{"id":8889,"date":"2024-09-24T10:05:12","date_gmt":"2024-09-24T10:05:12","guid":{"rendered":"\/cybersecurity-blog\/?p=8889"},"modified":"2025-01-31T07:22:11","modified_gmt":"2025-01-31T07:22:11","slug":"safebrowsing","status":"publish","type":"post","link":"\/cybersecurity-blog\/safebrowsing\/","title":{"rendered":"Introducing Safebrowsing: Explore Suspicious Links in a Safe Virtual Browser"},"content":{"rendered":"\n<p>Current security measures against phishing links focus on automated checks and timely blocking before they reach users. Yet, some links still make it to their targets, leaving them vulnerable as they often have no simple, fast, and reliable tool at hand to check these links at the final stage.&nbsp;<\/p>\n\n\n\n<p>To address this security gap, we created <strong>Safebrowsing<\/strong>, which makes it easy to safely and easily open any link and manually verify its content.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">What is Safebrowsing?&nbsp;<\/h2>\n\n\n\n<p>Safebrowsing offers a fully-interactive browser in the cloud that lets you open and navigate any website as you normally would in a completely isolated and secure environment. This ensures that any malicious activity encountered during browsing is contained and does not affect your local systems or network.&nbsp;<\/p>\n\n\n\n<p>With Safebrowsing, you can launch a quick and secure virtual browser session to manually explore potentially harmful URLs. The service identifies malicious content in real time using <a href=\"https:\/\/any.run\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=safebrowsing&amp;utm_term=240924&amp;utm_content=linktolanding\" target=\"_blank\" rel=\"noreferrer noopener\">ANY.RUN<\/a>&#8216;s proprietary technology and notifies you about it. \u00a0<\/p>\n\n\n\n<p>After each session, you receive a list of indicators of compromise (IOCs) along with a detailed threat report.&nbsp;<\/p>\n\n\n\n<p>Safebrowsing gives you the ability to follow the entire chain of attack in a safebrowser when\u00a0facing phishing threats and get an in-depth network traffic analysis, including:\u00a0<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Connections&nbsp;&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>DNS and HTTP requests&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Network threats identified by Suricata IDS&nbsp;<\/li>\n<\/ul>\n\n\n\n<!-- Regular Banner START -->\n<div class=\"regular-banner\">\n<!-- Text Content -->\n<p class=\"regular-banner__text\">\nFree beta of <span class=\"highlight\">Safebrowsing<\/span> is available to all ANY.RUN users&nbsp;   \n<\/p>\n<!-- CTA Link -->\n<a class=\"regular-banner__link\" id=\"article-banner-regular\" href=\"https:\/\/app.any.run\/?utm_source=anyrunblog&#038;utm_medium=article&#038;utm_campaign=safebrowsing&#038;utm_term=240924&#038;utm_content=linktoregistration#register\/\" rel=\"noopener\" target=\"_blank\">\nTry it now\n<\/a>\n<\/div>\n<!-- Regular Banner END -->\n<!-- Regular Banner Styles START -->\n\n<style>\n.regular-banner {\ndisplay: flex;\ntext-align: center;\nflex-direction: column;\nalign-items: center;\ngap: 1.5rem;\nwidth: 100%;\npadding: 2rem;\nmargin: 1.5rem 0;\nborder-radius: 0.5rem;\nfont-family: 'Catamaran Bold';\nmargin-inline: auto;\nbackground: rgba(32, 168, 241, 0.1);\nborder: 1px solid rgba(75, 174, 227, 0.32);\n}\n\n.regular-banner__text {\nfont-size: 1.5rem;\nmargin: 0;\n}\n\n.highlight {\ncolor: #ea2526;\n}\n\n.regular-banner__link {\npadding: 0.5rem 1.5rem;\nfont-weight: 500;\ntext-decoration: none;\nborder-radius: 0.5rem;\ncolor: #FFFFFF;\nbackground-color: #1491D4;\ntext-align: center;\ntransition: all 0.2s ease-in;\n}\n\n.regular-banner__link:hover {\nbackground-color: #68CBFF;\ncolor: white;\n}\n<\/style>\n<!-- Regular Banner Styles END -->\n\n\n\n<h2 class=\"wp-block-heading\">How it works&nbsp;<\/h2>\n\n\n\n<p>Safebrowsing is built to be simple and effective, letting you quickly run analysis in three steps:&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Step 1<\/strong>: Submit URL<\/h3>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"576\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2024\/09\/malUrlforsb-1024x576.png\" alt=\"\" class=\"wp-image-8891\" srcset=\"\/cybersecurity-blog\/wp-content\/uploads\/2024\/09\/malUrlforsb-1024x576.png 1024w, \/cybersecurity-blog\/wp-content\/uploads\/2024\/09\/malUrlforsb-300x169.png 300w, \/cybersecurity-blog\/wp-content\/uploads\/2024\/09\/malUrlforsb-768x432.png 768w, \/cybersecurity-blog\/wp-content\/uploads\/2024\/09\/malUrlforsb-1536x864.png 1536w, \/cybersecurity-blog\/wp-content\/uploads\/2024\/09\/malUrlforsb-370x208.png 370w, \/cybersecurity-blog\/wp-content\/uploads\/2024\/09\/malUrlforsb-270x152.png 270w, \/cybersecurity-blog\/wp-content\/uploads\/2024\/09\/malUrlforsb-740x416.png 740w, \/cybersecurity-blog\/wp-content\/uploads\/2024\/09\/malUrlforsb.png 1920w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\"><em>You can quickly submit any URL to open it in a safe virtual browser<\/em><\/figcaption><\/figure><\/div>\n\n\n<p>You enter the URL of the website you want to analyze and hit \u201cBrowse\u201d.&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Step 2: <\/strong>Interact and Examine Threats<\/h3>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"576\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2024\/09\/interface_sb-1024x576.png\" alt=\"\" class=\"wp-image-8892\" srcset=\"\/cybersecurity-blog\/wp-content\/uploads\/2024\/09\/interface_sb-1024x576.png 1024w, \/cybersecurity-blog\/wp-content\/uploads\/2024\/09\/interface_sb-300x169.png 300w, \/cybersecurity-blog\/wp-content\/uploads\/2024\/09\/interface_sb-768x432.png 768w, \/cybersecurity-blog\/wp-content\/uploads\/2024\/09\/interface_sb-1536x864.png 1536w, \/cybersecurity-blog\/wp-content\/uploads\/2024\/09\/interface_sb-370x208.png 370w, \/cybersecurity-blog\/wp-content\/uploads\/2024\/09\/interface_sb-270x152.png 270w, \/cybersecurity-blog\/wp-content\/uploads\/2024\/09\/interface_sb-740x416.png 740w, \/cybersecurity-blog\/wp-content\/uploads\/2024\/09\/interface_sb.png 1920w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\">You are free to interact with websites just like in a standard browser<\/figcaption><\/figure><\/div>\n\n\n<p>You interact with the website, clicking links, opening tabs, solving CAPTCHAs, and seeing what happens after each step with your own eyes. <\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"576\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2024\/09\/pigsh_rule-1024x576.png\" alt=\"\" class=\"wp-image-8893\" srcset=\"\/cybersecurity-blog\/wp-content\/uploads\/2024\/09\/pigsh_rule-1024x576.png 1024w, \/cybersecurity-blog\/wp-content\/uploads\/2024\/09\/pigsh_rule-300x169.png 300w, \/cybersecurity-blog\/wp-content\/uploads\/2024\/09\/pigsh_rule-768x432.png 768w, \/cybersecurity-blog\/wp-content\/uploads\/2024\/09\/pigsh_rule-1536x864.png 1536w, \/cybersecurity-blog\/wp-content\/uploads\/2024\/09\/pigsh_rule-370x208.png 370w, \/cybersecurity-blog\/wp-content\/uploads\/2024\/09\/pigsh_rule-270x152.png 270w, \/cybersecurity-blog\/wp-content\/uploads\/2024\/09\/pigsh_rule-740x416.png 740w, \/cybersecurity-blog\/wp-content\/uploads\/2024\/09\/pigsh_rule.png 1920w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\"><em>The service lets you observe network traffic and learn about detected threats<\/em><\/figcaption><\/figure><\/div>\n\n\n<p>While you explore, the service monitors the websites for any malicious content and lets you know about the danger.&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Step 3:<\/strong> Collect IOCs<\/h3>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"576\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2024\/09\/network_andiocs-1024x576.png\" alt=\"\" class=\"wp-image-8894\" srcset=\"\/cybersecurity-blog\/wp-content\/uploads\/2024\/09\/network_andiocs-1024x576.png 1024w, \/cybersecurity-blog\/wp-content\/uploads\/2024\/09\/network_andiocs-300x169.png 300w, \/cybersecurity-blog\/wp-content\/uploads\/2024\/09\/network_andiocs-768x432.png 768w, \/cybersecurity-blog\/wp-content\/uploads\/2024\/09\/network_andiocs-1536x864.png 1536w, \/cybersecurity-blog\/wp-content\/uploads\/2024\/09\/network_andiocs-370x208.png 370w, \/cybersecurity-blog\/wp-content\/uploads\/2024\/09\/network_andiocs-270x152.png 270w, \/cybersecurity-blog\/wp-content\/uploads\/2024\/09\/network_andiocs-740x416.png 740w, \/cybersecurity-blog\/wp-content\/uploads\/2024\/09\/network_andiocs.png 1920w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\">Safebrowsing provides a list of identified IOCs<\/figcaption><\/figure><\/div>\n\n\n<p>Once you finish, the service generates a report outlining detected threats and suspicious activities, as well as lets you export packet data in PCAP.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Safebrowsing demonstration&nbsp;<\/h2>\n\n\n\n<figure class=\"wp-block-video\"><video controls src=\"\/cybersecurity-blog\/wp-content\/uploads\/2024\/09\/safebrowsing.mp4\"><\/video><figcaption class=\"wp-element-caption\"><em>The service quickly identifies malicious content and provides access to triggered Suricata detection rules<\/em><\/figcaption><\/figure>\n\n\n\n<p>Check out the video above in which we investigate a phishing link using Safebrowsing.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">How is Safebrowsing different from the ANY.RUN sandbox?&nbsp;<\/h2>\n\n\n\n<p>Unlike our <a href=\"https:\/\/any.run\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=safebrowsing&amp;utm_term=240924&amp;utm_content=linktolanding\" target=\"_blank\" rel=\"noreferrer noopener\">advanced malware sandbox<\/a>, Safebrowsing focuses exclusively on URL analysis.&nbsp;&nbsp;<\/p>\n\n\n\n<p>It provides a less complex interface that eliminates the need for in-depth system monitoring and file system access, which makes it easy-to-use for non-experts. Yet, ANY.RUN\u2019s signature interactivity is still there.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">How is Safebrowsing different from a URL scanner?&nbsp;<\/h2>\n\n\n\n<p>Compared to URL scanners that simply check any given URL against a database of known malicious URLs, Safebrowsing provides a fully interactive environment for exploring websites.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">What are possible use cases for Safebrowsing?&nbsp;<\/h2>\n\n\n\n<p>Safebrowsing is a universal tool that can be of great help in different scenarios.&nbsp;&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Open URLs within a secure, isolated, and full-size virtual browser to prevent any potential threats from affecting your local system.&nbsp;<\/li>\n\n\n\n<li>Speed up the process of analyzing and responding to suspicious links.&nbsp;&nbsp;&nbsp;<\/li>\n\n\n\n<li>Make link checks safe, simple, and quick for non-security employees.&nbsp;<\/li>\n\n\n\n<li>Prevent infections and increase the general level of security in the organization.&nbsp;<\/li>\n\n\n\n<li>Demonstrate the risks of clicking on suspicious links as part of training on safe browsing practices.&nbsp;<\/li>\n\n\n\n<li>Observe network traffic for malicious activity to detect threats in real time.&nbsp;<\/li>\n\n\n\n<li>Improve detection of phishing threats thanks to ANY.RUN\u2019s advanced capabilities.&nbsp;<\/li>\n\n\n\n<li>Download traffic data and the identified indicators of compromise.&nbsp;<\/li>\n\n\n\n<li>Share the completed session as evidence of malicious content.&nbsp;<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">How Safebrowsing can help your business&nbsp;<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Phishing Protection&nbsp;<\/strong>&nbsp;<\/h3>\n\n\n\n<p>By allowing your team to safely explore suspicious URLs, Safebrowsing helps in identifying phishing attempts before they can impact your organization. The proactive approach significantly reduces the risk of data breaches and financial losses.&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Staff Training&nbsp;<\/strong>&nbsp;<\/h3>\n\n\n\n<p>Safebrowsing can be used as a training tool to educate employees about the dangers of phishing and other web-based threats. By demonstrating real-world examples in a safe environment, you can enhance your team\u2019s awareness and preparedness.&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Empowering Non-Expert Employees&nbsp;<\/strong>&nbsp;<\/h3>\n\n\n\n<p>Safebrowsing equips non-expert employees with a fast and safe way to check suspicious links without needing to involve the security team. This saves time and resources, allowing your security professionals to focus on more critical tasks&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Try Safebrowsing beta now&nbsp;<\/h2>\n\n\n\n<p>Real-time threat detection, fast performance, and easy-to-use interface make Safebrowsing a perfect tool for any individual and organization that wants to avoid falling victim to phishing attacks.&nbsp;&nbsp;<\/p>\n\n\n\n<p>The FREE beta version is available to all ANY.RUN users.&nbsp;<\/p>\n\n\n\n<p><a href=\"https:\/\/app.any.run\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=safebrowsing&amp;utm_term=240924&amp;utm_content=linktoregistration#register\/\" target=\"_blank\" rel=\"noreferrer noopener\">Analyze your first URL right away<\/a>.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">About ANY.RUN&nbsp;&nbsp;<\/h2>\n\n\n\n<p>ANY.RUN helps more than 400,000 cybersecurity professionals worldwide. Our <a href=\"https:\/\/any.run\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=safebrowsing&amp;utm_term=240924&amp;utm_content=linktolanding\" target=\"_blank\" rel=\"noreferrer noopener\">interactive sandbox<\/a> simplifies malware analysis of threats that target both Windows and <a href=\"https:\/\/any.run\/cybersecurity-blog\/linux-malware-analysis-cases\/\" target=\"_blank\" rel=\"noreferrer noopener\">Linux<\/a> systems. Our threat intelligence products, <a href=\"https:\/\/any.run\/cybersecurity-blog\/introducing-any-run-threat-intelligence-lookup\/\" target=\"_blank\" rel=\"noreferrer noopener\">TI Lookup<\/a>, <a href=\"https:\/\/any.run\/cybersecurity-blog\/yara-search\/\" target=\"_blank\" rel=\"noreferrer noopener\">Yara Search<\/a> and <a href=\"https:\/\/any.run\/cybersecurity-blog\/ti-feeds-integration\/\" target=\"_blank\" rel=\"noreferrer noopener\">Feeds<\/a>, help you find <a href=\"https:\/\/any.run\/cybersecurity-blog\/indicators-of-compromise\/\" target=\"_blank\" rel=\"noreferrer noopener\">IOCs<\/a> or files to learn more about the threats and respond to incidents faster.&nbsp;&nbsp;<\/p>\n\n\n\n<p><strong>With ANY.RUN you can:<\/strong>&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Detect malware in seconds<\/li>\n\n\n\n<li>Interact with samples in real time<\/li>\n\n\n\n<li>Save time and money on sandbox setup and maintenance<\/li>\n\n\n\n<li>Record and study all aspects of malware behavior<\/li>\n\n\n\n<li>Collaborate with your team&nbsp;<\/li>\n\n\n\n<li>Scale as you need<\/li>\n<\/ul>\n\n\n\n<p><a href=\"https:\/\/any.run\/demo\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=safebrowsing&amp;utm_term=240924&amp;utm_content=linktodemo\" target=\"_blank\" rel=\"noreferrer noopener\">Request free trial \u2192<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Current security measures against phishing links focus on automated checks and timely blocking before they reach users. Yet, some links still make it to their targets, leaving them vulnerable as they often have no simple, fast, and reliable tool at hand to check these links at the final stage.&nbsp; To address this security gap, we [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":8896,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[9],"tags":[57,10,15,40],"class_list":["post-8889","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-service-updates","tag-anyrun","tag-cybersecurity","tag-malware","tag-malware-behavior"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v20.10 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Safebrowsing: Explore Suspicious Links in a Safe Virtual Browser<\/title>\n<meta name=\"description\" content=\"Learn about Safebrowsing from ANY.RUN, an interactive browser in the cloud that lets you safely check malicious URLs and phishing.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/any.run\/cybersecurity-blog\/safebrowsing\/\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"ANY.RUN\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\n\t    \"@context\": \"https:\/\/schema.org\",\n\t    \"@graph\": [\n\t        {\n\t            \"@type\": \"Article\",\n\t            \"@id\": \"https:\/\/any.run\/cybersecurity-blog\/safebrowsing\/#article\",\n\t            \"isPartOf\": {\n\t                \"@id\": \"https:\/\/any.run\/cybersecurity-blog\/safebrowsing\/\"\n\t            },\n\t            \"author\": {\n\t                \"name\": \"ANY.RUN\",\n\t                \"@id\": \"https:\/\/any.run\/\"\n\t            },\n\t            \"headline\": \"Introducing Safebrowsing: Explore Suspicious Links in a Safe Virtual Browser\",\n\t            \"datePublished\": \"2024-09-24T10:05:12+00:00\",\n\t            \"dateModified\": \"2025-01-31T07:22:11+00:00\",\n\t            \"mainEntityOfPage\": {\n\t                \"@id\": \"https:\/\/any.run\/cybersecurity-blog\/safebrowsing\/\"\n\t            },\n\t            \"wordCount\": 965,\n\t            \"commentCount\": 0,\n\t            \"publisher\": {\n\t                \"@id\": \"https:\/\/any.run\/\"\n\t            },\n\t            \"keywords\": [\n\t                \"ANYRUN\",\n\t                \"cybersecurity\",\n\t                \"malware\",\n\t                \"malware behavior\"\n\t            ],\n\t            \"articleSection\": [\n\t                \"Service Updates\"\n\t            ],\n\t            \"inLanguage\": \"en-US\",\n\t            \"potentialAction\": [\n\t                {\n\t                    \"@type\": \"CommentAction\",\n\t                    \"name\": \"Comment\",\n\t                    \"target\": [\n\t                        \"https:\/\/any.run\/cybersecurity-blog\/safebrowsing\/#respond\"\n\t                    ]\n\t                }\n\t            ]\n\t        },\n\t        {\n\t            \"@type\": \"WebPage\",\n\t            \"@id\": \"https:\/\/any.run\/cybersecurity-blog\/safebrowsing\/\",\n\t            \"url\": \"https:\/\/any.run\/cybersecurity-blog\/safebrowsing\/\",\n\t            \"name\": \"Safebrowsing: Explore Suspicious Links in a Safe Virtual Browser\",\n\t            \"isPartOf\": {\n\t                \"@id\": \"https:\/\/any.run\/\"\n\t            },\n\t            \"datePublished\": \"2024-09-24T10:05:12+00:00\",\n\t            \"dateModified\": \"2025-01-31T07:22:11+00:00\",\n\t            \"description\": \"Learn about Safebrowsing from ANY.RUN, an interactive browser in the cloud that lets you safely check malicious URLs and phishing.\",\n\t            \"breadcrumb\": {\n\t                \"@id\": \"https:\/\/any.run\/cybersecurity-blog\/safebrowsing\/#breadcrumb\"\n\t            },\n\t            \"inLanguage\": \"en-US\",\n\t            \"potentialAction\": [\n\t                {\n\t                    \"@type\": \"ReadAction\",\n\t                    \"target\": [\n\t                        \"https:\/\/any.run\/cybersecurity-blog\/safebrowsing\/\"\n\t                    ]\n\t                }\n\t            ]\n\t        },\n\t        {\n\t            \"@type\": \"BreadcrumbList\",\n\t            \"@id\": \"https:\/\/any.run\/cybersecurity-blog\/safebrowsing\/#breadcrumb\",\n\t            \"itemListElement\": [\n\t                {\n\t                    \"@type\": \"ListItem\",\n\t                    \"position\": 1,\n\t                    \"name\": \"Home\",\n\t                    \"item\": \"https:\/\/any.run\/cybersecurity-blog\/\"\n\t                },\n\t                {\n\t                    \"@type\": \"ListItem\",\n\t                    \"position\": 2,\n\t                    \"name\": \"Service Updates\",\n\t                    \"item\": \"https:\/\/any.run\/cybersecurity-blog\/category\/service-updates\/\"\n\t                },\n\t                {\n\t                    \"@type\": \"ListItem\",\n\t                    \"position\": 3,\n\t                    \"name\": \"Introducing Safebrowsing: Explore Suspicious Links in a Safe Virtual Browser\"\n\t                }\n\t            ]\n\t        },\n\t        {\n\t            \"@type\": \"WebSite\",\n\t            \"@id\": \"https:\/\/any.run\/\",\n\t            \"url\": \"https:\/\/any.run\/\",\n\t            \"name\": \"ANY.RUN&#039;s Cybersecurity Blog\",\n\t            \"description\": \"Cybersecurity Blog covers topics for experienced professionals as well as for those new to it.\",\n\t            \"publisher\": {\n\t                \"@id\": \"https:\/\/any.run\/\"\n\t            },\n\t            \"potentialAction\": [\n\t                {\n\t                    \"@type\": \"SearchAction\",\n\t                    \"target\": {\n\t                        \"@type\": \"EntryPoint\",\n\t                        \"urlTemplate\": \"https:\/\/any.run\/?s={search_term_string}\"\n\t                    },\n\t                    \"query-input\": \"required name=search_term_string\"\n\t                }\n\t            ],\n\t            \"inLanguage\": \"en-US\"\n\t        },\n\t        {\n\t            \"@type\": \"Organization\",\n\t            \"@id\": \"https:\/\/any.run\/\",\n\t            \"name\": \"ANY.RUN\",\n\t            \"url\": \"https:\/\/any.run\/\",\n\t            \"logo\": {\n\t                \"@type\": \"ImageObject\",\n\t                \"inLanguage\": \"en-US\",\n\t                \"@id\": \"https:\/\/any.run\/\",\n\t                \"url\": \"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg\",\n\t                \"contentUrl\": \"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg\",\n\t                \"width\": 1,\n\t                \"height\": 1,\n\t                \"caption\": \"ANY.RUN\"\n\t            },\n\t            \"image\": {\n\t                \"@id\": \"https:\/\/any.run\/\"\n\t            },\n\t            \"sameAs\": [\n\t                \"https:\/\/www.facebook.com\/www.any.run\/\",\n\t                \"https:\/\/twitter.com\/anyrun_app\",\n\t                \"https:\/\/www.linkedin.com\/company\/30692044\",\n\t                \"https:\/\/www.youtube.com\/channel\/UCOgCPho7lzmH7m6fPNlukrQ\"\n\t            ]\n\t        },\n\t        {\n\t            \"@type\": \"Person\",\n\t            \"@id\": \"https:\/\/any.run\/\",\n\t            \"name\": \"ANY.RUN\",\n\t            \"image\": {\n\t                \"@type\": \"ImageObject\",\n\t                \"inLanguage\": \"en-US\",\n\t                \"@id\": \"https:\/\/any.run\/\",\n\t                \"url\": \"https:\/\/secure.gravatar.com\/avatar\/c4ce3a6c672056b4a8cd6b0110782215?s=96&d=mm&r=g\",\n\t                \"contentUrl\": \"https:\/\/secure.gravatar.com\/avatar\/c4ce3a6c672056b4a8cd6b0110782215?s=96&d=mm&r=g\",\n\t                \"caption\": \"ANY.RUN\"\n\t            },\n\t            \"url\": \"https:\/\/any.run\/cybersecurity-blog\/author\/a-bespalova\/\"\n\t        }\n\t    ]\n\t}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Safebrowsing: Explore Suspicious Links in a Safe Virtual Browser","description":"Learn about Safebrowsing from ANY.RUN, an interactive browser in the cloud that lets you safely check malicious URLs and phishing.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/any.run\/cybersecurity-blog\/safebrowsing\/","twitter_misc":{"Written by":"ANY.RUN","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/any.run\/cybersecurity-blog\/safebrowsing\/#article","isPartOf":{"@id":"https:\/\/any.run\/cybersecurity-blog\/safebrowsing\/"},"author":{"name":"ANY.RUN","@id":"https:\/\/any.run\/"},"headline":"Introducing Safebrowsing: Explore Suspicious Links in a Safe Virtual Browser","datePublished":"2024-09-24T10:05:12+00:00","dateModified":"2025-01-31T07:22:11+00:00","mainEntityOfPage":{"@id":"https:\/\/any.run\/cybersecurity-blog\/safebrowsing\/"},"wordCount":965,"commentCount":0,"publisher":{"@id":"https:\/\/any.run\/"},"keywords":["ANYRUN","cybersecurity","malware","malware behavior"],"articleSection":["Service Updates"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/any.run\/cybersecurity-blog\/safebrowsing\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/any.run\/cybersecurity-blog\/safebrowsing\/","url":"https:\/\/any.run\/cybersecurity-blog\/safebrowsing\/","name":"Safebrowsing: Explore Suspicious Links in a Safe Virtual Browser","isPartOf":{"@id":"https:\/\/any.run\/"},"datePublished":"2024-09-24T10:05:12+00:00","dateModified":"2025-01-31T07:22:11+00:00","description":"Learn about Safebrowsing from ANY.RUN, an interactive browser in the cloud that lets you safely check malicious URLs and phishing.","breadcrumb":{"@id":"https:\/\/any.run\/cybersecurity-blog\/safebrowsing\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/any.run\/cybersecurity-blog\/safebrowsing\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/any.run\/cybersecurity-blog\/safebrowsing\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/any.run\/cybersecurity-blog\/"},{"@type":"ListItem","position":2,"name":"Service Updates","item":"https:\/\/any.run\/cybersecurity-blog\/category\/service-updates\/"},{"@type":"ListItem","position":3,"name":"Introducing Safebrowsing: Explore Suspicious Links in a Safe Virtual Browser"}]},{"@type":"WebSite","@id":"https:\/\/any.run\/","url":"https:\/\/any.run\/","name":"ANY.RUN&#039;s Cybersecurity Blog","description":"Cybersecurity Blog covers topics for experienced professionals as well as for those new to it.","publisher":{"@id":"https:\/\/any.run\/"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/any.run\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/any.run\/","name":"ANY.RUN","url":"https:\/\/any.run\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/any.run\/","url":"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg","contentUrl":"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg","width":1,"height":1,"caption":"ANY.RUN"},"image":{"@id":"https:\/\/any.run\/"},"sameAs":["https:\/\/www.facebook.com\/www.any.run\/","https:\/\/twitter.com\/anyrun_app","https:\/\/www.linkedin.com\/company\/30692044","https:\/\/www.youtube.com\/channel\/UCOgCPho7lzmH7m6fPNlukrQ"]},{"@type":"Person","@id":"https:\/\/any.run\/","name":"ANY.RUN","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/any.run\/","url":"https:\/\/secure.gravatar.com\/avatar\/c4ce3a6c672056b4a8cd6b0110782215?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/c4ce3a6c672056b4a8cd6b0110782215?s=96&d=mm&r=g","caption":"ANY.RUN"},"url":"https:\/\/any.run\/cybersecurity-blog\/author\/a-bespalova\/"}]}},"_links":{"self":[{"href":"\/cybersecurity-blog\/wp-json\/wp\/v2\/posts\/8889"}],"collection":[{"href":"\/cybersecurity-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"\/cybersecurity-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"\/cybersecurity-blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"\/cybersecurity-blog\/wp-json\/wp\/v2\/comments?post=8889"}],"version-history":[{"count":8,"href":"\/cybersecurity-blog\/wp-json\/wp\/v2\/posts\/8889\/revisions"}],"predecessor-version":[{"id":11401,"href":"\/cybersecurity-blog\/wp-json\/wp\/v2\/posts\/8889\/revisions\/11401"}],"wp:featuredmedia":[{"embeddable":true,"href":"\/cybersecurity-blog\/wp-json\/wp\/v2\/media\/8896"}],"wp:attachment":[{"href":"\/cybersecurity-blog\/wp-json\/wp\/v2\/media?parent=8889"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"\/cybersecurity-blog\/wp-json\/wp\/v2\/categories?post=8889"},{"taxonomy":"post_tag","embeddable":true,"href":"\/cybersecurity-blog\/wp-json\/wp\/v2\/tags?post=8889"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}