" alt=\"\" class=\"wp-image-8513\" srcset=\"\/cybersecurity-blog\/wp-content\/uploads\/2024\/08\/image2-1-1-1024x683.png 1024w, \/cybersecurity-blog\/wp-content\/uploads\/2024\/08\/image2-1-1-300x200.png 300w, \/cybersecurity-blog\/wp-content\/uploads\/2024\/08\/image2-1-1-768x512.png 768w, \/cybersecurity-blog\/wp-content\/uploads\/2024\/08\/image2-1-1-1536x1024.png 1536w, \/cybersecurity-blog\/wp-content\/uploads\/2024\/08\/image2-1-1-2048x1365.png 2048w, \/cybersecurity-blog\/wp-content\/uploads\/2024\/08\/image2-1-1-370x247.png 370w, \/cybersecurity-blog\/wp-content\/uploads\/2024\/08\/image2-1-1-270x180.png 270w, \/cybersecurity-blog\/wp-content\/uploads\/2024\/08\/image2-1-1-740x493.png 740w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\">Results for SuricataThreatLevel:&#8221;malicious&#8221;<\/figcaption><\/figure><\/div>\n\n\n<h3 class=\"wp-block-heading\">Suricata search in TI Lookup<\/h3>\n\n\n\n<p>We&#8217;ve also added a new Suricata search feature, allowing you to use parameters like <strong>SuricataClass<\/strong>, <strong>SuricataMessage<\/strong>, <strong>SuricataThreatLevel<\/strong>, and <strong>SuricataID<\/strong> to find specific network threats. <\/p>\n\n\n\n<p>Plus, the <strong>Network Threats <\/strong>tab in TI Lookup<strong> <\/strong>includes all the discovered Suricata detections, making it easier to identify potential network-based risks.<\/p>\n\n\n\n<p><a href=\"https:\/\/any.run\/cybersecurity-blog\/suricata-search\/\" target=\"_blank\" rel=\"noreferrer noopener\">Learn more<\/a><\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"858\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2024\/08\/image2-1024x858.png\" alt=\"\" class=\"wp-image-8511\" srcset=\"\/cybersecurity-blog\/wp-content\/uploads\/2024\/08\/image2-1024x858.png 1024w, \/cybersecurity-blog\/wp-content\/uploads\/2024\/08\/image2-300x251.png 300w, \/cybersecurity-blog\/wp-content\/uploads\/2024\/08\/image2-768x644.png 768w, \/cybersecurity-blog\/wp-content\/uploads\/2024\/08\/image2-1536x1288.png 1536w, \/cybersecurity-blog\/wp-content\/uploads\/2024\/08\/image2-370x310.png 370w, \/cybersecurity-blog\/wp-content\/uploads\/2024\/08\/image2-270x226.png 270w, \/cybersecurity-blog\/wp-content\/uploads\/2024\/08\/image2-740x620.png 740w, \/cybersecurity-blog\/wp-content\/uploads\/2024\/08\/image2.png 1978w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\">Select Windows 10 from the list of operating systems<\/figcaption><\/figure><\/div>\n\n\n<h3 class=\"wp-block-heading\">Windows 10 \u2013 now free for everyone&nbsp;<\/h3>\n\n\n\n<p>We&#8217;ve <a href=\"https:\/\/any.run\/cybersecurity-blog\/windows-10-sandbox\/\" target=\"_blank\" rel=\"noreferrer noopener\">introduced Windows 10<\/a> for free users, expanding testing capabilities for all our users.&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Analysis sessions take just 5 seconds to start<\/h3>\n\n\n\n<p>We&#8217;ve significantly optimized our analysis session startup process. <strong>Sessions now initiate in less than 5 seconds<\/strong>.&nbsp;<\/p>\n\n\n\n<!-- Regular Banner START -->\n<div class=\"regular-banner\">\n<!-- Text Content -->\n<p class=\"regular-banner__text\">\nIntegrate <span class=\"highlight\">ANY.RUN solutions<\/span> in your organization&nbsp;\n<\/p>\n<!-- CTA Link -->\n<a class=\"regular-banner__link\" id=\"article-banner-regular\" href=\"https:\/\/app.any.run\/contact-us\/?utm_source=anyrunblog&#038;utm_medium=article&#038;utm_campaign=release_notes_july24&#038;utm_term=010824&#038;utm_content=linktocontactus\" rel=\"noopener\" target=\"_blank\">\nContact Sales\n<\/a>\n<\/div>\n<!-- Regular Banner END -->\n<!-- Regular Banner Styles START -->\n\n<style>\n.regular-banner {\ndisplay: flex;\ntext-align: center;\nflex-direction: column;\nalign-items: center;\ngap: 1.5rem;\nwidth: 100%;\npadding: 2rem;\nmargin: 1.5rem 0;\nborder-radius: 0.5rem;\nfont-family: 'Catamaran Bold';\nmargin-inline: auto;\nbackground: rgba(32, 168, 241, 0.1);\nborder: 1px solid rgba(75, 174, 227, 0.32);\n}\n\n.regular-banner__text {\nfont-size: 1.5rem;\nmargin: 0;\n}\n\n.highlight {\ncolor: #ea2526;\n}\n\n.regular-banner__link {\npadding: 0.5rem 1.5rem;\nfont-weight: 500;\ntext-decoration: none;\nborder-radius: 0.5rem;\ncolor: #FFFFFF;\nbackground-color: #1491D4;\ntext-align: center;\ntransition: all 0.2s ease-in;\n}\n\n.regular-banner__link:hover {\nbackground-color: #68CBFF;\ncolor: white;\n}\n<\/style>\n<!-- Regular Banner Styles END -->\n\n\n\n<h2 class=\"wp-block-heading\">New Signatures&nbsp;<\/h2>\n\n\n\n<p>Our malware analysts have been hard at work, significantly expanding our detection capabilities. This month, we&#8217;ve added a total of 54 new signatures, including:&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/app.any.run\/tasks\/7a9c8853-877c-4a04-b6c6-d01e00e08210\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release_notes_july24&amp;utm_term=010824&amp;utm_content=linktoservice\" target=\"_blank\" rel=\"noreferrer noopener\">XenoRat<\/a>.&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/app.any.run\/tasks\/f45e248b-b0d9-49bc-a8f0-acdc594e9432\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release_notes_july24&amp;utm_term=010824&amp;utm_content=linktoservice\" target=\"_blank\" rel=\"noreferrer noopener\">FakeBAT<\/a> loader.&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/app.any.run\/tasks\/6e8352a0-9f05-4fa9-b9a1-55f66c08a04e\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release_notes_july24&amp;utm_term=010824&amp;utm_content=linktoservice\" target=\"_blank\" rel=\"noreferrer noopener\">Medusa<\/a> ransomware (2 signatures).&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/app.any.run\/tasks\/63d3a559-314d-4292-9c36-aef65b10953a\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release_notes_july24&amp;utm_term=010824&amp;utm_content=linktoservice\" target=\"_blank\" rel=\"noreferrer noopener\">Borat<\/a> RAT.&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/app.any.run\/tasks\/705b2845-3097-473b-81e8-056466dfcd7b\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release_notes_july24&amp;utm_term=010824&amp;utm_content=linktoservice\" target=\"_blank\" rel=\"noreferrer noopener\">Blacksuit<\/a> ransomware (2 signatures).&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/app.any.run\/tasks\/78cb4604-0642-4770-baad-60946c66266d\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release_notes_july24&amp;utm_term=010824&amp;utm_content=linktoservice\" target=\"_blank\" rel=\"noreferrer noopener\">Strela<\/a>.&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/app.any.run\/tasks\/ec9cb1f5-d16d-4d69-8cc5-e59e2574314a\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release_notes_july24&amp;utm_term=010824&amp;utm_content=linktoservice\" target=\"_blank\" rel=\"noreferrer noopener\">Kematian<\/a> stealer (3 signatures).&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/app.any.run\/tasks\/14f964ed-d8b7-4e10-b4a9-d67bc7ae1310\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release_notes_july24&amp;utm_term=010824&amp;utm_content=linktoservice\" target=\"_blank\" rel=\"noreferrer noopener\">Sality<\/a>.&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/app.any.run\/tasks\/24d262a8-d273-4879-b50d-9a75b7111a37\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release_notes_july24&amp;utm_term=010824&amp;utm_content=linktoservice\" target=\"_blank\" rel=\"noreferrer noopener\">DoNex<\/a> ransomware.&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/app.any.run\/tasks\/eac2dd44-e93f-407a-91e1-8afdb7f54b30\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release_notes_july24&amp;utm_term=010824&amp;utm_content=linktoservice\" target=\"_blank\" rel=\"noreferrer noopener\">DarkRace<\/a> ransomware.&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/app.any.run\/tasks\/9c35b339-2453-46b1-ad8f-fc925ebf0a64\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release_notes_july24&amp;utm_term=010824&amp;utm_content=linktoservice\" target=\"_blank\" rel=\"noreferrer noopener\">Fake-Lockbit<\/a> ransomware.&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/app.any.run\/tasks\/118d777b-e563-46f7-ab16-18beffa38d96\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release_notes_july24&amp;utm_term=010824&amp;utm_content=linktoservice\" target=\"_blank\" rel=\"noreferrer noopener\">Turla<\/a>.&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/app.any.run\/tasks\/0135e2c9-3062-4a1d-8b5f-f7daaec35378\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release_notes_july24&amp;utm_term=010824&amp;utm_content=linktoservice\" target=\"_blank\" rel=\"noreferrer noopener\">Kematian<\/a> stealer.&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/app.any.run\/tasks\/b3e2e17f-535c-4edb-9151-aa309376afb7\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release_notes_july24&amp;utm_term=010824&amp;utm_content=linktoservice\" target=\"_blank\" rel=\"noreferrer noopener\">GootLoader<\/a>.&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/app.any.run\/tasks\/eb38cc10-907d-4b5c-a447-94ff89dcd570\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release_notes_july24&amp;utm_term=010824&amp;utm_content=linktoservice\" target=\"_blank\" rel=\"noreferrer noopener\">Blihan<\/a>.&nbsp;<\/li>\n<\/ul>\n\n\n\n<p>Among them, 35 are new behavioral signatures. <\/p>\n\n\n\n<h2 class=\"wp-block-heading\">New YARA Rules&nbsp;<\/h2>\n\n\n\n<p>Our YARA rule set has also been expanded and refined. New and updated rules cover a wide range of threats, including:&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/app.any.run\/tasks\/cf77336c-f915-4e20-be1f-5be23df8cdea\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release_notes_july24&amp;utm_term=010824&amp;utm_content=linktoservice\" target=\"_blank\" rel=\"noreferrer noopener\">Luka<\/a> ransomware.&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/app.any.run\/tasks\/19f9efae-81c0-4571-8ad9-6499e26de06f\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release_notes_july24&amp;utm_term=010824&amp;utm_content=linktoservice\" target=\"_blank\" rel=\"noreferrer noopener\">Medusa<\/a> ransomware.&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/app.any.run\/tasks\/10ce8bf5-ebb7-4f3a-87d8-bc395c6eb1b1\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release_notes_july24&amp;utm_term=010824&amp;utm_content=linktoservice\" target=\"_blank\" rel=\"noreferrer noopener\">Rainyday<\/a>.&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/app.any.run\/tasks\/ba19b688-5d0b-4aa6-bc81-4ef498800acf\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release_notes_july24&amp;utm_term=010824&amp;utm_content=linktoservice\" target=\"_blank\" rel=\"noreferrer noopener\">SpectreRAT<\/a>.&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/app.any.run\/tasks\/839bd561-ac6c-4776-99b1-a7a06ae8c134\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release_notes_july24&amp;utm_term=010824&amp;utm_content=linktoservice\" target=\"_blank\" rel=\"noreferrer noopener\">Winos<\/a>.&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/app.any.run\/tasks\/c6db9f57-67ed-4675-ae2f-f6237dd325f8\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release_notes_july24&amp;utm_term=010824&amp;utm_content=linktoservice\" target=\"_blank\" rel=\"noreferrer noopener\">XMRig<\/a> (with fixes).&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/app.any.run\/tasks\/329205c5-5f6e-42a2-93df-c1a597519b15\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release_notes_july24&amp;utm_term=010824&amp;utm_content=linktoservice\" target=\"_blank\" rel=\"noreferrer noopener\">Zombie<\/a>.&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/app.any.run\/tasks\/479636ab-f683-457a-94da-02189d2273d5\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release_notes_july24&amp;utm_term=010824&amp;utm_content=linktoservice\" target=\"_blank\" rel=\"noreferrer noopener\">Grandoreiro<\/a>.&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/app.any.run\/tasks\/f577c4a9-c321-4bb5-b223-3010ebb7513a\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release_notes_july24&amp;utm_term=010824&amp;utm_content=linktoservice\" target=\"_blank\" rel=\"noreferrer noopener\">M0yv<\/a> (with fixes)&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/app.any.run\/tasks\/cce42ddb-224e-4067-b7c6-9ea881ce3fb6\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release_notes_july24&amp;utm_term=010824&amp;utm_content=linktoservice\" target=\"_blank\" rel=\"noreferrer noopener\">VideoSpy<\/a>.&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/app.any.run\/tasks\/571e8198-0118-45f9-bb9f-ea659ff19283\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release_notes_july24&amp;utm_term=010824&amp;utm_content=linktoservice\" target=\"_blank\" rel=\"noreferrer noopener\">Metasploit<\/a>.&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/app.any.run\/tasks\/ba6be468-b1c6-472a-bfe9-179d20b2e4bf\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release_notes_july24&amp;utm_term=010824&amp;utm_content=linktoservice\" target=\"_blank\" rel=\"noreferrer noopener\">DeerStealer<\/a>.&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/app.any.run\/tasks\/1c6df9c9-b53c-407e-9d60-0a29a3ff0227?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release_notes_july24&amp;utm_term=010824&amp;utm_content=linktoservice\" target=\"_blank\" rel=\"noreferrer noopener\">AltraClipper<\/a>.&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/community.emergingthreats.net\/t\/metastealer-v-5-tls\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">MetaStealer<\/a> v.5 TLS Connection.&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/app.any.run\/tasks\/4e4e5c8e-029f-4a20-a128-a310c28c9357\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release_notes_july24&amp;utm_term=010824&amp;utm_content=linktoservice\" target=\"_blank\" rel=\"noreferrer noopener\">Strela<\/a> Stealer.&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/app.any.run\/tasks\/06518f8e-2226-41e0-985f-807f44e38f36\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release_notes_july24&amp;utm_term=010824&amp;utm_content=linktoservice\" target=\"_blank\" rel=\"noreferrer noopener\">Vidar<\/a> Stealer.&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/app.any.run\/tasks\/6f9abdfe-8287-4331-9893-881db5b67d6f\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release_notes_july24&amp;utm_term=010824&amp;utm_content=linktoservice\" target=\"_blank\" rel=\"noreferrer noopener\">XFiles<\/a> new version.&nbsp;<\/li>\n<\/ul>\n\n\n\n<p>We&#8217;ve also made improvements to existing tools, such as updating the <a href=\"https:\/\/app.any.run\/tasks\/d7a725c5-9233-4312-beab-9aa41b26db78\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release_notes_july24&amp;utm_term=010824&amp;utm_content=linktoservice\" target=\"_blank\" rel=\"noreferrer noopener\">extractor<\/a> for AsyncRat to now work effectively with BoratRat as well.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Advanced Detection Techniques&nbsp;<\/h2>\n\n\n\n<p>In our ongoing effort to stay ahead of evolving threats, we&#8217;ve implemented new YARA rules for detecting <a href=\"https:\/\/app.any.run\/tasks\/ce0623a3-588c-45df-90a6-3aaa8c9864b8\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release_notes_july24&amp;utm_term=010824&amp;utm_content=linktoservice\" target=\"_blank\" rel=\"noreferrer noopener\">WMI<\/a>, <a href=\"https:\/\/app.any.run\/tasks\/6473652b-a124-480a-85b3-28f6692088c1\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release_notes_july24&amp;utm_term=010824&amp;utm_content=linktoservice\" target=\"_blank\" rel=\"noreferrer noopener\">PowerShell<\/a>, and certain <a href=\"https:\/\/app.any.run\/tasks\/b82df52e-5cf9-4586-923a-f382a5c22638\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release_notes_july24&amp;utm_term=010824&amp;utm_content=linktoservice\" target=\"_blank\" rel=\"noreferrer noopener\">WinAPI<\/a> calls, including their base64 encoded variants.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Expanded Suricata Ruleset&nbsp;<\/h2>\n\n\n\n<p>Our Suricata ruleset saw a substantial expansion in July, with the addition of 248 new rules. These include:&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>89 rules targeting fake domains related to the recent CrowdStrike incident. <a href=\"https:\/\/x.com\/anyrun_app\/status\/1814373010440118470\" target=\"_blank\" rel=\"noreferrer noopener\">Twitter post<\/a>. <a href=\"https:\/\/app.any.run\/submissions#tag:fakedomain\" target=\"_blank\" rel=\"noreferrer noopener\">Example in ANY.RUN<\/a>. &nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>46 proactive <a href=\"https:\/\/intelligence.any.run\/analysis\/lookup#%7B%2522query%2522:%2522suricataMessage:%255C%2522Domain%2520chain%2520identified%2520as%2520Phishing%255C%2522%2522,%2522dateRange%2522:30%7D\" target=\"_blank\" rel=\"noreferrer noopener\">phishing detection rules<\/a>.&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>37 <a href=\"https:\/\/intelligence.any.run\/analysis\/lookup#%7B%2522query%2522:%2522suricataMessage:%255C%2522INFO%2520%5BANY.RUN%5D%2520%255C%2522%2522,%2522dateRange%2522:30%7D\" target=\"_blank\" rel=\"noreferrer noopener\">informational rules<\/a> to provide additional context during analysis.&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>35 <a href=\"https:\/\/intelligence.any.run\/analysis\/lookup#%7B%2522query%2522:%2522suricataMessage:%255C%2522Generic%2520Phishing%2520domain%2520observed%255C%2522%2522,%2522dateRange%2522:30%7D\" target=\"_blank\" rel=\"noreferrer noopener\">rules<\/a> for identifying known phishing domains.&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>11 <a href=\"https:\/\/intelligence.any.run\/analysis\/lookup#%7B%2522query%2522:%2522suricataMessage:%255C%2522Domain%2520identified%2520as%2520Phishing%2520Evil%2520Redirector%255C%2522%2522,%2522dateRange%2522:30%7D\" target=\"_blank\" rel=\"noreferrer noopener\">rules<\/a> specifically designed to detect redirect sites leading to phishing pages.&nbsp;<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">About ANY.RUN&nbsp;&nbsp;<\/h2>\n\n\n\n<p>ANY.RUN helps more than 400,000 cybersecurity professionals worldwide. Our <a href=\"https:\/\/any.run\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release_notes_july24&amp;utm_term=010824&amp;utm_content=linktolanding\" target=\"_blank\" rel=\"noreferrer noopener\">interactive sandbox<\/a> simplifies malware analysis of threats that target both Windows and <a href=\"https:\/\/any.run\/cybersecurity-blog\/linux-malware-analysis-cases\/\" target=\"_blank\" rel=\"noreferrer noopener\">Linux<\/a> systems. Our threat intelligence products, <a href=\"https:\/\/any.run\/cybersecurity-blog\/introducing-any-run-threat-intelligence-lookup\/\" target=\"_blank\" rel=\"noreferrer noopener\">TI Lookup<\/a>, <a href=\"https:\/\/any.run\/cybersecurity-blog\/yara-search\/\" target=\"_blank\" rel=\"noreferrer noopener\">Yara Search<\/a> and <a href=\"https:\/\/any.run\/cybersecurity-blog\/ti-feeds-integration\/\" target=\"_blank\" rel=\"noreferrer noopener\">Feeds<\/a>, help you find <a href=\"https:\/\/any.run\/cybersecurity-blog\/indicators-of-compromise\/\" target=\"_blank\" rel=\"noreferrer noopener\">IOCs<\/a> or files to learn more about the threats and respond to incidents faster.\u00a0\u00a0<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>With ANY.RUN you can:<\/strong>&nbsp;<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Detect malware in seconds.&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Interact with samples in real time.&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Save time and money on sandbox setup and maintenance&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Record and study all aspects of malware behavior.&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Collaborate with your team&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Scale as you need.&nbsp;<\/li>\n<\/ul>\n\n\n\n<p><a href=\"https:\/\/any.run\/demo\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release_notes_july24&amp;utm_term=010824&amp;utm_content=linktodemo\" target=\"_blank\" rel=\"noreferrer noopener\">Try the full power of ANY.RUN with a free trial&nbsp;\u2192<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Welcome to ANY.RUN&#8216;s monthly updates, where we share our team&#8217;s achievements over the past month. &nbsp; In July, we introduced new features in Threat Intelligence Lookup, added Windows 10 for free users, reduced task startup time, implemented numerous YARA rules and signatures, and expanded our Suricata ruleset. &nbsp; Let\u2019s break down what\u2019s new in ANY.RUN [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":7723,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[9],"tags":[10,34,40,56],"class_list":["post-8509","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-service-updates","tag-cybersecurity","tag-malware-analysis","tag-malware-behavior","tag-update"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v20.10 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Release Notes: Suricata Search, free Win 10 VM, YARA, and More<\/title>\n<meta name=\"description\" content=\"See ANY.RUN&#039;s updates in July 2024, including Suricata search in Threat Intelligence Lookup, Windows 10 for free users, YARA rules, and more.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/any.run\/cybersecurity-blog\/release-notes-july-2024\/\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"ANY.RUN\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\n\t    \"@context\": \"https:\/\/schema.org\",\n\t    \"@graph\": [\n\t        {\n\t            \"@type\": \"Article\",\n\t            \"@id\": \"https:\/\/any.run\/cybersecurity-blog\/release-notes-july-2024\/#article\",\n\t            \"isPartOf\": {\n\t                \"@id\": \"https:\/\/any.run\/cybersecurity-blog\/release-notes-july-2024\/\"\n\t            },\n\t            \"author\": {\n\t                \"name\": \"ANY.RUN\",\n\t                \"@id\": \"https:\/\/any.run\/\"\n\t            },\n\t            \"headline\": \"Release Notes: New IOCs in TI Lookup, Network Threats Tab, Free Windows 10 VM, and More\",\n\t            \"datePublished\": \"2024-08-01T08:56:20+00:00\",\n\t            \"dateModified\": \"2024-08-20T09:36:51+00:00\",\n\t            \"mainEntityOfPage\": {\n\t                \"@id\": \"https:\/\/any.run\/cybersecurity-blog\/release-notes-july-2024\/\"\n\t            },\n\t            \"wordCount\": 647,\n\t            \"commentCount\": 0,\n\t            \"publisher\": {\n\t                \"@id\": \"https:\/\/any.run\/\"\n\t            },\n\t            \"keywords\": [\n\t                \"cybersecurity\",\n\t                \"malware analysis\",\n\t                \"malware behavior\",\n\t                \"update\"\n\t            ],\n\t            \"articleSection\": [\n\t                \"Service Updates\"\n\t            ],\n\t            \"inLanguage\": \"en-US\",\n\t            \"potentialAction\": [\n\t                {\n\t                    \"@type\": \"CommentAction\",\n\t                    \"name\": \"Comment\",\n\t                    \"target\": [\n\t                        \"https:\/\/any.run\/cybersecurity-blog\/release-notes-july-2024\/#respond\"\n\t                    ]\n\t                }\n\t            ]\n\t        },\n\t        {\n\t            \"@type\": \"WebPage\",\n\t            \"@id\": \"https:\/\/any.run\/cybersecurity-blog\/release-notes-july-2024\/\",\n\t            \"url\": \"https:\/\/any.run\/cybersecurity-blog\/release-notes-july-2024\/\",\n\t            \"name\": \"Release Notes: Suricata Search, free Win 10 VM, YARA, and More\",\n\t            \"isPartOf\": {\n\t                \"@id\": \"https:\/\/any.run\/\"\n\t            },\n\t            \"datePublished\": \"2024-08-01T08:56:20+00:00\",\n\t            \"dateModified\": \"2024-08-20T09:36:51+00:00\",\n\t            \"description\": \"See ANY.RUN's updates in July 2024, including Suricata search in Threat Intelligence Lookup, Windows 10 for free users, YARA rules, and more.\",\n\t            \"breadcrumb\": {\n\t                \"@id\": \"https:\/\/any.run\/cybersecurity-blog\/release-notes-july-2024\/#breadcrumb\"\n\t            },\n\t            \"inLanguage\": \"en-US\",\n\t            \"potentialAction\": [\n\t                {\n\t                    \"@type\": \"ReadAction\",\n\t                    \"target\": [\n\t                        \"https:\/\/any.run\/cybersecurity-blog\/release-notes-july-2024\/\"\n\t                    ]\n\t                }\n\t            ]\n\t        },\n\t        {\n\t            \"@type\": \"BreadcrumbList\",\n\t            \"@id\": \"https:\/\/any.run\/cybersecurity-blog\/release-notes-july-2024\/#breadcrumb\",\n\t            \"itemListElement\": [\n\t                {\n\t                    \"@type\": \"ListItem\",\n\t                    \"position\": 1,\n\t                    \"name\": \"Home\",\n\t                    \"item\": \"https:\/\/any.run\/cybersecurity-blog\/\"\n\t                },\n\t                {\n\t                    \"@type\": \"ListItem\",\n\t                    \"position\": 2,\n\t                    \"name\": \"Service Updates\",\n\t                    \"item\": \"https:\/\/any.run\/cybersecurity-blog\/category\/service-updates\/\"\n\t                },\n\t                {\n\t                    \"@type\": \"ListItem\",\n\t                    \"position\": 3,\n\t                    \"name\": \"Release Notes: New IOCs in TI Lookup, Network Threats Tab, Free Windows 10 VM, and More\"\n\t                }\n\t            ]\n\t        },\n\t        {\n\t            \"@type\": \"WebSite\",\n\t            \"@id\": \"https:\/\/any.run\/\",\n\t            \"url\": \"https:\/\/any.run\/\",\n\t            \"name\": \"ANY.RUN&#039;s Cybersecurity Blog\",\n\t            \"description\": \"Cybersecurity Blog covers topics for experienced professionals as well as for those new to it.\",\n\t            \"publisher\": {\n\t                \"@id\": \"https:\/\/any.run\/\"\n\t            },\n\t            \"potentialAction\": [\n\t                {\n\t                    \"@type\": \"SearchAction\",\n\t                    \"target\": {\n\t                        \"@type\": \"EntryPoint\",\n\t                        \"urlTemplate\": \"https:\/\/any.run\/?s={search_term_string}\"\n\t                    },\n\t                    \"query-input\": \"required name=search_term_string\"\n\t                }\n\t            ],\n\t            \"inLanguage\": \"en-US\"\n\t        },\n\t        {\n\t            \"@type\": \"Organization\",\n\t            \"@id\": \"https:\/\/any.run\/\",\n\t            \"name\": \"ANY.RUN\",\n\t            \"url\": \"https:\/\/any.run\/\",\n\t            \"logo\": {\n\t                \"@type\": \"ImageObject\",\n\t                \"inLanguage\": \"en-US\",\n\t                \"@id\": \"https:\/\/any.run\/\",\n\t                \"url\": \"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg\",\n\t                \"contentUrl\": \"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg\",\n\t                \"width\": 1,\n\t                \"height\": 1,\n\t                \"caption\": \"ANY.RUN\"\n\t            },\n\t            \"image\": {\n\t                \"@id\": \"https:\/\/any.run\/\"\n\t            },\n\t            \"sameAs\": [\n\t                \"https:\/\/www.facebook.com\/www.any.run\/\",\n\t                \"https:\/\/twitter.com\/anyrun_app\",\n\t                \"https:\/\/www.linkedin.com\/company\/30692044\",\n\t                \"https:\/\/www.youtube.com\/channel\/UCOgCPho7lzmH7m6fPNlukrQ\"\n\t            ]\n\t        },\n\t        {\n\t            \"@type\": \"Person\",\n\t            \"@id\": \"https:\/\/any.run\/\",\n\t            \"name\": \"ANY.RUN\",\n\t            \"image\": {\n\t                \"@type\": \"ImageObject\",\n\t                \"inLanguage\": \"en-US\",\n\t                \"@id\": \"https:\/\/any.run\/\",\n\t                \"url\": \"https:\/\/secure.gravatar.com\/avatar\/c4ce3a6c672056b4a8cd6b0110782215?s=96&d=mm&r=g\",\n\t                \"contentUrl\": \"https:\/\/secure.gravatar.com\/avatar\/c4ce3a6c672056b4a8cd6b0110782215?s=96&d=mm&r=g\",\n\t                \"caption\": \"ANY.RUN\"\n\t            },\n\t            \"url\": \"https:\/\/any.run\/cybersecurity-blog\/author\/a-bespalova\/\"\n\t        }\n\t    ]\n\t}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Release Notes: Suricata Search, free Win 10 VM, YARA, and More","description":"See ANY.RUN's updates in July 2024, including Suricata search in Threat Intelligence Lookup, Windows 10 for free users, YARA rules, and more.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/any.run\/cybersecurity-blog\/release-notes-july-2024\/","twitter_misc":{"Written by":"ANY.RUN","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/any.run\/cybersecurity-blog\/release-notes-july-2024\/#article","isPartOf":{"@id":"https:\/\/any.run\/cybersecurity-blog\/release-notes-july-2024\/"},"author":{"name":"ANY.RUN","@id":"https:\/\/any.run\/"},"headline":"Release Notes: New IOCs in TI Lookup, Network Threats Tab, Free Windows 10 VM, and More","datePublished":"2024-08-01T08:56:20+00:00","dateModified":"2024-08-20T09:36:51+00:00","mainEntityOfPage":{"@id":"https:\/\/any.run\/cybersecurity-blog\/release-notes-july-2024\/"},"wordCount":647,"commentCount":0,"publisher":{"@id":"https:\/\/any.run\/"},"keywords":["cybersecurity","malware analysis","malware behavior","update"],"articleSection":["Service Updates"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/any.run\/cybersecurity-blog\/release-notes-july-2024\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/any.run\/cybersecurity-blog\/release-notes-july-2024\/","url":"https:\/\/any.run\/cybersecurity-blog\/release-notes-july-2024\/","name":"Release Notes: Suricata Search, free Win 10 VM, YARA, and More","isPartOf":{"@id":"https:\/\/any.run\/"},"datePublished":"2024-08-01T08:56:20+00:00","dateModified":"2024-08-20T09:36:51+00:00","description":"See ANY.RUN's updates in July 2024, including Suricata search in Threat Intelligence Lookup, Windows 10 for free users, YARA rules, and more.","breadcrumb":{"@id":"https:\/\/any.run\/cybersecurity-blog\/release-notes-july-2024\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/any.run\/cybersecurity-blog\/release-notes-july-2024\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/any.run\/cybersecurity-blog\/release-notes-july-2024\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/any.run\/cybersecurity-blog\/"},{"@type":"ListItem","position":2,"name":"Service Updates","item":"https:\/\/any.run\/cybersecurity-blog\/category\/service-updates\/"},{"@type":"ListItem","position":3,"name":"Release Notes: New IOCs in TI Lookup, Network Threats Tab, Free Windows 10 VM, and More"}]},{"@type":"WebSite","@id":"https:\/\/any.run\/","url":"https:\/\/any.run\/","name":"ANY.RUN&#039;s Cybersecurity Blog","description":"Cybersecurity Blog covers topics for experienced professionals as well as for those new to it.","publisher":{"@id":"https:\/\/any.run\/"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/any.run\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/any.run\/","name":"ANY.RUN","url":"https:\/\/any.run\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/any.run\/","url":"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg","contentUrl":"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg","width":1,"height":1,"caption":"ANY.RUN"},"image":{"@id":"https:\/\/any.run\/"},"sameAs":["https:\/\/www.facebook.com\/www.any.run\/","https:\/\/twitter.com\/anyrun_app","https:\/\/www.linkedin.com\/company\/30692044","https:\/\/www.youtube.com\/channel\/UCOgCPho7lzmH7m6fPNlukrQ"]},{"@type":"Person","@id":"https:\/\/any.run\/","name":"ANY.RUN","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/any.run\/","url":"https:\/\/secure.gravatar.com\/avatar\/c4ce3a6c672056b4a8cd6b0110782215?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/c4ce3a6c672056b4a8cd6b0110782215?s=96&d=mm&r=g","caption":"ANY.RUN"},"url":"https:\/\/any.run\/cybersecurity-blog\/author\/a-bespalova\/"}]}},"_links":{"self":[{"href":"\/cybersecurity-blog\/wp-json\/wp\/v2\/posts\/8509"}],"collection":[{"href":"\/cybersecurity-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"\/cybersecurity-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"\/cybersecurity-blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"\/cybersecurity-blog\/wp-json\/wp\/v2\/comments?post=8509"}],"version-history":[{"count":15,"href":"\/cybersecurity-blog\/wp-json\/wp\/v2\/posts\/8509\/revisions"}],"predecessor-version":[{"id":8635,"href":"\/cybersecurity-blog\/wp-json\/wp\/v2\/posts\/8509\/revisions\/8635"}],"wp:featuredmedia":[{"embeddable":true,"href":"\/cybersecurity-blog\/wp-json\/wp\/v2\/media\/7723"}],"wp:attachment":[{"href":"\/cybersecurity-blog\/wp-json\/wp\/v2\/media?parent=8509"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"\/cybersecurity-blog\/wp-json\/wp\/v2\/categories?post=8509"},{"taxonomy":"post_tag","embeddable":true,"href":"\/cybersecurity-blog\/wp-json\/wp\/v2\/tags?post=8509"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}