DUBAI, DUBAI, UNITED ARAB EMIRATES, January 2, 2025 /EINPresswire.com/ -- As 2024 comes to an end, ANY.RUN announces its latest updates designed to empower cybersecurity professionals with smarter tools and more efficient workflows. This December, the company introduced game-changing product features and expanded threat detection capabilities, ensuring users are equipped to handle evolving cyber threats.
๐๐ซ๐จ๐๐ฎ๐๐ญ ๐๐ฉ๐๐๐ญ๐๐ฌ: ๐๐ฆ๐๐ซ๐ญ๐๐ซ ๐๐๐๐ซ๐๐ก๐๐ฌ ๐๐ง๐
๐๐ฆ๐ฉ๐ซ๐จ๐ฏ๐๐ ๐๐จ๐ฅ๐ฅ๐๐๐จ๐ซ๐๐ญ๐ข๐จ๐ง๐๐ฑ๐๐ฎ๐ป๐ฐ๐ฒ๐ฑ ๐๐ต๐ฟ๐ฒ๐ฎ๐ ๐ถ๐ป๐๐ฒ๐น๐น๐ถ๐ด๐ฒ๐ป๐ฐ๐ฒ ๐๐ฒ๐ฎ๐ฟ๐ฐ๐ต๐ฒ๐: ANY.RUN’s TI Lookup now supports new operators and wildcards, such as OR, NOT, and parentheses, enabling more precise and efficient identification of cyber threat attack.
๐ ๐๐ฆ๐ฃ ๐ถ๐ป๐๐ฒ๐ด๐ฟ๐ฎ๐๐ถ๐ผ๐ป: ANY.RUN has introduced a MISP (Malware Information Sharing Platform) instance, offering real-time access to Indicators of Compromise (IOCs) and integration with SIEM and XDR tools.
๐ ๐๐น๐๐ถ-๐ฎ๐ฑ๐บ๐ถ๐ป ๐๐๐ฝ๐ฝ๐ผ๐ฟ๐: The updated Teamwork feature inside ANY.RUN’s malware sandbox allows organizations to assign multiple admin roles, simplifying license management and improving team coordination across time zones.
๐๐ก๐ซ๐๐๐ญ ๐๐จ๐ฏ๐๐ซ๐๐ ๐ ๐๐ฉ๐๐๐ญ๐: ๐๐ฑ๐ฉ๐๐ง๐๐๐ ๐๐๐ญ๐๐๐ญ๐ข๐จ๐ง ๐๐ง๐ ๐๐๐ฏ๐๐ง๐๐๐ ๐๐ฎ๐ฅ๐๐ฌ
ANY.RUN has enhanced its threat detection capabilities, ensuring users stay ahead of cybercriminals:
· ๐ฑ๐ด ๐ป๐ฒ๐ ๐บ๐ฎ๐น๐๐ฎ๐ฟ๐ฒ ๐๐ถ๐ด๐ป๐ฎ๐๐๐ฟ๐ฒ๐ added, targeting families like Trickbot, Vidar, and Lumma.
· ๐ฑ,๐ญ๐ฑ๐ต ๐ฆ๐๐ฟ๐ถ๐ฐ๐ฎ๐๐ฎ ๐ฟ๐๐น๐ฒ๐ implemented for phishing kits and advanced threats.
· ๐ก๐ฒ๐ ๐ฌ๐๐ฅ๐ ๐ฟ๐๐น๐ฒ๐ for precise threat detection, including Fog Ransom and Dusttrap.
· ๐ ๐ฎ๐ฐ๐ต๐ถ๐ป๐ฒ ๐น๐ฒ๐ฎ๐ฟ๐ป๐ถ๐ป๐ด ๐ฒ๐ป๐ต๐ฎ๐ป๐ฐ๐ฒ๐บ๐ฒ๐ป๐๐ improving malware interaction simulations.
For more details on these updates, visit ANY.RUN’s blog.
๐๐๐จ๐ฎ๐ญ ๐๐๐.๐๐๐
ANY.RUN is a leading interactive malware analysis platform trusted by over 500,000 cybersecurity professionals worldwide. By offering real-time behavioral analysis and advanced threat intelligence tools, ANY.RUN helps organizations detect, analyze, and respond to cyber threats faster and more effectively.
No comments:
Post a Comment