Cybersecurity by Design: When Humans Meet Technology
If security tools are challenging to use, people will look for workarounds to get around the restrictions.
darkreading – Read More
If security tools are challenging to use, people will look for workarounds to get around the restrictions.
darkreading – Read More
Atlassian and Cisco have released patches for multiple high-severity vulnerabilities, including remote code execution bugs.
The post Vulnerabilities Patched in Atlassian, Cisco Products appeared first on SecurityWeek.
SecurityWeek – Read More
While the Security Posture Management buzz is real, its long-term viability depends on whether it can deliver measurable outcomes without adding more complexity.
The post Demystifying Security Posture Management appeared first on SecurityWeek.
SecurityWeek – Read More
The widespread use of AI, particularly generative AI, in modern businesses creates new network security risks for complex enterprise workloads across various locations.
Security | TechRepublic – Read More
Our collective voices and one community will provide the intelligence we need to safeguard our businesses in today’s modern digital environment.
The post Why ‘One Community’ Resonates in Cybersecurity appeared first on SecurityWeek.
SecurityWeek – Read More
Making ANY.RUN’s products better for the benefit of businesses, organizations, and SOC teams is our top priority. To get maximum value out of our solutions, we provide them with API, a tool enabling users to integrate our services into their security infrastructure. And now, to make this process even smoother, we introduce a software development kit (SDK).
With it, it’s even easier to make ANY.RUN a part of your security system. Data provided by our solutions will help you establish a safer infrastructure and improve the defense strategy of your company.
Learn about ANY.RUN’s SDK features, advantages, and use cases below.
An SDK is a tool that helps increase the efficiency of your workflow through integration and automation. It simplifies day-to-day tasks for cybersecurity specialists at companies and organizations. This is especially relevant for small security teams who could benefit from automation.
As a result of making ANY.RUN’s products a part of your security infrastructure via an SDK, you can:
Our SDK simplifies integration of ANY.RUN’s products into your infrastructure. You can use it for enhanced flexibility, accelerated workflow, and automation of daily tasks.
Tailor the service to the needs of your business with our software development kit by making ANY.RUN’s solutions a part of your system, be that SIEM, SOAR, or XDR.
The SDK is available for users with the Hunter plan subscription, as well as with the Enterprise plan for teams.
You can use ANY.RUN’s SDK with the entire range of our products. It makes it possible to automatically:
We make sure that the software development kit always complies with the current API version and covers all of its functions, enabling you to always stay on top of things.
ANY.RUN’s software development kit is based on Python, the most popular programming language for malware analysts. It includes documentation, libraries, and code samples for you to explore. For instructions on how to install and use it, see:
We welcome contributions from other developers. You can report bugs and suggest enhancements that would be beneficial for your company, and we’ll be happy to review them, resolve the issues, and make adjustments. For more info on how to contribute, see our guide.
ANY.RUN’s TI Feeds provide large amounts of data on IOCs. To process all of this data efficiently, while keeping RAM load low, you can use the SDK. This will help you set up automated download of feeds in chunks, rather than in one go.
import os
from anyrun.connectors import FeedsConnector
from anyrun.iterators import FeedsIterator
def main():
with FeedsConnector(api_key) as connector:
for feed in FeedsIterator.stix(connector, period='week', chunk_size=5):
print(feed)
if __name__ == '__main__':
api_key = os.getenv('ANY_RUN_FEEDS_API_KEY')
main()
Instead of manually submitting URLs and downloading analysis summaries in ANY.RUN’s Interactive Sandbox, configure the SDK to automate these processes.
Code to automate URL submission.
Code to automate analysis summary download.
YARA Search in TI Lookup allows you to scan our threat intelligence database to find files that match your descriptions. With the SDK, you can receive search results automatically using just one command:
import os
from pprint import pprint
from anyrun.connectors import YaraLookupConnector
def load_yara_rule() -> str:
with open('yara_lookup_rule_sample.txt', 'r') as file:
return file.read()
def main():
with YaraLookupConnector(api_key) as connector:
lookup_result = connector.get_yara(load_yara_rule(), stix=True)
pprint(lookup_result)
if __name__ == '__main__':
api_key = os.getenv('ANY_RUN_Lookup_API_KEY')
main()
You can use the SDK to connect to any service synchronously or asynchronously. Both methods include the same parameters and functions. For example, in TI Lookup you can switch between them with these code samples:
Request a trial period for your SOC team and explore ANY.RUN’s services with new possibilities brought by the SDK.
ANY.RUN’s services are used by over 500,000 cybersecurity professionals worldwide, including SOC teams at over 15,000 companies. ANY.RUN’s Interactive Sandbox helps businesses ensure fast and accurate analysis of threats targeting Windows, Linux, and Android systems, while the threat intelligence products TI Lookup and TI Feeds enable organizations to enrich their knowledge on active and emerging cyber attacks.
The post Seamlessly Integrate ANY.RUN’s Services into Your Infrastructure via SDK appeared first on ANY.RUN’s Cybersecurity Blog.
ANY.RUN’s Cybersecurity Blog – Read More
Massive Blue is helping cops deploy AI-powered social media bots to talk to people they suspect are anything from violent sex criminals all the way to vaguely defined “protesters.”
Security Latest – Read More
The Chinese state-sponsored group Mustang Panda has used new and updated malicious tools in a recent attack.
The post Chinese APT Mustang Panda Updates, Expands Arsenal appeared first on SecurityWeek.
SecurityWeek – Read More
CISA is making recommendations for organizations and users in light of the recent Oracle legacy cloud environment hack.
The post CISA Issues Guidance After Oracle Cloud Hack appeared first on SecurityWeek.
SecurityWeek – Read More
A critical security vulnerability has been disclosed in the Erlang/Open Telecom Platform (OTP) SSH implementation that could permit an attacker to execute arbitrary code sans any authentication under certain conditions.
The vulnerability, tracked as CVE-2025-32433, has been given the maximum CVSS score of 10.0.
“The vulnerability allows an attacker with network access to an Erlang/OTP SSH
The Hacker News – Read More