Service Updates Free. Powerful. Actionable. Make Smarter Security Decisions with Live Attack Data July 16, 2025 2464 views 8 min read
Cybersecurity Lifehacks How to Spot Registry Abuse by Malware: Examples in ANY.RUN Sandbox June 24, 2025 3549 views 9 min read
Malware Analysis Cyber Attacks on Government Agencies: Detect and Investigate with ANY.RUN for Fast Response June 4, 2025 3410 views 9 min read
Malware Analysis OtterCookie: Analysis of Lazarus Group Malware Targeting Finance and Tech Professionals June 3, 2025 9611 views 10 min read
Malware Analysis How MSSPs Can Analyze and Investigate Phishing Attacks with ANY.RUN May 28, 2025 3285 views 7 min read
Instructions on ANY.RUN How to Analyze Node.js, Python, Android, and Linux Malware with ANY.RUN May 27, 2025 11471 views 11 min read
Malware Analysis How Adversary Telegram Bots Help to Reveal Threats: Case Study May 20, 2025 15617 views 15 min read
Malware Analysis Evolution of Tycoon 2FA Defense Evasion Mechanisms: Analysis and Timeline May 13, 2025 6060 views 18 min read
Malware Analysis Mamona: Technical Analysis of a New Ransomware Strain May 6, 2025 7121 views 10 min read
Malware Analysis Pentagon Stealer: Go and Python Malware with Crypto Theft Capabilities April 29, 2025 20143 views 13 min read
Malware Analysis PE32 Ransomware: A New Telegram-Based Threat on the Rise April 22, 2025 20276 views 9 min read
Cybersecurity Lifehacks How Indicators of Compromise, Attack, and Behavior Help Spot and Stop Cyber Threats April 16, 2025 2111 views 8 min read