{"id":9665,"date":"2024-11-06T09:15:03","date_gmt":"2024-11-06T09:15:03","guid":{"rendered":"\/cybersecurity-blog\/?p=9665"},"modified":"2024-11-12T11:25:51","modified_gmt":"2024-11-12T11:25:51","slug":"release-notes-october-2024","status":"publish","type":"post","link":"\/cybersecurity-blog\/release-notes-october-2024\/","title":{"rendered":"Release Notes: TI Lookup Notifications, Upgraded Linux Sandbox, STIX Reports, <br>and More\u00a0"},"content":{"rendered":"\n<p>Welcome to <a href=\"https:\/\/any.run\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release_notes_oct_24&amp;utm_term=061124&amp;utm_content=linktolanding\" target=\"_blank\" rel=\"noreferrer noopener\">ANY.RUN<\/a>&#8216;s monthly updates, where we share our latest achievements and improvements.&nbsp;<\/p>\n\n\n\n<p>October has been another productive month here at ANY.RUN, filled with new features to enhance your cybersecurity toolkit. We\u2019ve introduced&nbsp;<strong>TI Lookup Notifications<\/strong>&nbsp;for real-time threat updates, rolled out a newly improved&nbsp;<strong>Linux sandbox<\/strong>&nbsp;for smoother malware analysis, and added the ability to export&nbsp;<strong>STIX reports<\/strong>&nbsp;for seamless data sharing.&nbsp;<\/p>\n\n\n\n<p>In addition, we\u2019ve expanded our detection capabilities with a range of&nbsp;<strong>new signatures<\/strong>&nbsp;and&nbsp;<strong>YARA rules<\/strong>, empowering you with even stronger threat coverage.&nbsp;<\/p>\n\n\n\n<p>And that\u2019s just the beginning! &nbsp;<\/p>\n\n\n\n<p>Let\u2019s dive into all the exciting updates from ANY.RUN this month.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Product Updates<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\">Upgraded Linux Sandbox &nbsp;<\/h3>\n\n\n\n<p>At ANY.RUN, we\u2019re always working to improve our services, and this time, we\u2019ve focused on making our&nbsp;<a href=\"https:\/\/any.run\/cybersecurity-blog\/linux-malware-analysis-sandbox\/\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>Linux sandbox<\/strong><\/a>&nbsp;even better. This upgrade brings a seamless, stable experience on par with our Windows environment, making it easier than ever to analyze Linux malware in real time.&nbsp;<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"584\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2024\/11\/image2-1-1024x584.png\" alt=\"\" class=\"wp-image-9669\" srcset=\"\/cybersecurity-blog\/wp-content\/uploads\/2024\/11\/image2-1-1024x584.png 1024w, \/cybersecurity-blog\/wp-content\/uploads\/2024\/11\/image2-1-300x171.png 300w, \/cybersecurity-blog\/wp-content\/uploads\/2024\/11\/image2-1-768x438.png 768w, \/cybersecurity-blog\/wp-content\/uploads\/2024\/11\/image2-1-1536x876.png 1536w, \/cybersecurity-blog\/wp-content\/uploads\/2024\/11\/image2-1-370x211.png 370w, \/cybersecurity-blog\/wp-content\/uploads\/2024\/11\/image2-1-270x154.png 270w, \/cybersecurity-blog\/wp-content\/uploads\/2024\/11\/image2-1-740x422.png 740w, \/cybersecurity-blog\/wp-content\/uploads\/2024\/11\/image2-1.png 2048w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\"><em>Upgraded Linux sandbox<\/em><\/figcaption><\/figure><\/div>\n\n\n<p>We\u2019ve fine-tuned the Linux sandbox with new features and enhancements to boost both performance and usability. Here\u2019s a quick overview of what\u2019s new and how these updates benefit you:&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>File events tracking<\/strong>: Monitor and log all file actions\u2014whether malware is creating, modifying, or deleting files, you\u2019ll see it all in the analysis report.&nbsp;<\/li>\n\n\n\n<li><strong>Improved process tree<\/strong>: Navigating the process tree is now lag-free, letting you analyze malware behaviors more efficiently.&nbsp;<\/li>\n\n\n\n<li><strong>Real-time file uploads<\/strong>: You can now upload files during an active session, adding flexibility to your investigation without needing to restart.&nbsp;<\/li>\n<\/ul>\n\n\n\n<p><a href=\"https:\/\/any.run\/cybersecurity-blog\/linux-malware-analysis-sandbox\/\" target=\"_blank\" rel=\"noreferrer noopener\">See all updates in our blog post<\/a>. <\/p>\n\n\n\n<!-- Regular Banner START -->\n<div class=\"regular-banner\">\n<!-- Text Content -->\n<p class=\"regular-banner__text\">\nTry malware and phishing analysis <br>in ANY.RUN&#8217;s <span class=\"highlight\">Linux sandbox<\/span> for free&nbsp;   \n<\/p>\n<!-- CTA Link -->\n<a class=\"regular-banner__link\" id=\"article-banner-regular\" href=\"https:\/\/app.any.run\/?utm_source=anyrunblog&#038;utm_medium=article&#038;utm_campaign=release_notes_oct_24&#038;utm_term=061124&#038;utm_content=linktoregistration#register\/\" rel=\"noopener\" target=\"_blank\">\nTry it now\n<\/a>\n<\/div>\n<!-- Regular Banner END -->\n<!-- Regular Banner Styles START -->\n\n<style>\n.regular-banner {\ndisplay: flex;\ntext-align: center;\nflex-direction: column;\nalign-items: center;\ngap: 1.5rem;\nwidth: 100%;\npadding: 2rem;\nmargin: 1.5rem 0;\nborder-radius: 0.5rem;\nfont-family: 'Catamaran Bold';\nmargin-inline: auto;\nbackground: rgba(32, 168, 241, 0.1);\nborder: 1px solid rgba(75, 174, 227, 0.32);\n}\n\n.regular-banner__text {\nfont-size: 1.5rem;\nmargin: 0;\n}\n\n.highlight {\ncolor: #ea2526;\n}\n\n.regular-banner__link {\npadding: 0.5rem 1.5rem;\nfont-weight: 500;\ntext-decoration: none;\nborder-radius: 0.5rem;\ncolor: #FFFFFF;\nbackground-color: #1491D4;\ntext-align: center;\ntransition: all 0.2s ease-in;\n}\n\n.regular-banner__link:hover {\nbackground-color: #68CBFF;\ncolor: white;\n}\n<\/style>\n<!-- Regular Banner Styles END -->\n\n\n\n<h3 class=\"wp-block-heading\">STIX Reports&nbsp;<\/h3>\n\n\n\n<p>In October, we enhanced ANY.RUN&#8217;s capabilities by introducing the option to export threat analysis data in the <a href=\"https:\/\/any.run\/cybersecurity-blog\/malware-analysis-report\/#3-stix-reports-2690\" target=\"_blank\" rel=\"noreferrer noopener\">Structured Threat Information eXpression<\/a> (STIX) format. STIX is a standardized language that facilitates consistent and machine-readable sharing of cyber threat intelligence.&nbsp;<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"918\" height=\"838\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2024\/11\/image3-1.png\" alt=\"\" class=\"wp-image-9670\" srcset=\"\/cybersecurity-blog\/wp-content\/uploads\/2024\/11\/image3-1.png 918w, \/cybersecurity-blog\/wp-content\/uploads\/2024\/11\/image3-1-300x274.png 300w, \/cybersecurity-blog\/wp-content\/uploads\/2024\/11\/image3-1-768x701.png 768w, \/cybersecurity-blog\/wp-content\/uploads\/2024\/11\/image3-1-370x338.png 370w, \/cybersecurity-blog\/wp-content\/uploads\/2024\/11\/image3-1-270x246.png 270w, \/cybersecurity-blog\/wp-content\/uploads\/2024\/11\/image3-1-740x676.png 740w\" sizes=\"(max-width: 918px) 100vw, 918px\" \/><figcaption class=\"wp-element-caption\"><em>Click&nbsp;Export \u2192 STIX&nbsp;to download threat data<\/em>&nbsp;<\/figcaption><\/figure><\/div>\n\n\n<p><strong><em>Key features of STIX reports:<\/em><\/strong>&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Comprehensive data inclusion:<\/strong>&nbsp;Each STIX report encompasses a wide range of information from your analysis, such as sandbox session links, file hashes, <a href=\"https:\/\/any.run\/cybersecurity-blog\/how-to-analyze-malicious-network-traffic\/\" target=\"_blank\" rel=\"noreferrer noopener\">network traffic<\/a> details, file system modifications, and <a href=\"https:\/\/any.run\/cybersecurity-blog\/malware-ttps-explained\/\" target=\"_blank\" rel=\"noreferrer noopener\">Tactics, Techniques, and Procedures<\/a> (TTPs).&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Seamless integration:<\/strong>&nbsp;These reports are compatible with Security Information and Event Management (SIEM) systems and other automated tools, promoting efficient threat detection and response.&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Enhanced collaboration:<\/strong>&nbsp;By utilizing STIX reports, analysts and incident response teams can effortlessly share threat data across various platforms, improving communication and coordination.&nbsp;<\/li>\n<\/ul>\n\n\n\n<p><a href=\"https:\/\/any.run\/cybersecurity-blog\/malware-analysis-report\/\" target=\"_blank\" rel=\"noreferrer noopener\">Discover all types of reports available in the ANY.RUN sandbox<\/a>.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">TI Lookup Notifications&nbsp;<\/h3>\n\n\n\n<p>We have enhanced <a href=\"https:\/\/any.run\/cybersecurity-blog\/introducing-any-run-threat-intelligence-lookup\/\" target=\"_blank\" rel=\"noreferrer noopener\">Threat Intelligence Lookup<\/a> with Notifications. The <a href=\"https:\/\/any.run\/cybersecurity-blog\/ti-lookup-notifications\/\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>new functionality<\/strong><\/a> allows users to subscribe to real-time updates on new results related to their <a href=\"https:\/\/any.run\/cybersecurity-blog\/ti-lookup-search-parameters\/\" target=\"_blank\" rel=\"noreferrer noopener\">specific queries<\/a>. This includes <a href=\"https:\/\/any.run\/cybersecurity-blog\/indicators-of-compromise\/\" target=\"_blank\" rel=\"noreferrer noopener\">Indicators of Compromise<\/a>&nbsp;(IOCs), Indicators of Attack (IOAs), and Indicators of Behavior (IOBs).&nbsp;<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"504\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2024\/11\/image-1-1024x504.png\" alt=\"\" class=\"wp-image-9668\" srcset=\"\/cybersecurity-blog\/wp-content\/uploads\/2024\/11\/image-1-1024x504.png 1024w, \/cybersecurity-blog\/wp-content\/uploads\/2024\/11\/image-1-300x148.png 300w, \/cybersecurity-blog\/wp-content\/uploads\/2024\/11\/image-1-768x378.png 768w, \/cybersecurity-blog\/wp-content\/uploads\/2024\/11\/image-1-1536x756.png 1536w, \/cybersecurity-blog\/wp-content\/uploads\/2024\/11\/image-1-370x182.png 370w, \/cybersecurity-blog\/wp-content\/uploads\/2024\/11\/image-1-270x133.png 270w, \/cybersecurity-blog\/wp-content\/uploads\/2024\/11\/image-1-740x364.png 740w, \/cybersecurity-blog\/wp-content\/uploads\/2024\/11\/image-1.png 1839w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\">Notifications in TI Lookup are easy to set up<\/figcaption><\/figure><\/div>\n\n\n<p>After subscribing to specific queries, the new results will appear in the dashboard, highlighted in green. This will make it easier for you to notice the fresh updates.&nbsp;<\/p>\n\n\n\n<p><strong><em>Why use Lookup Notifications?<\/em><\/strong>&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Automatically monitor and receive updates for your chosen queries, so you never miss critical threat information.&nbsp;<\/li>\n\n\n\n<li>Tap into threat data sourced from samples uploaded by over 500,000 security pros using ANY.RUN\u2019s Interactive Sandbox, giving you a broad view of global cyber activity.&nbsp;<\/li>\n\n\n\n<li>Keep track of IOCs, IOAs, and IOBs relevant to your organization, helping you verify potential threats and proactively strengthen your defenses.&nbsp;<\/li>\n\n\n\n<li>Use real-time insights to refine detection rules, enrich your data, and stay prepared against emerging threats.&nbsp;<\/li>\n<\/ul>\n\n\n\n<p><a href=\"https:\/\/any.run\/cybersecurity-blog\/ti-lookup-notifications\/\" target=\"_blank\" rel=\"noreferrer noopener\">See a guide on how to set up notifications in TI Lookup<\/a>.<\/p>\n\n\n\n<!-- Regular Banner START -->\n<div class=\"regular-banner\">\n<!-- Text Content -->\n<p class=\"regular-banner__text\">\nEnrich your threat investigations with data <br>from <span class=\"highlight\">TI Lookup<\/span>&nbsp;   \n<\/p>\n<!-- CTA Link -->\n<a class=\"regular-banner__link\" id=\"article-banner-regular\" href=\"https:\/\/intelligence.any.run\/plans\/?utm_source=anyrunblog&#038;utm_medium=article&#038;utm_campaign=release_notes_oct_24&#038;utm_term=061124&#038;utm_content=linktotiplans\/\" rel=\"noopener\" target=\"_blank\">\nRequest trial\n<\/a>\n<\/div>\n<!-- Regular Banner END -->\n<!-- Regular Banner Styles START -->\n\n<style>\n.regular-banner {\ndisplay: flex;\ntext-align: center;\nflex-direction: column;\nalign-items: center;\ngap: 1.5rem;\nwidth: 100%;\npadding: 2rem;\nmargin: 1.5rem 0;\nborder-radius: 0.5rem;\nfont-family: 'Catamaran Bold';\nmargin-inline: auto;\nbackground: rgba(32, 168, 241, 0.1);\nborder: 1px solid rgba(75, 174, 227, 0.32);\n}\n\n.regular-banner__text {\nfont-size: 1.5rem;\nmargin: 0;\n}\n\n.highlight {\ncolor: #ea2526;\n}\n\n.regular-banner__link {\npadding: 0.5rem 1.5rem;\nfont-weight: 500;\ntext-decoration: none;\nborder-radius: 0.5rem;\ncolor: #FFFFFF;\nbackground-color: #1491D4;\ntext-align: center;\ntransition: all 0.2s ease-in;\n}\n\n.regular-banner__link:hover {\nbackground-color: #68CBFF;\ncolor: white;\n}\n<\/style>\n<!-- Regular Banner Styles END -->\n\n\n\n<h3 class=\"wp-block-heading\">Export Session Lists from Team History&nbsp;<\/h3>\n\n\n\n<p>We\u2019ve introduced a new feature that allows you to&nbsp;<strong>export analysis session lists from <a href=\"https:\/\/any.run\/cybersecurity-blog\/anyrun-for-enterprises\/\" target=\"_blank\" rel=\"noreferrer noopener\">your team<\/a>\u2019s history<\/strong>&nbsp;in a specific JSON format. This export provides a structured list of all sandbox sessions completed by your team.&nbsp;<\/p>\n\n\n\n<p>This feature is designed to help with record-keeping and reporting, making it easier to manage and track your team\u2019s activities over time.&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Custom Tags for Analysis Sessions via API&nbsp;<\/h3>\n\n\n\n<p>We\u2019ve added the ability to&nbsp;<strong>set custom tags for sandbox sessions via the API<\/strong>. Previously, you could assign personalized tags to sessions through the web interface, in addition to the system-generated tags. Now, you can do the same directly through the API, giving you more flexibility in organizing and categorizing your analyses.&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Redesigned Threat Intelligence Home Screen with MITRE ATT&amp;CK Matrix&nbsp;<\/h3>\n\n\n\n<p>We\u2019ve redesigned our&nbsp;<a href=\"https:\/\/intelligence.any.run\/\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>Threat Intelligence home screen<\/strong><\/a>&nbsp;to give you a clearer and more intuitive view of the threat landscape.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"606\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2024\/11\/image4-1-1024x606.png\" alt=\"\" class=\"wp-image-9671\" srcset=\"\/cybersecurity-blog\/wp-content\/uploads\/2024\/11\/image4-1-1024x606.png 1024w, \/cybersecurity-blog\/wp-content\/uploads\/2024\/11\/image4-1-300x177.png 300w, \/cybersecurity-blog\/wp-content\/uploads\/2024\/11\/image4-1-768x454.png 768w, \/cybersecurity-blog\/wp-content\/uploads\/2024\/11\/image4-1-1536x908.png 1536w, \/cybersecurity-blog\/wp-content\/uploads\/2024\/11\/image4-1-2048x1211.png 2048w, \/cybersecurity-blog\/wp-content\/uploads\/2024\/11\/image4-1-370x219.png 370w, \/cybersecurity-blog\/wp-content\/uploads\/2024\/11\/image4-1-270x160.png 270w, \/cybersecurity-blog\/wp-content\/uploads\/2024\/11\/image4-1-740x438.png 740w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\"><em>Redesigned Threat Intelligence home screen<\/em><\/figcaption><\/figure><\/div>\n\n\n<p>The updated home screen now features a&nbsp;<strong><a href=\"https:\/\/any.run\/cybersecurity-blog\/mitre-attack\/\" target=\"_blank\" rel=\"noreferrer noopener\">MITRE ATT&amp;CK matrix<\/a><\/strong>&nbsp;with refined techniques and tactics, helping you better assess and understand threats.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Threat Coverage Updates&nbsp;<\/h2>\n\n\n\n<p>In October, we\u2019ve significantly expanded our detection capabilities with new and updated signatures and YARA rules.&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">New Signatures&nbsp;<\/h3>\n\n\n\n<p>This month, we\u2019ve added&nbsp;<strong>90 new signatures<\/strong>&nbsp;to improve detection and monitoring across various malware types and tools, including:<\/p>\n\n\n\n<p><a href=\"https:\/\/app.any.run\/tasks\/b113bcd5-221f-4d5c-b313-06540866f723\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release_notes_oct_24&amp;utm_term=061124&amp;utm_content=linktoservice\" target=\"_blank\" rel=\"noreferrer noopener\">VOBFUS<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/app.any.run\/tasks\/cc577405-47fa-4edb-af75-914301a6c3e2\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release_notes_oct_24&amp;utm_term=061124&amp;utm_content=linktoservice\" target=\"_blank\" rel=\"noreferrer noopener\">BASUN<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/app.any.run\/tasks\/cbebc318-c04a-4635-8067-c3773e6d3497\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release_notes_oct_24&amp;utm_term=061124&amp;utm_content=linktoservice\" target=\"_blank\" rel=\"noreferrer noopener\">SYSBOT<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/app.any.run\/tasks\/a7802db8-8236-4c9d-9457-f750f851f04c\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release_notes_oct_24&amp;utm_term=061124&amp;utm_content=linktoservice\" target=\"_blank\" rel=\"noreferrer noopener\">TIWI<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/app.any.run\/tasks\/35d009fb-cd78-43d0-947b-e47e77ecb453\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release_notes_oct_24&amp;utm_term=061124&amp;utm_content=linktoservice\" target=\"_blank\" rel=\"noreferrer noopener\">NESHTA<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/app.any.run\/tasks\/4b9fdb57-3d08-433a-9b9a-eff5702bcea2\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release_notes_oct_24&amp;utm_term=061124&amp;utm_content=linktoservice\" target=\"_blank\" rel=\"noreferrer noopener\">KMS Tool<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/app.any.run\/tasks\/3de2bfe7-235a-431e-a81c-b80436ec65be\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release_notes_oct_24&amp;utm_term=061124&amp;utm_content=linktoservice\" target=\"_blank\" rel=\"noreferrer noopener\">Blackshades<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/app.any.run\/tasks\/8b5c09a0-f5e5-45e0-81bf-4cff830b742d\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release_notes_oct_24&amp;utm_term=061124&amp;utm_content=linktoservice\" target=\"_blank\" rel=\"noreferrer noopener\">Modiloader<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/app.any.run\/tasks\/e4314f30-17cb-4525-ad9b-fd449f9ed6d6\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release_notes_oct_24&amp;utm_term=061124&amp;utm_content=linktoservice\" target=\"_blank\" rel=\"noreferrer noopener\">Shellrunner<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/app.any.run\/tasks\/d1bc7087-753e-47aa-bf2e-8415353900b3#\" target=\"_blank\" rel=\"noreferrer noopener\">Revenge<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/app.any.run\/tasks\/c2bbd3b2-3c38-448f-808b-57fedbeddc1b\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release_notes_oct_24&amp;utm_term=061124&amp;utm_content=linktoservice\" target=\"_blank\" rel=\"noreferrer noopener\">GoToHttp<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/app.any.run\/tasks\/0f9a7ca6-4482-4175-8795-a7530de5226e\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release_notes_oct_24&amp;utm_term=061124&amp;utm_content=linktoservice\" target=\"_blank\" rel=\"noreferrer noopener\">AnyDesk<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/app.any.run\/tasks\/12b3e397-e6e7-4a92-a27a-0aff030333ec\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release_notes_oct_24&amp;utm_term=061124&amp;utm_content=linktoservice\" target=\"_blank\" rel=\"noreferrer noopener\">Emmenhtal<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/app.any.run\/tasks\/1e763352-289d-4be8-ae72-aa8b5807450f\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release_notes_oct_24&amp;utm_term=061124&amp;utm_content=linktoservice\" target=\"_blank\" rel=\"noreferrer noopener\">SkypeLogView<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/app.any.run\/tasks\/7a50f766-0674-40c2-b49b-9bc1182027ec\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release_notes_oct_24&amp;utm_term=061124&amp;utm_content=linktoservice\" target=\"_blank\" rel=\"noreferrer noopener\">LockBit3<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/app.any.run\/tasks\/7d3da1b9-27db-4459-bf56-cbf7031a49c2\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release_notes_oct_24&amp;utm_term=061124&amp;utm_content=linktoservice\" target=\"_blank\" rel=\"noreferrer noopener\">Ngrok<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/app.any.run\/tasks\/12e04284-94cc-407d-8f4b-37fc65b87a45#\" target=\"_blank\" rel=\"noreferrer noopener\">PSExec<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/app.any.run\/tasks\/a17ffb3e-561e-4ad2-b345-7247821e1d0e\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release_notes_oct_24&amp;utm_term=061124&amp;utm_content=linktoservice\" target=\"_blank\" rel=\"noreferrer noopener\">COBINT<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/app.any.run\/tasks\/5519f328-6245-43c2-9b36-2a854cdd542b\/\" target=\"_blank\" rel=\"noreferrer noopener\">ProcDump<\/a>&nbsp;<\/p>\n\n\n\n<p><a href=\"https:\/\/app.any.run\/tasks\/1ef08c90-8d83-41d5-8325-0bcac15fbf70\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release_notes_oct_24&amp;utm_term=061124&amp;utm_content=linktoservice\" target=\"_blank\" rel=\"noreferrer noopener\">PowerView<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/app.any.run\/tasks\/ac43e6a8-d6e6-49b8-b9c5-d8d3f0444741\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release_notes_oct_24&amp;utm_term=061124&amp;utm_content=linktoservice\" target=\"_blank\" rel=\"noreferrer noopener\">SecretsDump<\/a>\u00a0<\/p>\n\n\n\n<p>We added<strong> signatures<\/strong> for actions performed via PowerShell:&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Resets Windows Defender malware definitions to the base version&nbsp;&nbsp;<\/li>\n\n\n\n<li>Changes settings for sending potential threat samples to Microsoft servers&nbsp;&nbsp;<\/li>\n\n\n\n<li>Changes settings for reporting to Microsoft Active Protection Service (MAPS)&nbsp;&nbsp;<\/li>\n\n\n\n<li>Changes Controlled Folder Access settings&nbsp;&nbsp;<\/li>\n\n\n\n<li>Changes settings for real-time protection&nbsp;&nbsp;<\/li>\n\n\n\n<li>Changes settings for checking scripts for malicious actions&nbsp;&nbsp;<\/li>\n\n\n\n<li>Changes antivirus protection settings for downloading files from the Internet (IOAVProtection)&nbsp;&nbsp;<\/li>\n\n\n\n<li>Changes settings for protection against network attacks (IPS) &nbsp;<\/li>\n\n\n\n<li>Removes files via Powershell&nbsp;<\/li>\n\n\n\n<li>Renames file via Powershell&nbsp;<\/li>\n\n\n\n<li>Hides errors and continues executing the command without stopping &nbsp;<\/li>\n<\/ul>\n\n\n\n<p>We also implemented detection for Pafish, aka Paranoid Fish, execution with cohost.exe as a parent process, and encrypted JSE scripts.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">YARA Rules&nbsp;<\/h3>\n\n\n\n<p>This month, we\u2019ve expanded our YARA rule set with several new and improved detections, enhancing the ability to identify and monitor specific threats. &nbsp;<\/p>\n\n\n\n<p>In total, we\u2019ve added<strong> 9 new YARA rules<\/strong>, covering various malware families, programming language-based detections, and refinements for better accuracy.<\/p>\n\n\n\n<p><a href=\"https:\/\/app.any.run\/tasks\/f5bf7d5f-9a8b-4519-9df6-44086c81409e\" target=\"_blank\" rel=\"noreferrer noopener\">Unknown Stealer (go)<\/a> &nbsp;<\/p>\n\n\n\n<p><a href=\"https:\/\/app.any.run\/tasks\/e40c19e5-5a5d-4cb5-b308-22f936b76193\" target=\"_blank\" rel=\"noreferrer noopener\">PureCrypter<\/a> &nbsp;<\/p>\n\n\n\n<p><a href=\"https:\/\/app.any.run\/tasks\/0aa68c9c-6232-4160-b353-9ab0a3f869e2\" target=\"_blank\" rel=\"noreferrer noopener\">DarkGate<\/a> &nbsp;<\/p>\n\n\n\n<p><a href=\"https:\/\/app.any.run\/tasks\/14b8239c-a8c3-4e99-b6ab-678168916da5\/\" target=\"_blank\" rel=\"noreferrer noopener\">HijackLoader<\/a>&nbsp; &nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Network Detection Update&nbsp;<\/h3>\n\n\n\n<p>In October, we worked to enrich our database with phishing IOCs, leveraging advanced data analysis within TI Lookup. This effort led to the identification of over<strong> 5,000 malicious domains<\/strong>, which are now detected by the sandbox with corresponding <a href=\"https:\/\/any.run\/cybersecurity-blog\/detection-with-suricata-ids\/\" target=\"_blank\" rel=\"noreferrer noopener\">Suricata rules<\/a>.&nbsp;<\/p>\n\n\n\n<p>We also expanded our catalog of detected phishing kits with the addition of&nbsp;<strong>Mamba2FA<\/strong>, enhancing our overall threat coverage. <\/p>\n\n\n\n<p>Our external threat intelligence this month focused on proactively detecting phishing campaigns by groups like&nbsp;<strong>Storm<\/strong>, allowing us to better track and respond to their evolving tactics.&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Heuristic and Proactive Phishing Detection<\/h3>\n\n\n\n<p>This month, our phishing detection capabilities have been enhanced with advanced heuristics and proactive signatures. Here are some examples of recent detections:&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Heuristic signature detection: <\/strong>PHISHING [ANY.RUN] Domain chain identified as Phishing (challengepoint). <a href=\"https:\/\/app.any.run\/tasks\/3b5387ea-d049-497f-8157-26275d73520a\/\" target=\"_blank\" rel=\"noreferrer noopener\">View analysis session<\/a>&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Statistical analysis detection<\/strong>: Using statistical processing of previously detected phishing patterns, we flagged&nbsp;PHISHING [ANY.RUN] Suspected Phishing domain by CrossDomain (logbook-annul-srt[.]click)&nbsp;as a high-risk domain.&nbsp;<a href=\"https:\/\/app.any.run\/tasks\/2ef9568e-d8a4-4cd8-ba2e-a07176d589ab\/\" target=\"_blank\" rel=\"noreferrer noopener\">View analysis session<\/a>&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>External threat intelligence detection<\/strong>: Through threat intelligence from external sources, we identified&nbsp;PHISHING [ANY.RUN] Suspected AiTM Storm1575 Domain Phishing Infrastructure (eslebrrte[.]com, eslebrrte[.]de), linked to the Storm1575 phishing campaign. <a href=\"https:\/\/app.any.run\/tasks\/38904406-ac92-426e-ba2e-fb03114b01cc\/\" target=\"_blank\" rel=\"noreferrer noopener\">View analysis session<\/a>&nbsp;<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">About ANY.RUN&nbsp;&nbsp;<\/h2>\n\n\n\n<p>ANY.RUN helps more than 500,000 cybersecurity professionals worldwide. Our <a href=\"https:\/\/any.run\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release_notes_oct_24&amp;utm_term=061124&amp;utm_content=linktolanding\" target=\"_blank\" rel=\"noreferrer noopener\">interactive sandbox<\/a> simplifies malware analysis of threats that target both Windows and <a href=\"https:\/\/any.run\/cybersecurity-blog\/linux-malware-analysis-cases\/\" target=\"_blank\" rel=\"noreferrer noopener\">Linux<\/a> systems. Our threat intelligence products, <a href=\"https:\/\/any.run\/cybersecurity-blog\/introducing-any-run-threat-intelligence-lookup\/\" target=\"_blank\" rel=\"noreferrer noopener\">TI Lookup<\/a>, <a href=\"https:\/\/any.run\/cybersecurity-blog\/yara-search\/\" target=\"_blank\" rel=\"noreferrer noopener\">Yara Search<\/a> and <a href=\"https:\/\/any.run\/cybersecurity-blog\/ti-feeds-integration\/\" target=\"_blank\" rel=\"noreferrer noopener\">Feeds<\/a>, help you find <a href=\"https:\/\/any.run\/cybersecurity-blog\/indicators-of-compromise\/\" target=\"_blank\" rel=\"noreferrer noopener\">IOCs<\/a> or files to learn more about the threats and respond to incidents faster.&nbsp;&nbsp;<\/p>\n\n\n\n<p><strong>With ANY.RUN you can:<\/strong>&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Detect malware in seconds<\/li>\n\n\n\n<li>Interact with samples in real time<\/li>\n\n\n\n<li>Save time and money on sandbox setup and maintenance<\/li>\n\n\n\n<li>Record and study all aspects of malware behavior<\/li>\n\n\n\n<li>Collaborate with your team&nbsp;<\/li>\n\n\n\n<li>Scale as you need<\/li>\n<\/ul>\n\n\n\n<p><a href=\"https:\/\/any.run\/demo\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release_notes_oct_24&amp;utm_term=061124&amp;utm_content=linktodemo\" target=\"_blank\" rel=\"noreferrer noopener\">Request free trial of ANY.RUN&#8217;s products \u2192<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Welcome to ANY.RUN&#8216;s monthly updates, where we share our latest achievements and improvements.&nbsp; October has been another productive month here at ANY.RUN, filled with new features to enhance your cybersecurity toolkit. We\u2019ve introduced&nbsp;TI Lookup Notifications&nbsp;for real-time threat updates, rolled out a newly improved&nbsp;Linux sandbox&nbsp;for smoother malware analysis, and added the ability to export&nbsp;STIX reports&nbsp;for seamless [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":7723,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[9],"tags":[57,10],"class_list":["post-9665","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-service-updates","tag-anyrun","tag-cybersecurity"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v20.10 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Release Notes: TI Lookup Notifications, STIX Reports, and More<\/title>\n<meta name=\"description\" content=\"Learn about the latest features introduced by ANY.RUN in October 2024, from TI Lookup Notifications\u00a0to an improved\u00a0Linux malware sandbox.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/any.run\/cybersecurity-blog\/release-notes-october-2024\/\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"ANY.RUN\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\n\t    \"@context\": \"https:\/\/schema.org\",\n\t    \"@graph\": [\n\t        {\n\t            \"@type\": \"Article\",\n\t            \"@id\": \"https:\/\/any.run\/cybersecurity-blog\/release-notes-october-2024\/#article\",\n\t            \"isPartOf\": {\n\t                \"@id\": \"https:\/\/any.run\/cybersecurity-blog\/release-notes-october-2024\/\"\n\t            },\n\t            \"author\": {\n\t                \"name\": \"ANY.RUN\",\n\t                \"@id\": \"https:\/\/any.run\/\"\n\t            },\n\t            \"headline\": \"Release Notes: TI Lookup Notifications, Upgraded Linux Sandbox, STIX Reports, and More\u00a0\",\n\t            \"datePublished\": \"2024-11-06T09:15:03+00:00\",\n\t            \"dateModified\": \"2024-11-12T11:25:51+00:00\",\n\t            \"mainEntityOfPage\": {\n\t                \"@id\": \"https:\/\/any.run\/cybersecurity-blog\/release-notes-october-2024\/\"\n\t            },\n\t            \"wordCount\": 1453,\n\t            \"commentCount\": 0,\n\t            \"publisher\": {\n\t                \"@id\": \"https:\/\/any.run\/\"\n\t            },\n\t            \"keywords\": [\n\t                \"ANYRUN\",\n\t                \"cybersecurity\"\n\t            ],\n\t            \"articleSection\": [\n\t                \"Service Updates\"\n\t            ],\n\t            \"inLanguage\": \"en-US\",\n\t            \"potentialAction\": [\n\t                {\n\t                    \"@type\": \"CommentAction\",\n\t                    \"name\": \"Comment\",\n\t                    \"target\": [\n\t                        \"https:\/\/any.run\/cybersecurity-blog\/release-notes-october-2024\/#respond\"\n\t                    ]\n\t                }\n\t            ]\n\t        },\n\t        {\n\t            \"@type\": \"WebPage\",\n\t            \"@id\": \"https:\/\/any.run\/cybersecurity-blog\/release-notes-october-2024\/\",\n\t            \"url\": \"https:\/\/any.run\/cybersecurity-blog\/release-notes-october-2024\/\",\n\t            \"name\": \"Release Notes: TI Lookup Notifications, STIX Reports, and More\",\n\t            \"isPartOf\": {\n\t                \"@id\": \"https:\/\/any.run\/\"\n\t            },\n\t            \"datePublished\": \"2024-11-06T09:15:03+00:00\",\n\t            \"dateModified\": \"2024-11-12T11:25:51+00:00\",\n\t            \"description\": \"Learn about the latest features introduced by ANY.RUN in October 2024, from TI Lookup Notifications\u00a0to an improved\u00a0Linux malware sandbox.\",\n\t            \"breadcrumb\": {\n\t                \"@id\": \"https:\/\/any.run\/cybersecurity-blog\/release-notes-october-2024\/#breadcrumb\"\n\t            },\n\t            \"inLanguage\": \"en-US\",\n\t            \"potentialAction\": [\n\t                {\n\t                    \"@type\": \"ReadAction\",\n\t                    \"target\": [\n\t                        \"https:\/\/any.run\/cybersecurity-blog\/release-notes-october-2024\/\"\n\t                    ]\n\t                }\n\t            ]\n\t        },\n\t        {\n\t            \"@type\": \"BreadcrumbList\",\n\t            \"@id\": \"https:\/\/any.run\/cybersecurity-blog\/release-notes-october-2024\/#breadcrumb\",\n\t            \"itemListElement\": [\n\t                {\n\t                    \"@type\": \"ListItem\",\n\t                    \"position\": 1,\n\t                    \"name\": \"Home\",\n\t                    \"item\": \"https:\/\/any.run\/cybersecurity-blog\/\"\n\t                },\n\t                {\n\t                    \"@type\": \"ListItem\",\n\t                    \"position\": 2,\n\t                    \"name\": \"Service Updates\",\n\t                    \"item\": \"https:\/\/any.run\/cybersecurity-blog\/category\/service-updates\/\"\n\t                },\n\t                {\n\t                    \"@type\": \"ListItem\",\n\t                    \"position\": 3,\n\t                    \"name\": \"Release Notes: TI Lookup Notifications, Upgraded Linux Sandbox, STIX Reports, and More\u00a0\"\n\t                }\n\t            ]\n\t        },\n\t        {\n\t            \"@type\": \"WebSite\",\n\t            \"@id\": \"https:\/\/any.run\/\",\n\t            \"url\": \"https:\/\/any.run\/\",\n\t            \"name\": \"ANY.RUN&#039;s Cybersecurity Blog\",\n\t            \"description\": \"Cybersecurity Blog covers topics for experienced professionals as well as for those new to it.\",\n\t            \"publisher\": {\n\t                \"@id\": \"https:\/\/any.run\/\"\n\t            },\n\t            \"potentialAction\": [\n\t                {\n\t                    \"@type\": \"SearchAction\",\n\t                    \"target\": {\n\t                        \"@type\": \"EntryPoint\",\n\t                        \"urlTemplate\": \"https:\/\/any.run\/?s={search_term_string}\"\n\t                    },\n\t                    \"query-input\": \"required name=search_term_string\"\n\t                }\n\t            ],\n\t            \"inLanguage\": \"en-US\"\n\t        },\n\t        {\n\t            \"@type\": \"Organization\",\n\t            \"@id\": \"https:\/\/any.run\/\",\n\t            \"name\": \"ANY.RUN\",\n\t            \"url\": \"https:\/\/any.run\/\",\n\t            \"logo\": {\n\t                \"@type\": \"ImageObject\",\n\t                \"inLanguage\": \"en-US\",\n\t                \"@id\": \"https:\/\/any.run\/\",\n\t                \"url\": \"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg\",\n\t                \"contentUrl\": \"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg\",\n\t                \"width\": 1,\n\t                \"height\": 1,\n\t                \"caption\": \"ANY.RUN\"\n\t            },\n\t            \"image\": {\n\t                \"@id\": \"https:\/\/any.run\/\"\n\t            },\n\t            \"sameAs\": [\n\t                \"https:\/\/www.facebook.com\/www.any.run\/\",\n\t                \"https:\/\/twitter.com\/anyrun_app\",\n\t                \"https:\/\/www.linkedin.com\/company\/30692044\",\n\t                \"https:\/\/www.youtube.com\/channel\/UCOgCPho7lzmH7m6fPNlukrQ\"\n\t            ]\n\t        },\n\t        {\n\t            \"@type\": \"Person\",\n\t            \"@id\": \"https:\/\/any.run\/\",\n\t            \"name\": \"ANY.RUN\",\n\t            \"image\": {\n\t                \"@type\": \"ImageObject\",\n\t                \"inLanguage\": \"en-US\",\n\t                \"@id\": \"https:\/\/any.run\/\",\n\t                \"url\": \"https:\/\/secure.gravatar.com\/avatar\/c4ce3a6c672056b4a8cd6b0110782215?s=96&d=mm&r=g\",\n\t                \"contentUrl\": \"https:\/\/secure.gravatar.com\/avatar\/c4ce3a6c672056b4a8cd6b0110782215?s=96&d=mm&r=g\",\n\t                \"caption\": \"ANY.RUN\"\n\t            },\n\t            \"url\": \"https:\/\/any.run\/cybersecurity-blog\/author\/a-bespalova\/\"\n\t        }\n\t    ]\n\t}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Release Notes: TI Lookup Notifications, STIX Reports, and More","description":"Learn about the latest features introduced by ANY.RUN in October 2024, from TI Lookup Notifications\u00a0to an improved\u00a0Linux malware sandbox.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/any.run\/cybersecurity-blog\/release-notes-october-2024\/","twitter_misc":{"Written by":"ANY.RUN","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/any.run\/cybersecurity-blog\/release-notes-october-2024\/#article","isPartOf":{"@id":"https:\/\/any.run\/cybersecurity-blog\/release-notes-october-2024\/"},"author":{"name":"ANY.RUN","@id":"https:\/\/any.run\/"},"headline":"Release Notes: TI Lookup Notifications, Upgraded Linux Sandbox, STIX Reports, and More\u00a0","datePublished":"2024-11-06T09:15:03+00:00","dateModified":"2024-11-12T11:25:51+00:00","mainEntityOfPage":{"@id":"https:\/\/any.run\/cybersecurity-blog\/release-notes-october-2024\/"},"wordCount":1453,"commentCount":0,"publisher":{"@id":"https:\/\/any.run\/"},"keywords":["ANYRUN","cybersecurity"],"articleSection":["Service Updates"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/any.run\/cybersecurity-blog\/release-notes-october-2024\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/any.run\/cybersecurity-blog\/release-notes-october-2024\/","url":"https:\/\/any.run\/cybersecurity-blog\/release-notes-october-2024\/","name":"Release Notes: TI Lookup Notifications, STIX Reports, and More","isPartOf":{"@id":"https:\/\/any.run\/"},"datePublished":"2024-11-06T09:15:03+00:00","dateModified":"2024-11-12T11:25:51+00:00","description":"Learn about the latest features introduced by ANY.RUN in October 2024, from TI Lookup Notifications\u00a0to an improved\u00a0Linux malware sandbox.","breadcrumb":{"@id":"https:\/\/any.run\/cybersecurity-blog\/release-notes-october-2024\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/any.run\/cybersecurity-blog\/release-notes-october-2024\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/any.run\/cybersecurity-blog\/release-notes-october-2024\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/any.run\/cybersecurity-blog\/"},{"@type":"ListItem","position":2,"name":"Service Updates","item":"https:\/\/any.run\/cybersecurity-blog\/category\/service-updates\/"},{"@type":"ListItem","position":3,"name":"Release Notes: TI Lookup Notifications, Upgraded Linux Sandbox, STIX Reports, and More\u00a0"}]},{"@type":"WebSite","@id":"https:\/\/any.run\/","url":"https:\/\/any.run\/","name":"ANY.RUN&#039;s Cybersecurity Blog","description":"Cybersecurity Blog covers topics for experienced professionals as well as for those new to it.","publisher":{"@id":"https:\/\/any.run\/"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/any.run\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/any.run\/","name":"ANY.RUN","url":"https:\/\/any.run\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/any.run\/","url":"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg","contentUrl":"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg","width":1,"height":1,"caption":"ANY.RUN"},"image":{"@id":"https:\/\/any.run\/"},"sameAs":["https:\/\/www.facebook.com\/www.any.run\/","https:\/\/twitter.com\/anyrun_app","https:\/\/www.linkedin.com\/company\/30692044","https:\/\/www.youtube.com\/channel\/UCOgCPho7lzmH7m6fPNlukrQ"]},{"@type":"Person","@id":"https:\/\/any.run\/","name":"ANY.RUN","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/any.run\/","url":"https:\/\/secure.gravatar.com\/avatar\/c4ce3a6c672056b4a8cd6b0110782215?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/c4ce3a6c672056b4a8cd6b0110782215?s=96&d=mm&r=g","caption":"ANY.RUN"},"url":"https:\/\/any.run\/cybersecurity-blog\/author\/a-bespalova\/"}]}},"_links":{"self":[{"href":"\/cybersecurity-blog\/wp-json\/wp\/v2\/posts\/9665"}],"collection":[{"href":"\/cybersecurity-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"\/cybersecurity-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"\/cybersecurity-blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"\/cybersecurity-blog\/wp-json\/wp\/v2\/comments?post=9665"}],"version-history":[{"count":19,"href":"\/cybersecurity-blog\/wp-json\/wp\/v2\/posts\/9665\/revisions"}],"predecessor-version":[{"id":9800,"href":"\/cybersecurity-blog\/wp-json\/wp\/v2\/posts\/9665\/revisions\/9800"}],"wp:featuredmedia":[{"embeddable":true,"href":"\/cybersecurity-blog\/wp-json\/wp\/v2\/media\/7723"}],"wp:attachment":[{"href":"\/cybersecurity-blog\/wp-json\/wp\/v2\/media?parent=9665"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"\/cybersecurity-blog\/wp-json\/wp\/v2\/categories?post=9665"},{"taxonomy":"post_tag","embeddable":true,"href":"\/cybersecurity-blog\/wp-json\/wp\/v2\/tags?post=9665"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}