What is

What is Global Threat Intelligence? – SOC/DFIR Team Guide

Global threat intelligence (GTI) is crucial for cybersecurity as it offers real-time data on emerging and persistent cyber threats worldwide.…

8 months ago

How ANY.RUN Malware Sandbox Process IOCs for Threat Intelligence Lookup?

The database includes indicators of compromise (IOCs) and relationships between different artifacts observed within an analysis session. In October 2022,…

8 months ago

DarkGPT – A ChatGPT-4 Powered OSINT Tool To Detect Leaked Databases

DarkGPT, your next-level OSINT (Open Source Intelligence) assistant. In this digital era, the ability to sift through vast amounts of…

8 months ago

OpenCTI: OSINT Platform to SOC & MDR Teams for Malware Analysis

ANY.RUN now integrates with OpenCTI, a cyber threat intelligence platform that allows automatic enrichment of OpenCTI observations with malware data…

8 months ago

Combining Threat Intelligence Platforms & Sandboxes for Efficient Security Operations – A DFIR Guide

Organizations have many tools when investigating cyber threats, but two stand out: Threat Intelligence Platforms (TIPs) and sandboxes. Each solution…

8 months ago

How to Create a Sandbox Environment For Malware Analysis – A Complete Guide

In cybersecurity, the battle against malware is critical, akin to handling dangerous pathogens. The importance of secure environments for analyzing…

8 months ago

HackerGPT – A ChatGPT-Powered AI Tool for Ethical Hackers & Cyber Security Community

HackerGPT is a cutting-edge AI tool designed explicitly for the cybersecurity sector, particularly beneficial for individuals involved in ethical hacking,…

9 months ago

PyRIT – A Red Team Tool From Microsoft For Generative AI Systems

In a significant move to bolster the security of generative AI systems, Microsoft has announced the release of an open…

9 months ago

How to Analyse Linux Malware in ANY.RUN

Linux, traditionally viewed as a more secure operating system than Windows, has experienced a notable increase in malware attacks. In…

9 months ago

Why and How to Extract Malware Configurations in a Sandbox

Indicators of Compromise (IOCs) are the fuel that powers our cybersecurity defenses and keeps them effective. The most sought-after source…

9 months ago