https://www.backbox.org/wp-content/uploads/2018/09/website_backbox_text_black.png00adminhttps://www.backbox.org/wp-content/uploads/2018/09/website_backbox_text_black.pngadmin2025-09-16 11:07:002025-09-16 11:07:002 Meta Ray-Bans leaks that have me truly excited for Connect (including a new Oakley model)
https://www.backbox.org/wp-content/uploads/2018/09/website_backbox_text_black.png00adminhttps://www.backbox.org/wp-content/uploads/2018/09/website_backbox_text_black.pngadmin2025-09-16 11:07:002025-09-16 11:07:00ChatGPT’s New Calendar Integration Can Be Abused to Steal Emails
https://www.backbox.org/wp-content/uploads/2018/09/website_backbox_text_black.png00adminhttps://www.backbox.org/wp-content/uploads/2018/09/website_backbox_text_black.pngadmin2025-09-16 10:07:122025-09-16 10:07:12Fraud Prevention Company SEON Raises $80 Million in Series C Funding
The bootstrapped company will invest in an AI-powered unified enterprise platform combining configuration, compliance, patching, and vulnerability management.
https://www.backbox.org/wp-content/uploads/2018/09/website_backbox_text_black.png00adminhttps://www.backbox.org/wp-content/uploads/2018/09/website_backbox_text_black.pngadmin2025-09-16 09:06:472025-09-16 09:06:47Endpoint Security Firm Remedio Raises $65 Million in First Funding Round
https://www.backbox.org/wp-content/uploads/2018/09/website_backbox_text_black.png00adminhttps://www.backbox.org/wp-content/uploads/2018/09/website_backbox_text_black.pngadmin2025-09-16 09:06:472025-09-16 09:06:47Apple Rolls Out iOS 26, macOS Tahoe 26 With Patches for Over 50 Vulnerabilities
https://www.backbox.org/wp-content/uploads/2018/09/website_backbox_text_black.png00adminhttps://www.backbox.org/wp-content/uploads/2018/09/website_backbox_text_black.pngadmin2025-09-16 09:06:462025-09-16 09:06:46This new AI voice trainer can help you learn a new language
Swamped by incident alerts, Security Operations Centers (SOCs) struggle to quickly identify and prioritize high-risk attacks, leaving critical infrastructure exposed to ransomware and data theft. ANY.RUN’s integration with Palo Alto Networks Cortex XSOAR solves this by automating proactive sandbox analysis and threat intelligence correlation to beat alert fatigue, boost detection rates, and accelerate security workflows.
Security Operations Centers (SOCs) using Palo Alto Networks Cortex XSOAR can now seamlessly integrate ANY.RUN’s products into their workflows.
The ANY.RUN content pack includes connectors for the Interactive Sandbox, Threat Intelligence Lookup, and Threat Intelligence Feeds, empowering SOCs to streamline alert triage, broaden threat detection, and improve identification of elusive malware.
Interactive Sandbox in Palo Alto Networks Cortex XSOAR
File analysis with ANY.RUN’s Interactive Sandbox inside Cortex XSOAR
ANY.RUN’s Interactive Sandbox is a cloud-based solution offering SOC teams immediate, real-time access to Windows, Linux, and Android virtual environments for analyzing suspicious files and URLs.
With the ANY.RUN’s Interactive Sandbox in Cortex XSOAR, users can:
Submit a file, remote file, or URL for analysis across Windows, Ubuntu, or Android operating systems.
Retrieve detailed report details and IOCs for a specific analysis in JSON, HTML.
Download file submission samples and analysis network traffic dumps for deeper incident response insights.
Benefits of the Interactive Sandbox in Palo Alto Networks Cortex XSOAR
Higher detection rate: Automated Interactivity ensures even evasive attacks are fully detonated and identified.
Faster incident resolution: Quick insights accelerate response to critical threats.
Reduced alert fatigue: Focus only on severe incidents, while the sandbox identifies.
Threat Intelligence Feeds in Palo Alto Networks Cortex XSOAR
A malicious indicator from TI Feeds displayed inside Cortex XSOAR
ANY.RUN’s Threat Intelligence Feeds empower SOCs and MSSPs to strengthen security with high-fidelity, actionable IOCs from real-time sandbox analysis. New indicators are continuously added to TI Feeds from sandbox investigations across 15,000+ organizations after filtering. This means you get a curated stream of malicious IPs, domains, and URLs that have been active for no more than several hours and can still be used to detect attacks that are happening right now.
With ANY.RUN’s Threat Intelligence Feeds in Cortex XSOAR, users can:
Correlate feed data with incoming alerts to identify high-risk threats.
Use indicators to create new detection rules for proactive threat mitigation.
Automate threat hunting and response workflows using XSOAR playbooks.
Benefits of Threat Intelligence Feeds in Palo Alto Networks Cortex XSOAR:
Expanded threat coverage: Real-time IOCs from 15,000+ organizations catch diverse threats.
Enhanced threat prioritization: Correlating alerts with IOCs highlights critical risks.
Proactive attack prevention: Fresh intelligence enables early threat detection.
Threat Intelligence Lookup in Palo Alto Networks Cortex XSOAR
TI Lookup delivers instant context on over 40 types of indicators of malicious activity
ANY.RUN’s Threat Intelligence Lookup offers a searchable database of up-to-date IOCs, IOBs, and IOAs, drawn from real-time sandbox analysis of active malware and phishing attacks across 15,000+ organizations (Learn more about TI Lookup’s capabilities). This ensures fresh, actionable threat data is available swiftly post-attack.
Enhanced threat hunting: Targeted searches help identify hidden threats effectively.
About ANY.RUN
Trusted by over 500,000 cybersecurity professionals and 15,000+ organizations in finance, healthcare, manufacturing, and other critical industries, ANY.RUN helps security teams investigate threats faster and with greater accuracy.
Our Interactive Sandbox accelerates incident response by allowing you to analyze suspicious files in real time, watch behavior as it unfolds, and make confident, well-informed decisions.
A team of academics from ETH Zürich and Google has discovered a new variant of a RowHammer attack targeting Double Data Rate 5 (DDR5) memory chips from South Korean semiconductor vendor SK Hynix.
The RowHammer attack variant, codenamed Phoenix (CVE-2025-6202, CVSS score: 7.1), is capable of bypassing sophisticated protection mechanisms put in place to resist the attack.
“We have proven that
If you’ve encountered a problem with a Windows upgrade, you know how maddeningly unhelpful Windows error messages can be. These are my favorite troubleshooting tricks.
https://www.backbox.org/wp-content/uploads/2018/09/website_backbox_text_black.png00adminhttps://www.backbox.org/wp-content/uploads/2018/09/website_backbox_text_black.pngadmin2025-09-16 07:06:392025-09-16 07:06:39Windows 11 upgrade failed? These are my 4 most powerful troubleshooting secrets
Cybersecurity researchers have flagged a fresh software supply chain attack targeting the npm registry that has affected more than 40 packages that belong to multiple maintainers.
“The compromised versions include a function (NpmModule.updatePackage) that downloads a package tarball, modifies package.json, injects a local script (bundle.js), repacks the archive, and republishes it, enabling
https://www.backbox.org/wp-content/uploads/2018/09/website_backbox_text_black.png00adminhttps://www.backbox.org/wp-content/uploads/2018/09/website_backbox_text_black.pngadmin2025-09-16 06:07:122025-09-16 06:07:1240 npm Packages Compromised in Supply Chain Attack Using bundle.js to Steal Credentials