{"id":9083,"date":"2024-10-03T09:55:56","date_gmt":"2024-10-03T09:55:56","guid":{"rendered":"\/cybersecurity-blog\/?p=9083"},"modified":"2025-11-13T08:51:15","modified_gmt":"2025-11-13T08:51:15","slug":"release-notes-september-2024","status":"publish","type":"post","link":"https:\/\/any.run\/cybersecurity-blog\/release-notes-september-2024\/","title":{"rendered":"Release Notes: Safebrowsing, Private AI Assistant, Splunk Integration, and more"},"content":{"rendered":"\n<p>Welcome to <a href=\"https:\/\/any.run\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release_note_09_24&amp;utm_term=031024&amp;utm_content=linktolanding\" target=\"_blank\" rel=\"noreferrer noopener\">ANY.RUN<\/a>\u2018s monthly updates, where we share our team\u2019s achievements over the past month.&nbsp;<\/p>\n\n\n\n<p>September has been a productive month at ANY.RUN, packed with exciting new features and improvements. We\u2019ve launched <strong>Safebrowsing<\/strong>, a powerful tool that lets you safely check suspicious URLs in an isolated browser.&nbsp;<\/p>\n\n\n\n<p>In addition to that, we\u2019ve integrated with <strong>Splunk<\/strong>, enhanced our <strong>sandbox<\/strong> capabilities, and rolled out new <strong>signatures<\/strong> and <strong>YARA rules<\/strong> to help you strengthen your security.&nbsp;<\/p>\n\n\n\n<p>Let\u2019s break down what\u2019s new in ANY.RUN step by step.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Safebrowsing for Quick URL Checks&nbsp;<\/h2>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"576\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2024\/10\/image-1024x576.png\" alt=\"\" class=\"wp-image-9084\" style=\"width:650px;height:365px\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/10\/image-1024x576.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/10\/image-300x169.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/10\/image-768x432.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/10\/image-1536x864.png 1536w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/10\/image-370x208.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/10\/image-270x152.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/10\/image-740x416.png 740w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/10\/image.png 1920w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\"><em>Safebrowsing lets you quickly open any URL in an interactive virtual browser <\/em><\/figcaption><\/figure><\/div>\n\n\n<p>We\u2019ve released&nbsp;<a href=\"https:\/\/any.run\/cybersecurity-blog\/safebrowsing\/\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>Safebrowsing<\/strong><\/a>, a new tool that allows ANY.RUN users to safely analyze suspicious URLs within a fully interactive, isolated browser. It is a quick and secure way to explore websites and verify potentially malicious content without putting your local system at risk.&nbsp;<\/p>\n\n\n\n<p>You can interact with suspicious links in real time, detect threats using our proprietary technology, and receive detailed reports, including <a href=\"https:\/\/any.run\/cybersecurity-blog\/indicators-of-compromise\/\" target=\"_blank\" rel=\"noreferrer noopener\">Indicators of Compromise<\/a> (IOCs) and <a href=\"https:\/\/any.run\/cybersecurity-blog\/analyzing-the-network-stream\/\" target=\"_blank\" rel=\"noreferrer noopener\">network traffic analysis<\/a>. &nbsp;<\/p>\n\n\n\n<p>Now available in free beta for all ANY.RUN users, it adds a new layer of security to your daily operations.&nbsp;<\/p>\n\n\n\n<!-- Regular Banner START -->\n<div class=\"regular-banner\">\n<!-- Text Content -->\n<p class=\"regular-banner__text\">\nExplore suspicious URLs with <span class=\"highlight\">Safebrowsing<\/span> for free&nbsp;   \n<\/p>\n<!-- CTA Link -->\n<a class=\"regular-banner__link\" id=\"article-banner-regular\" href=\"https:\/\/app.any.run\/?utm_source=anyrunblog&#038;utm_medium=article&#038;utm_campaign=release_note_09_24&#038;utm_term=031024&#038;utm_content=linktoregistration#register\/\" rel=\"noopener\" target=\"_blank\">\nTry it now\n<\/a>\n<\/div>\n<!-- Regular Banner END -->\n<!-- Regular Banner Styles START -->\n\n<style>\n.regular-banner {\ndisplay: flex;\ntext-align: center;\nflex-direction: column;\nalign-items: center;\ngap: 1.5rem;\nwidth: 100%;\npadding: 2rem;\nmargin: 1.5rem 0;\nborder-radius: 0.5rem;\nfont-family: 'Catamaran Bold';\nmargin-inline: auto;\nbackground: rgba(32, 168, 241, 0.1);\nborder: 1px solid rgba(75, 174, 227, 0.32);\n}\n\n.regular-banner__text {\nfont-size: 1.5rem;\nmargin: 0;\n}\n\n.highlight {\ncolor: #ea2526;\n}\n\n.regular-banner__link {\npadding: 0.5rem 1.5rem;\nfont-weight: 500;\ntext-decoration: none;\nborder-radius: 0.5rem;\ncolor: #FFFFFF;\nbackground-color: #1491D4;\ntext-align: center;\ntransition: all 0.2s ease-in;\n}\n\n.regular-banner__link:hover {\nbackground-color: #68CBFF;\ncolor: white;\n}\n<\/style>\n<!-- Regular Banner Styles END -->\n\n\n\n<h2 class=\"wp-block-heading\">New Integration with Splunk&nbsp;<\/h2>\n\n\n\n<p>In September, ANY.RUN officially launched an <a href=\"https:\/\/any.run\/cybersecurity-blog\/splunk-integration\/\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>integration with Splunk<\/strong><\/a>. It brings access to our <a href=\"https:\/\/any.run\/cybersecurity-blog\/interactive-malware-sandbox\/\" target=\"_blank\" rel=\"noreferrer noopener\">Interactive Sandbox<\/a> and <a href=\"https:\/\/any.run\/cybersecurity-blog\/introducing-any-run-threat-intelligence-lookup\/\" target=\"_blank\" rel=\"noreferrer noopener\">Threat Intelligence Lookup<\/a> directly in the Splunk SOAR environment.&nbsp;<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"793\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2024\/10\/image2-1-1024x793.png\" alt=\"\" class=\"wp-image-9085\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/10\/image2-1-1024x793.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/10\/image2-1-300x232.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/10\/image2-1-768x595.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/10\/image2-1-370x286.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/10\/image2-1-270x209.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/10\/image2-1-740x573.png 740w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/10\/image2-1.png 1536w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\"><em>ANY.RUN integration with Splunk<\/em>&nbsp;<\/figcaption><\/figure><\/div>\n\n\n<p>With this integration, Splunk users can now analyze potentially malicious files and URLs in ANY.RUN\u2019s sandbox and enrich their investigations using TI Lookup with comprehensive threat intelligence from TI Lookup\u2014all without leaving Splunk. &nbsp;<\/p>\n\n\n\n<p><strong>Key features:<\/strong>&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Comprehensive threat intelligence:<\/strong>&nbsp;Query ANY.RUN\u2019s threat intelligence database directly from Splunk SOAR using the \u2018get intelligence\u2019 action.&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Automated malware analysis:<\/strong>&nbsp;Automatically detonate files and URLs in ANY.RUN\u2019s sandbox as part of a Splunk SOAR playbook.&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Detailed reporting &amp; IOC extraction:<\/strong>&nbsp;Quickly retrieve detailed reports and extract IOCs for further threat investigation and response.&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Advanced threat hunting:<\/strong>&nbsp;Perform complex queries against ANY.RUN\u2019s threat intelligence database to search for file hashes, IP addresses, domains, and more.&nbsp;<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">AI Assistant for Private Sandbox Sessions&nbsp;<\/h2>\n\n\n\n<p>We&#8217;ve improved the sandbox&#8217;s <a href=\"https:\/\/any.run\/cybersecurity-blog\/chatgpt-powered-analysis-method\/\" target=\"_blank\" rel=\"noreferrer noopener\">AI capabilities<\/a> by replacing the ChatGPT assistant with our own private AI model. Now you can access AI-powered explanations in both public and private analysis sessions, without worrying about your data going to any third party.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"632\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2024\/10\/image3-1-1024x632.png\" alt=\"\" class=\"wp-image-9086\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/10\/image3-1-1024x632.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/10\/image3-1-300x185.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/10\/image3-1-768x474.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/10\/image3-1-1536x948.png 1536w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/10\/image3-1-2048x1264.png 2048w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/10\/image3-1-370x228.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/10\/image3-1-270x167.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/10\/image3-1-740x457.png 740w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\"><em>AI assistance inside ANY.RUN\u2019s sandbox<\/em>&nbsp;<\/figcaption><\/figure><\/div>\n\n\n<p>This private AI model is especially useful for those new to the cybersecurity field. <\/p>\n\n\n\n<p>It breaks down complex data quickly, helping you better navigate your analysis and extract useful insights.<\/p>\n\n\n\n<!-- Regular Banner START -->\n<div class=\"regular-banner\">\n<!-- Text Content -->\n<p class=\"regular-banner__text\">\nIntegrate ANY.RUN&#8217;s <span class=\"highlight\">Sandbox and Threat Intelligence<\/span> solutions in your organization&nbsp;   \n<\/p>\n<!-- CTA Link -->\n<a class=\"regular-banner__link\" id=\"article-banner-regular\" href=\"https:\/\/any.run\/demo\/?utm_source=anyrunblog&#038;utm_medium=article&#038;utm_campaign=release_note_09_24&#038;utm_term=031024&#038;utm_content=linktodemo\/\" rel=\"noopener\" target=\"_blank\">\nRequest a demo\n<\/a>\n<\/div>\n<!-- Regular Banner END -->\n<!-- Regular Banner Styles START -->\n\n<style>\n.regular-banner {\ndisplay: flex;\ntext-align: center;\nflex-direction: column;\nalign-items: center;\ngap: 1.5rem;\nwidth: 100%;\npadding: 2rem;\nmargin: 1.5rem 0;\nborder-radius: 0.5rem;\nfont-family: 'Catamaran Bold';\nmargin-inline: auto;\nbackground: rgba(32, 168, 241, 0.1);\nborder: 1px solid rgba(75, 174, 227, 0.32);\n}\n\n.regular-banner__text {\nfont-size: 1.5rem;\nmargin: 0;\n}\n\n.highlight {\ncolor: #ea2526;\n}\n\n.regular-banner__link {\npadding: 0.5rem 1.5rem;\nfont-weight: 500;\ntext-decoration: none;\nborder-radius: 0.5rem;\ncolor: #FFFFFF;\nbackground-color: #1491D4;\ntext-align: center;\ntransition: all 0.2s ease-in;\n}\n\n.regular-banner__link:hover {\nbackground-color: #68CBFF;\ncolor: white;\n}\n<\/style>\n<!-- Regular Banner Styles END -->\n\n\n\n<h2 class=\"wp-block-heading\">Network Detections Update&nbsp;<\/h2>\n\n\n\n<p>In September, we added&nbsp;<strong>459 new Suricata rules<\/strong>, of which <strong>382 <\/strong>are dedicated to phishing detection. <\/p>\n\n\n\n<p>This significant increase comes from closely monitoring the activity of threat actor&nbsp;<a href=\"https:\/\/app.any.run\/submissions#tag:storm1575\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>Storm-1575<\/strong><\/a>, leading to the identification of two primary tools currently used by this group.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">New Signatures&nbsp;<\/h2>\n\n\n\n<p>In September, we added a total of 9 new signatures. Here are some highlights:&nbsp;&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/app.any.run\/tasks\/34de6248-c37a-485e-a3b7-1837da0f6d7a\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release_note_09_24&amp;utm_term=031024&amp;utm_content=linktoservice\" target=\"_blank\" rel=\"noreferrer noopener\">Stealc<\/a>&nbsp;signature for mutex detection&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/app.any.run\/tasks\/471a4661-7ed6-4944-aa0d-377fc5c6763e\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release_note_09_24&amp;utm_term=031024&amp;utm_content=linktoservice\" target=\"_blank\" rel=\"noreferrer noopener\">Razr<\/a>&nbsp;signature for .raz file extension&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/app.any.run\/tasks\/e4a80b32-eb7f-4baa-8ebe-87f2acc0d592\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release_note_09_24&amp;utm_term=031024&amp;utm_content=linktoservice\" target=\"_blank\" rel=\"noreferrer noopener\">SFX<\/a> Dropper&nbsp;signature &nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/app.any.run\/tasks\/d20a2632-b1c5-4b67-81ae-3fa1903a0481\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release_note_09_24&amp;utm_term=031024&amp;utm_content=linktoservice\" target=\"_blank\" rel=\"noreferrer noopener\">Alucard<\/a>&nbsp;ransomware &nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/app.any.run\/tasks\/77346ef4-4629-41f1-b21e-e6cd582625e1\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release_note_09_24&amp;utm_term=031024&amp;utm_content=linktoservice\" target=\"_blank\" rel=\"noreferrer noopener\">Tgbdownloader<\/a>&nbsp;adware &nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/app.any.run\/tasks\/2f54ac15-3023-45c4-89ac-d6d2e98a6922\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release_note_09_24&amp;utm_term=031024&amp;utm_content=linktoservice\" target=\"_blank\" rel=\"noreferrer noopener\">Xmrig<\/a>&nbsp;mutex and file drop detection&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/app.any.run\/tasks\/af22efd5-3543-4880-8f1c-7abd5e158c32\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release_note_09_24&amp;utm_term=031024&amp;utm_content=linktoservice\" target=\"_blank\" rel=\"noreferrer noopener\">Hawkeye<\/a>&nbsp;ransomware detection &nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Scheduled task creation via <a href=\"https:\/\/app.any.run\/tasks\/265df1d9-ab85-4378-8e73-246dedfec5e8\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release_note_09_24&amp;utm_term=031024&amp;utm_content=linktoservice\" target=\"_blank\" rel=\"noreferrer noopener\">Registry<\/a>&nbsp;&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/app.any.run\/tasks\/5fbf8ba2-c34a-4d3c-82a9-539c9bddcdc3\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release_note_09_24&amp;utm_term=031024&amp;utm_content=linktoservice\" target=\"_blank\" rel=\"noreferrer noopener\">EFI<\/a> boot file modification&nbsp;&nbsp;<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">YARA Rules Update&nbsp;<\/h2>\n\n\n\n<p>We\u2019ve added&nbsp;5 new YARA rules&nbsp;to detect various malware threats:&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/app.any.run\/tasks\/9f90b0dc-1fef-4db9-842e-08088e6034f7\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release_note_09_24&amp;utm_term=031024&amp;utm_content=linktoservice\" target=\"_blank\" rel=\"noreferrer noopener\">Megatools<\/a>&nbsp;downloader &nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/app.any.run\/tasks\/588c50a5-c0fe-491c-afc2-c0f0f486b912\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release_note_09_24&amp;utm_term=031024&amp;utm_content=linktoservice\" target=\"_blank\" rel=\"noreferrer noopener\">Goldeneye<\/a>&nbsp;ransomware &nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/app.any.run\/tasks\/7a4fd53f-5c88-4d34-96b5-a71083b29bbe\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release_note_09_24&amp;utm_term=031024&amp;utm_content=linktoservice\" target=\"_blank\" rel=\"noreferrer noopener\">Diablonet<\/a>&nbsp;detection&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/app.any.run\/tasks\/3053ba65-e7d8-4969-814a-8b28b4974eb8\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release_note_09_24&amp;utm_term=031024&amp;utm_content=linktoservice\" target=\"_blank\" rel=\"noreferrer noopener\">Pown<\/a>&nbsp;ransomware &nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/app.any.run\/tasks\/e68aef6f-d605-45d1-bca5-8ad2029bac19\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release_note_09_24&amp;utm_term=031024&amp;utm_content=linktoservice\" target=\"_blank\" rel=\"noreferrer noopener\">AutoIT<\/a>&nbsp;scripts detection &nbsp;<\/li>\n<\/ul>\n\n\n\n<p>Additionally, we\u2019ve updated the YARA rule for&nbsp;<a href=\"https:\/\/app.any.run\/tasks\/f168321d-01f7-4207-9421-dba05c5f1c13\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release_note_09_24&amp;utm_term=031024&amp;utm_content=linktoservice\" target=\"_blank\" rel=\"noreferrer noopener\">Lumma<\/a>, enhancing the detection mechanism for this threat.&nbsp;&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">About ANY.RUN&nbsp;&nbsp;<\/h2>\n\n\n\n<p>ANY.RUN helps more than 400,000 cybersecurity professionals worldwide. Our <a href=\"https:\/\/any.run\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release_note_09_24&amp;utm_term=031024&amp;utm_content=linktolanding\" target=\"_blank\" rel=\"noreferrer noopener\">interactive sandbox<\/a> simplifies malware analysis of threats that target both Windows and <a href=\"https:\/\/any.run\/cybersecurity-blog\/linux-malware-analysis-cases\/\" target=\"_blank\" rel=\"noreferrer noopener\">Linux<\/a> systems. Our threat intelligence products, <a href=\"https:\/\/any.run\/cybersecurity-blog\/introducing-any-run-threat-intelligence-lookup\/\" target=\"_blank\" rel=\"noreferrer noopener\">TI Lookup<\/a>, <a href=\"https:\/\/any.run\/cybersecurity-blog\/yara-search\/\" target=\"_blank\" rel=\"noreferrer noopener\">Yara Search<\/a> and <a href=\"https:\/\/any.run\/cybersecurity-blog\/ti-feeds-integration\/\" target=\"_blank\" rel=\"noreferrer noopener\">Feeds<\/a>, help you find <a href=\"https:\/\/any.run\/cybersecurity-blog\/indicators-of-compromise\/\" target=\"_blank\" rel=\"noreferrer noopener\">IOCs<\/a> or files to learn more about the threats and respond to incidents faster.&nbsp;&nbsp;<\/p>\n\n\n\n<p><strong>With ANY.RUN you can:<\/strong>&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Detect malware in seconds<\/li>\n\n\n\n<li>Interact with samples in real time<\/li>\n\n\n\n<li>Save time and money on sandbox setup and maintenance<\/li>\n\n\n\n<li>Record and study all aspects of malware behavior<\/li>\n\n\n\n<li>Collaborate with your team&nbsp;<\/li>\n\n\n\n<li>Scale as you need<\/li>\n<\/ul>\n\n\n\n<p><a href=\"https:\/\/any.run\/demo\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release_note_09_24&amp;utm_term=031024&amp;utm_content=linktodemo\" target=\"_blank\" rel=\"noreferrer noopener\">Request free trial of ANY.RUN&#8217;s products \u2192<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Welcome to ANY.RUN\u2018s monthly updates, where we share our team\u2019s achievements over the past month.&nbsp; September has been a productive month at ANY.RUN, packed with exciting new features and improvements. We\u2019ve launched Safebrowsing, a powerful tool that lets you safely check suspicious URLs in an isolated browser.&nbsp; In addition to that, we\u2019ve integrated with Splunk, [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":7723,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[9],"tags":[57,10,34,40,55,56],"class_list":["post-9083","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-service-updates","tag-anyrun","tag-cybersecurity","tag-malware-analysis","tag-malware-behavior","tag-release","tag-update"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v20.10 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Release Notes: Safebrowsing, Splunk Integration, YARA, and more<\/title>\n<meta name=\"description\" content=\"Learn about ANY.RUN&#039;s updates in September 2024, from a new tool for exploring suspicious URLs to the integration with Splunk.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/any.run\/cybersecurity-blog\/release-notes-september-2024\/\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"ANY.RUN\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/release-notes-september-2024\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/release-notes-september-2024\/\"},\"author\":{\"name\":\"ANY.RUN\",\"@id\":\"https:\/\/any.run\/\"},\"headline\":\"Release Notes: Safebrowsing, Private AI Assistant, Splunk Integration, and more\",\"datePublished\":\"2024-10-03T09:55:56+00:00\",\"dateModified\":\"2025-11-13T08:51:15+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/release-notes-september-2024\/\"},\"wordCount\":786,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/any.run\/\"},\"keywords\":[\"ANYRUN\",\"cybersecurity\",\"malware analysis\",\"malware behavior\",\"release\",\"update\"],\"articleSection\":[\"Service Updates\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/any.run\/cybersecurity-blog\/release-notes-september-2024\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/release-notes-september-2024\/\",\"url\":\"https:\/\/any.run\/cybersecurity-blog\/release-notes-september-2024\/\",\"name\":\"Release Notes: Safebrowsing, Splunk Integration, YARA, and more\",\"isPartOf\":{\"@id\":\"https:\/\/any.run\/\"},\"datePublished\":\"2024-10-03T09:55:56+00:00\",\"dateModified\":\"2025-11-13T08:51:15+00:00\",\"description\":\"Learn about ANY.RUN's updates in September 2024, from a new tool for exploring suspicious URLs to the integration with Splunk.\",\"breadcrumb\":{\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/release-notes-september-2024\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/any.run\/cybersecurity-blog\/release-notes-september-2024\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/release-notes-september-2024\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/any.run\/cybersecurity-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Service Updates\",\"item\":\"https:\/\/any.run\/cybersecurity-blog\/category\/service-updates\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Release Notes: Safebrowsing, Private AI Assistant, Splunk Integration, and more\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/any.run\/\",\"url\":\"https:\/\/any.run\/\",\"name\":\"ANY.RUN&#039;s Cybersecurity Blog\",\"description\":\"Cybersecurity Blog covers topics for experienced professionals as well as for those new to it.\",\"publisher\":{\"@id\":\"https:\/\/any.run\/\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/any.run\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/any.run\/\",\"name\":\"ANY.RUN\",\"url\":\"https:\/\/any.run\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/any.run\/\",\"url\":\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg\",\"contentUrl\":\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg\",\"width\":1,\"height\":1,\"caption\":\"ANY.RUN\"},\"image\":{\"@id\":\"https:\/\/any.run\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/www.any.run\/\",\"https:\/\/twitter.com\/anyrun_app\",\"https:\/\/www.linkedin.com\/company\/30692044\",\"https:\/\/www.youtube.com\/channel\/UCOgCPho7lzmH7m6fPNlukrQ\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/any.run\/\",\"name\":\"ANY.RUN\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/any.run\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/c4ce3a6c672056b4a8cd6b0110782215?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/c4ce3a6c672056b4a8cd6b0110782215?s=96&d=mm&r=g\",\"caption\":\"ANY.RUN\"},\"url\":\"https:\/\/any.run\/cybersecurity-blog\/author\/a-bespalova\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Release Notes: Safebrowsing, Splunk Integration, YARA, and more","description":"Learn about ANY.RUN's updates in September 2024, from a new tool for exploring suspicious URLs to the integration with Splunk.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/any.run\/cybersecurity-blog\/release-notes-september-2024\/","twitter_misc":{"Written by":"ANY.RUN","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/any.run\/cybersecurity-blog\/release-notes-september-2024\/#article","isPartOf":{"@id":"https:\/\/any.run\/cybersecurity-blog\/release-notes-september-2024\/"},"author":{"name":"ANY.RUN","@id":"https:\/\/any.run\/"},"headline":"Release Notes: Safebrowsing, Private AI Assistant, Splunk Integration, and more","datePublished":"2024-10-03T09:55:56+00:00","dateModified":"2025-11-13T08:51:15+00:00","mainEntityOfPage":{"@id":"https:\/\/any.run\/cybersecurity-blog\/release-notes-september-2024\/"},"wordCount":786,"commentCount":0,"publisher":{"@id":"https:\/\/any.run\/"},"keywords":["ANYRUN","cybersecurity","malware analysis","malware behavior","release","update"],"articleSection":["Service Updates"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/any.run\/cybersecurity-blog\/release-notes-september-2024\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/any.run\/cybersecurity-blog\/release-notes-september-2024\/","url":"https:\/\/any.run\/cybersecurity-blog\/release-notes-september-2024\/","name":"Release Notes: Safebrowsing, Splunk Integration, YARA, and more","isPartOf":{"@id":"https:\/\/any.run\/"},"datePublished":"2024-10-03T09:55:56+00:00","dateModified":"2025-11-13T08:51:15+00:00","description":"Learn about ANY.RUN's updates in September 2024, from a new tool for exploring suspicious URLs to the integration with Splunk.","breadcrumb":{"@id":"https:\/\/any.run\/cybersecurity-blog\/release-notes-september-2024\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/any.run\/cybersecurity-blog\/release-notes-september-2024\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/any.run\/cybersecurity-blog\/release-notes-september-2024\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/any.run\/cybersecurity-blog\/"},{"@type":"ListItem","position":2,"name":"Service Updates","item":"https:\/\/any.run\/cybersecurity-blog\/category\/service-updates\/"},{"@type":"ListItem","position":3,"name":"Release Notes: Safebrowsing, Private AI Assistant, Splunk Integration, and more"}]},{"@type":"WebSite","@id":"https:\/\/any.run\/","url":"https:\/\/any.run\/","name":"ANY.RUN&#039;s Cybersecurity Blog","description":"Cybersecurity Blog covers topics for experienced professionals as well as for those new to it.","publisher":{"@id":"https:\/\/any.run\/"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/any.run\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/any.run\/","name":"ANY.RUN","url":"https:\/\/any.run\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/any.run\/","url":"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg","contentUrl":"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg","width":1,"height":1,"caption":"ANY.RUN"},"image":{"@id":"https:\/\/any.run\/"},"sameAs":["https:\/\/www.facebook.com\/www.any.run\/","https:\/\/twitter.com\/anyrun_app","https:\/\/www.linkedin.com\/company\/30692044","https:\/\/www.youtube.com\/channel\/UCOgCPho7lzmH7m6fPNlukrQ"]},{"@type":"Person","@id":"https:\/\/any.run\/","name":"ANY.RUN","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/any.run\/","url":"https:\/\/secure.gravatar.com\/avatar\/c4ce3a6c672056b4a8cd6b0110782215?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/c4ce3a6c672056b4a8cd6b0110782215?s=96&d=mm&r=g","caption":"ANY.RUN"},"url":"https:\/\/any.run\/cybersecurity-blog\/author\/a-bespalova\/"}]}},"_links":{"self":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts\/9083"}],"collection":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/comments?post=9083"}],"version-history":[{"count":11,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts\/9083\/revisions"}],"predecessor-version":[{"id":16762,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts\/9083\/revisions\/16762"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/media\/7723"}],"wp:attachment":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/media?parent=9083"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/categories?post=9083"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/tags?post=9083"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}