New RansomHub Attack Uses TDSSKiller and LaZagne, Disables EDR

The RansomHub ransomware gang has been found using Kaspersky’s TDSSKiller tool to disable EDR software on target systems, allowing for credential harvesting with LaZagne.

Cyware News – Latest Cyber News – ​Read More

Apple Vision Pro’s Eye Tracking Exposed What People Type

The Vision Pro uses 3D avatars on calls and for streaming. These researchers used eye tracking to work out the passwords and PINs people typed with their avatars.

Security Latest – ​Read More

Hackers Proxyjack & Cryptomine Selenium Grid Servers

A vendor honeypot caught two attacks intended to leverage the tens of thousands of exposed Selenium Grid Web app testing servers.

darkreading – ​Read More

Microsoft Discloses Four Zero-Days in September Update

Microsoft recently revealed four zero-day vulnerabilities in its September update, part of the Patch Tuesday release containing 79 vulnerabilities, making it the fourth-largest release of the year.

Cyware News – Latest Cyber News – ​Read More

Exploiting CI/CD Pipelines for Fun and Profit

On September 8, 2024, a significant exploit chain was discovered, starting from a publicly exposed . git directory, leading to a full server takeover. The vulnerabilities stem from websites exposing their . git folders.

Cyware News – Latest Cyber News – ​Read More

Healthcare Provider to Pay $65M Settlement Following Ransomware Attack

Lehigh Valley Health Network has agreed to pay a $65 million settlement in a class-action suit filed over a 2023 data breach.

The post Healthcare Provider to Pay $65M Settlement Following Ransomware Attack appeared first on SecurityWeek.

SecurityWeek – ​Read More

ToneShell Backdoor Targets IISS Defence Summit Attendees in Latest Espionage Campaign

The ToneShell backdoor, attributed to the Mustang Panda cyber espionage group, has resurfaced in a new attack targeting attendees of the 2024 IISS Defence Summit in Prague.

Cyware News – Latest Cyber News – ​Read More

ANY.RUN Now Integrates with Splunk!

We have some thrilling news to share with you today. Our team at ANY.RUN is happy to announce the launch of our new integration with Splunk!

How this integration benefits you 

Official page of ANY.RUN’s connector for Splunk

If you’re a Splunk user, you can now leverage ANY.RUN’s Interactive Sandbox and Threat Intelligence Lookup directly from your Splunk SOAR environment.  

This means that you can analyze potentially malicious files and URLs in the sandbox and enrich your investigations with threat data from TI Lookup without leaving the familiar Splunk interface.  

Our main goal with this integration is to give you more options and help you make the most out of ANY.RUN while working with familiar systems.  

The integration supports a wide range of actions, from simple reputation checks to full detonation and analysis of suspicious objects.  

Integrate ANY.RUN solutions in your organization 



Contact Sales


Key Features 

Comprehensive Threat Intelligence 

The integration allows analysts to query ANY.RUN’s threat intelligence database directly from Splunk SOAR. 

Use the get intelligence action to query TI Lookup’s database

Automated Malware Analysis 

One of the most powerful features of this integration is the ability to automatically detonate files and URLs in ANY.RUN’s sandbox.  

This process can be triggered as part of a Splunk SOAR playbook, allowing for analysis of attachments in phishing emails or suspicious downloads detected by network monitors. You can also access any analysis session you launch in the sandbox to perform manual actions or gain a deeper understanding of the threat.

You can perform file analysis, collect IOCs, get IP reputation, and more

Detailed Reporting and IOC Extraction 

The ‘get report’ action retrieves key analysis details, including the verdict on the sample’s threat level. You can also see the rest of the analysis results by navigating to the corresponding part of the interface.

The interface lets you quickly see the verdict on the sample

Advanced Threat Hunting 

If you have ANY.RUN’s TI License, you can use the ‘get intelligence’ action to perform complex queries against ANY.RUN’s threat intelligence database. 

Threat Intelligence Lookup lets you use dozens of search parameters

Search for specific file hashes, IP addresses, domains, or even MITRE ATT&CK techniques you uncover in previous analyses.

Real-World Application 

Consider a scenario where a Splunk SOAR playbook is triggered by a potential phishing email. 

The playbook could automatically extract any URLs and attachments from the email, then use the ‘url reputation’ action to check if the URLs have been previously analyzed by ANY.RUN. 

For new or suspicious URLs, the playbook could use the ‘detonate url’ action to analyze them in a sandbox environment. 

Similarly, for attachments, the ‘detonate file’ action could be used to safely execute and analyze them. 

The playbook could then retrieve detailed reports and IOCs using the ‘get report’ and ‘get iocs’ actions. 

Finally, it could use the extracted IOCs to automatically update firewall rules, trigger endpoint scans, or create new detection rules in the SIEM. 

Test all features of ANY.RUN
See how it can benefit your team 



Get FREE trial


How to Set it Up 

To leverage this new integration, users will need a Splunk SOAR environment and an ANY.RUN account with API access. Preferably, a ‘Hunter’ or ‘Enterprise’ subscription is recommended for full feature access. 

Splunk connector details

The setup process is straightforward: 

Configure a new ANY.RUN asset in Splunk SOAR.

Provide the ANY.RUN base URL (typically https://api.any.run).

Enter the API key from your ANY.RUN profile page.

Set a default timeout for API requests.

The connector is easy to set up

Once configured, the ANY.RUN actions will be available for use in Splunk SOAR playbooks and for manual invocation by analysts. 

About ANY.RUN  

ANY.RUN helps more than 400,000 cybersecurity professionals worldwide. Our interactive sandbox simplifies malware analysis of threats that target both Windows and Linux systems. Our threat intelligence products, TI Lookup, Yara Search and Feeds, help you find IOCs or files to learn more about the threats and respond to incidents faster.  

With ANY.RUN you can: 

Detect malware in seconds

Interact with samples in real time

Save time and money on sandbox setup and maintenance

Record and study all aspects of malware behavior

Collaborate with your team 

Scale as you need

Request free trial → 

The post ANY.RUN Now Integrates with Splunk! appeared first on ANY.RUN’s Cybersecurity Blog.

ANY.RUN’s Cybersecurity Blog – ​Read More

Amateurish ‘CosmicBeetle’ Ransomware Stings SMBs in Turkey

With an immature codebase and a “rather chaotic encryption scheme” prone to failure, the group targets small businesses with custom malware.

darkreading – ​Read More

WordPress Mandates Two-Factor Authentication for Plugin and Theme Developers

WordPress.org has announced a new account security measure that will require accounts with capabilities to update plugins and themes to activate two-factor authentication (2FA) mandatorily.
The enforcement is expected to come into effect starting October 1, 2024.
“Accounts with commit access can push updates and changes to plugins and themes used by millions of WordPress sites worldwide,” the

The Hacker News – ​Read More