{"id":931,"date":"2020-08-31T13:34:00","date_gmt":"2020-08-31T13:34:00","guid":{"rendered":"http:\/\/blog.susp.io\/?p=931"},"modified":"2022-12-21T06:56:46","modified_gmt":"2022-12-21T06:56:46","slug":"release-notes-31-08","status":"publish","type":"post","link":"https:\/\/any.run\/cybersecurity-blog\/release-notes-31-08\/","title":{"rendered":"Release Notes  August 31, 2020"},"content":{"rendered":"\n<p>Welcome to the ANY.RUN Blog, with its help we can share you the new features and releases that constantly appear on our online sandbox. Follow our social networks and do not miss new features in our functionality, because there will be a lot of interesting news soon.<br><\/p>\n\n\n\n<p>So the August 31 release is already on the service. We are glad to inform you that we have updated the service to a new version, let&#8217;s take a look at what has been added to the functionality in this release.<br><\/p>\n\n\n\n<p>Update overview<br><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>improved optimization<\/li><li>fixed error in Captcha<\/li><li>added functionality for deleting all tasks<\/li><li>added functionality to defer the deletion of your tasks<\/li><\/ul>\n\n\n\n<p>Let&#8217;s look at the visible part of the service improvements in more detail.<\/p>\n\n\n\n<p>Deleting tasks is an essential feature for any team that works with sensitive data. Now we have made this functionality more convenient and more flexible.<\/p>\n\n\n\n<p>Deleting tasks with sensitive data will help avoid data leakage and protect you from unnecessary problems.<br><\/p>\n\n\n\n<p>We&#8217;ve added bulk delete for all your tasks. In addition, you can now configure the delay for deleting tasks.<\/p>\n\n\n\n<p>Conveniently, you don&#8217;t have to go back to samples to delete them after a while. It is also useful for teams that work on samples at the same time, and the manager checks the execution of tasks for several days.<br><\/p>\n\n\n\n<p>To delete all tasks, go to your \u2018History\u2019 and click \u2018Clear history\u2019&nbsp;<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2020\/09\/RN1-1-1024x566.png\" alt=\"Clear your history\" class=\"wp-image-967\"\/><\/figure>\n\n\n\n<p>There are two ways to set a delay for deleting tasks:<br> <\/p>\n\n\n\n<p>1. The deletion delay feature could apply to all tasks that you submit. To configure, go to your profile in the \u2018interface and settings\u2019 section and select the period after which you want your tasks to be deleted. You can select a day, week, 2 weeks, or month. <br> <\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/image-1-1024x803.png\" alt=\"Delete tasks in profile\" class=\"wp-image-934\"\/><\/figure>\n\n\n\n<p>2. If you prefer to delete not all your tasks, but only some of which may contain secret information, or just want to set a different countdown before deletion for different samples, you can configure this in the task launch window. Please note if you have a checkmark on &#8216;Save as default configuration&#8217;, then the task deletion setting will also be saved with the settings that you have installed.<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/lh5.googleusercontent.com\/fxB8dt9WtCGzpkKg9nDxh-xuCAI98tWqtY0Vtccx8zV0PSIWNdEZo6lE5morMz0-oQRRjC3jEEeKxRZzlEG8Ybh53rA55KvdGbfFmwzLu0fMIqmrK3_YJHPcsOKZt6wWSJ_4E2vc\" alt=\"\"\/><\/figure>\n\n\n\n<p>When starting the task, go to \u2018Advanced Settings\u2019, check the box and select the interval after which the task should be deleted.<br><\/p>\n\n\n\n<p>To cancel the deletion, you can go to the settings of the task itself.<br><\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/lh3.googleusercontent.com\/k-sPFXgjcgc1YEtv3vjZTp2_ks-qURiQJgC2r6sU80364E5H2YqWHvnhxmGmQZEign0cb_TabMUHkuRR51buw8y8Ze-zkYM512hryUTu0yRSTsWaDvNBGfbzbKGBGTNYs3mU5yoL\" alt=\"\"\/><\/figure>\n\n\n\n<p>And you can cancel the deferred deletion for all files in the profile in the same place where deletion is configured.<br><\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/lh3.googleusercontent.com\/v3r9zdPY7HvLvJa3fz5IU7vf8tgVAiSXGVXowy9Q77cZifzvo4-LB6ZEYQqWMCC_o_KDvMTlUNEcFMn5m5YB-DooP28hm6VO7PAjkaaihhJC8j1HIR1ETvUkADW6C-RmHKB5gGlx\" alt=\"\"\/><\/figure>\n\n\n\n<p>We also want to remind you that deleting tasks is available for users of all paid subscriptions.<br><\/p>\n\n\n\n<p>&nbsp;&nbsp;This is just the first news ahead of you there are many more innovations, follow our publications.<br><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Welcome to the ANY.RUN Blog, with its help we can share you the new features and releases that constantly appear on our online sandbox. Follow our social networks and do not miss new features in our functionality, because there will be a lot of interesting news soon. So the August 31 release is already on [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":3760,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[9],"tags":[54,55,56],"class_list":["post-931","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-service-updates","tag-features","tag-release","tag-update"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v20.10 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Release notes - August 31, 2020 - ANY.RUN Blog<\/title>\n<meta name=\"description\" content=\"We are glad to inform you that we have updated the service to a new version, let&#039;s take a look at what has been added to the functionality in this release.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/any.run\/cybersecurity-blog\/release-notes-31-08\/\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"ANY.RUN\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/release-notes-31-08\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/release-notes-31-08\/\"},\"author\":{\"name\":\"ANY.RUN\",\"@id\":\"https:\/\/any.run\/\"},\"headline\":\"Release Notes August 31, 2020\",\"datePublished\":\"2020-08-31T13:34:00+00:00\",\"dateModified\":\"2022-12-21T06:56:46+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/release-notes-31-08\/\"},\"wordCount\":462,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/any.run\/\"},\"keywords\":[\"features\",\"release\",\"update\"],\"articleSection\":[\"Service Updates\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/any.run\/cybersecurity-blog\/release-notes-31-08\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/release-notes-31-08\/\",\"url\":\"https:\/\/any.run\/cybersecurity-blog\/release-notes-31-08\/\",\"name\":\"Release notes - August 31, 2020 - ANY.RUN Blog\",\"isPartOf\":{\"@id\":\"https:\/\/any.run\/\"},\"datePublished\":\"2020-08-31T13:34:00+00:00\",\"dateModified\":\"2022-12-21T06:56:46+00:00\",\"description\":\"We are glad to inform you that we have updated the service to a new version, let's take a look at what has been added to the functionality in this release.\",\"breadcrumb\":{\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/release-notes-31-08\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/any.run\/cybersecurity-blog\/release-notes-31-08\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/release-notes-31-08\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/any.run\/cybersecurity-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"teamwork\",\"item\":\"https:\/\/any.run\/tag\/teamwork\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Release Notes August 31, 2020\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/any.run\/\",\"url\":\"https:\/\/any.run\/\",\"name\":\"ANY.RUN&#039;s Cybersecurity Blog\",\"description\":\"Cybersecurity Blog covers topics for experienced professionals as well as for those new to it.\",\"publisher\":{\"@id\":\"https:\/\/any.run\/\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/any.run\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/any.run\/\",\"name\":\"ANY.RUN\",\"url\":\"https:\/\/any.run\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/any.run\/\",\"url\":\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg\",\"contentUrl\":\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg\",\"width\":1,\"height\":1,\"caption\":\"ANY.RUN\"},\"image\":{\"@id\":\"https:\/\/any.run\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/www.any.run\/\",\"https:\/\/twitter.com\/anyrun_app\",\"https:\/\/www.linkedin.com\/company\/30692044\",\"https:\/\/www.youtube.com\/channel\/UCOgCPho7lzmH7m6fPNlukrQ\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/any.run\/\",\"name\":\"ANY.RUN\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/any.run\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/c4ce3a6c672056b4a8cd6b0110782215?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/c4ce3a6c672056b4a8cd6b0110782215?s=96&d=mm&r=g\",\"caption\":\"ANY.RUN\"},\"url\":\"https:\/\/any.run\/cybersecurity-blog\/author\/a-bespalova\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Release notes - August 31, 2020 - ANY.RUN Blog","description":"We are glad to inform you that we have updated the service to a new version, let's take a look at what has been added to the functionality in this release.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/any.run\/cybersecurity-blog\/release-notes-31-08\/","twitter_misc":{"Written by":"ANY.RUN","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/any.run\/cybersecurity-blog\/release-notes-31-08\/#article","isPartOf":{"@id":"https:\/\/any.run\/cybersecurity-blog\/release-notes-31-08\/"},"author":{"name":"ANY.RUN","@id":"https:\/\/any.run\/"},"headline":"Release Notes August 31, 2020","datePublished":"2020-08-31T13:34:00+00:00","dateModified":"2022-12-21T06:56:46+00:00","mainEntityOfPage":{"@id":"https:\/\/any.run\/cybersecurity-blog\/release-notes-31-08\/"},"wordCount":462,"commentCount":0,"publisher":{"@id":"https:\/\/any.run\/"},"keywords":["features","release","update"],"articleSection":["Service Updates"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/any.run\/cybersecurity-blog\/release-notes-31-08\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/any.run\/cybersecurity-blog\/release-notes-31-08\/","url":"https:\/\/any.run\/cybersecurity-blog\/release-notes-31-08\/","name":"Release notes - August 31, 2020 - ANY.RUN Blog","isPartOf":{"@id":"https:\/\/any.run\/"},"datePublished":"2020-08-31T13:34:00+00:00","dateModified":"2022-12-21T06:56:46+00:00","description":"We are glad to inform you that we have updated the service to a new version, let's take a look at what has been added to the functionality in this release.","breadcrumb":{"@id":"https:\/\/any.run\/cybersecurity-blog\/release-notes-31-08\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/any.run\/cybersecurity-blog\/release-notes-31-08\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/any.run\/cybersecurity-blog\/release-notes-31-08\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/any.run\/cybersecurity-blog\/"},{"@type":"ListItem","position":2,"name":"teamwork","item":"https:\/\/any.run\/tag\/teamwork\/"},{"@type":"ListItem","position":3,"name":"Release Notes August 31, 2020"}]},{"@type":"WebSite","@id":"https:\/\/any.run\/","url":"https:\/\/any.run\/","name":"ANY.RUN&#039;s Cybersecurity Blog","description":"Cybersecurity Blog covers topics for experienced professionals as well as for those new to it.","publisher":{"@id":"https:\/\/any.run\/"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/any.run\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/any.run\/","name":"ANY.RUN","url":"https:\/\/any.run\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/any.run\/","url":"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg","contentUrl":"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg","width":1,"height":1,"caption":"ANY.RUN"},"image":{"@id":"https:\/\/any.run\/"},"sameAs":["https:\/\/www.facebook.com\/www.any.run\/","https:\/\/twitter.com\/anyrun_app","https:\/\/www.linkedin.com\/company\/30692044","https:\/\/www.youtube.com\/channel\/UCOgCPho7lzmH7m6fPNlukrQ"]},{"@type":"Person","@id":"https:\/\/any.run\/","name":"ANY.RUN","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/any.run\/","url":"https:\/\/secure.gravatar.com\/avatar\/c4ce3a6c672056b4a8cd6b0110782215?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/c4ce3a6c672056b4a8cd6b0110782215?s=96&d=mm&r=g","caption":"ANY.RUN"},"url":"https:\/\/any.run\/cybersecurity-blog\/author\/a-bespalova\/"}]}},"_links":{"self":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts\/931"}],"collection":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/comments?post=931"}],"version-history":[{"count":1,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts\/931\/revisions"}],"predecessor-version":[{"id":3817,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts\/931\/revisions\/3817"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/media\/3760"}],"wp:attachment":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/media?parent=931"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/categories?post=931"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/tags?post=931"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}