Chinese Spies Lurked in Networks for 393 Days, Hunted for Zero-Day Intel

Google’s Threat Intelligence Group and Mandiant have shared findings on a recent BrickStorm campaign linked to UNC5221.

The post Chinese Spies Lurked in Networks for 393 Days, Hunted for Zero-Day Intel appeared first on SecurityWeek.

SecurityWeek – ​Read More

CSA Unveils SaaS Security Controls Framework to Ease Complexity

New framework from the Cloud Security Alliance helps SaaS customers navigate the shared responsibility model with confidence.

The post CSA Unveils SaaS Security Controls Framework to Ease Complexity appeared first on SecurityWeek.

SecurityWeek – ​Read More

Best website builders of 2025: I tested the top tools and found your perfect fit

I tested the best subscription-based website builders, which help you create your site with features like AI site building, 24/7 customer support, and SSL certificates.

Latest news – ​Read More

Volvo Group Employee Data Stolen in Ransomware Attack

The Miljödata data breach has impacted numerous organizations, education institutions, and Swedish municipalities.

The post Volvo Group Employee Data Stolen in Ransomware Attack appeared first on SecurityWeek.

SecurityWeek – ​Read More

This bizarre tool I own actually solves a real problem (and it’s only $7 on Amazon)

This tiny device was made to inspect ear canals with its HD camera – but I’ve found it works great as a pocket-sized inspection tool for just about anything.

Latest news – ​Read More

Shopping this October Prime Day? Here’s how to use Amazon’s tools to find the best deals

Amazon’s Prime Big Deal Days sale starts Oct. 7. Here are the tools you already have as a Prime member to make early holiday shopping a breeze.

Latest news – ​Read More

I love this Apple Intelligence feature on iPhone 17 Pro – and you can use it on older models, too

It’s more reliable than the competition and saves me a lot of time.

Latest news – ​Read More

ANY.RUN Sandbox & Microsoft Sentinel: Less Noise, More Speed for Your SOC

SOC teams may waste hours daily manually enriching alerts and switching between tools, delaying response. ANY.RUN’s Microsoft Sentinel Connector fixes this by introducing fast, accurate, and interactive sandbox analysis into Sentinel’s workflow, so alerts get auto-processed, enriched with IOCs, and prioritized in seconds.  

Here’s how you can speed up response times, filter out false positives, and focus on real threats without leaving your existing workspace. 

Maximize Your SOC’s Efficiency 

ANY.RUN’s sandbox helps SOCs process alerts by delivering fast, accurate verdicts

ANY.RUN’s Interactive Sandbox is a cloud-based solution offering security teams immediate, real-time access to Windows, Linux, and Android virtual environments for investigating suspicious files and URLs. 

With the Microsoft Sentinel connector, SOCs and MSSPs can automate triage and enrich alerts with actionable verdicts and IOCs to: 

  • Cut MTTR by up to 21 minutes per incident by eliminating manual steps and speeding up analysis. 
  • Boost threat detection by up to 36% thanks to ANY.RUN’s powerful capabilities to catch threats missed by standard security tools. 
  • Increase team productivity by up to 3x through automation to free up analysts for high-value tasks. 
  • Reduce alert overload, filtering false positives and prioritizing high-risk incidents. 
  • Detect and respond to attacks early with clear, actionable threat insights. 
  • Save resources and optimize costs by using your existing MS Sentinel setup without extra infrastructure expenses. 

Set up the connector → 

To expand threat coverage further, security teams can also utilize ANY.RUN’s Threat Intelligence Feeds connector for Microsoft Sentinel.  

It supplies a continuous stream of fresh, actionable IOCs extracted from attack data across 15K SOCs around the world straight to your Microsoft Sentinel environment, helping you proactively detect the latest malware active right now. 

Reduce MTTR and beat alert fatigue in your SOC
Request a quote or trial for ANY.RUN’s Sandbox 



Contact us


How ANY.RUN’s Sandbox Improves Microsoft Sentinel Workflows

SOCs can integrate ANY.RUN’s sandbox analysis into their workflows through playbooks

With the connector, SOC teams can analyze files and links right from Sentinel alerts: either with one click or automatically. You’ll instantly get the verdict, risk score, IOCs, and a link to the full analysis, while Sentinel’s threat database updates automatically.  

All analyses via the connector are launched in the Automated Interactivity mode. This means the sandbox will automatically perform the investigation, including by clicking links, opening files, and launching payloads on its own to ensure full attack detonation. 

As a result, security teams can: 

  • Automate alert enrichment by getting verdicts and IOCs to assess incidents quickly. 
  • Speed up and simplify triage with one-click analyses of files/attachments/links without the need for manual uploads or switching tools. 
  • Prioritize threats automatically by checking incidents’ severity for faster decision-making. 
  • Extract IOCs effortlessly, pulling IPs, domains, and hashes into Sentinel’s Threat Intelligence. 
  • Respond to incidents faster thanks to ready-made analysis results and reports enabling quicker containment and remediation. 

How to Set Up Malware Sandbox Connector for Microsoft Sentinel 

Follow the official instruction to connect ANY.RUN’s Interactive Sandbox with your Microsoft Sentinel workspace.  

Please note that you need an API Key for it to work. To receive your key, please reach out to your account manager or request a demo access as part of the 14-day trial

About ANY.RUN   

Trusted by over 500,000 cybersecurity professionals and 15,000+ organizations in finance, healthcare, manufacturing, and other critical industries, ANY.RUN helps security teams investigate threats faster and with greater accuracy.   

Our Interactive Sandbox accelerates incident response by allowing you to analyze suspicious files in real time, watch behavior as it unfolds, and make confident, well-informed decisions.   

Our Threat Intelligence Lookup and Threat Intelligence Feeds strengthen detection by providing the context your team needs to anticipate and stop today’s most advanced attacks.   

Ready to see the difference?  

Start your 14-day trial of ANY.RUN today →     

The post ANY.RUN Sandbox & Microsoft Sentinel: Less Noise, More Speed for Your SOC appeared first on ANY.RUN’s Cybersecurity Blog.

ANY.RUN’s Cybersecurity Blog – ​Read More

Gcore Radar Report Reveals 41% Surge in DDoS Attack Volumes

Luxembourg, Luxembourg, 25th September 2025, CyberNewsWire

Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto – ​Read More

The surprising ways AI helps strong dev teams and hurts weak ones, according to Google

AI promises productivity, but without the right foundations, it can amplify chaos. The 2025 DORA report reveals seven practices that separate high-performing teams from struggling ones.

Latest news – ​Read More