Vulnerabilities Patched in Qualcomm, Mediatek Chipsets

Chip makers Qualcomm and Mediatek have released patches for many vulnerabilities across their products.

The post Vulnerabilities Patched in Qualcomm, Mediatek Chipsets appeared first on SecurityWeek.

SecurityWeek – ​Read More

Salesforce’s AgentExchange launches with 200+ partners to automate your boring work tasks

Credit: VentureBeat made with Midjourney


Salesforce launches AgentExchange, a new AI marketplace that lets businesses deploy automated AI agents to streamline work, enhance productivity, and tap into the $6 trillion digital labor market.Read More

Security News | VentureBeat – ​Read More

Google Patches Pair of Exploited Vulnerabilities in Android

Android’s March 2025 security update addresses over 40 vulnerabilities, including two actively exploited in the wild.

The post Google Patches Pair of Exploited Vulnerabilities in Android appeared first on SecurityWeek.

SecurityWeek – ​Read More

New Chinese Zhong Stealer Infects Fintech via Customer Support

A new malware threat called Zhong Stealer has surfaced from China, and it’s already slipping into businesses through…

Hackread – Latest Cybersecurity, Tech, AI, Crypto & Hacking News – ​Read More

Release Notes: Threat Intelligence Reports, New Website Design, & Enhanced Detection

Hey, cybersecurity enthusiasts! 

February brought major enhancements to ANY.RUN, improving threat intelligence, detection capabilities, and overall user experience. 

With the launch of Threat Intelligence Reports, security professionals now have access to detailed, expert-driven analyses of cyber threats, malware, and APT activities.

We also introduced a redesigned website, making navigation more intuitive and structured. 

On the detection side, we significantly improved our threat-hunting capabilities, adding 314 new Suricata rules, refining behavior signatures, and expanding our YARA rule database. These updates strengthen real-time threat visibility and detection accuracy, helping analysts respond faster to emerging cyber threats. 

Let’s take a closer look at February’s updates and how they enhance your malware-hunting workflow. 

Product Updates 

Threat Intelligence Reports

In February, ANY.RUN introduced Threat Intelligence Reports in TI Lookup: detailed research on cyber threats, providing security professionals and decision-makers with actionable insights. 

Curated by our experts, these reports support threat monitoring, incident response, R&D, and strategic planning, covering malware, ransomware, phishing campaigns, and APTs.  

Built on real-world threat data, sources include our Interactive Sandbox, TI Lookup, and community-driven malware analyses. 

View sample report on APT41 Attacks    

An example of a recent TI report

How to access TI Reports 

Paid TI Lookup users get full reports, while summaries and select reports are available for free. 

  1. Go to intelligence.any.run
  1. Click the TI Reports icon on the left. 
  1. Select a report from the feed. 

New reports are marked with a “New” badge for quick access. 

Try premium features of ANY.RUN for free 



Get 14-day trial


What’s inside TI Reports? 

Each report provides a detailed threat overview, covering key aspects such as: 

  • Threat actor or malware profile: Origins, objectives, targeted industries, and regions. 
  • TTPs: Methods used by attackers, helping in detection and mitigation. 
  • IOCs, IOBs, IOAs: Critical data for identifying threats in your environment. 
  • YARA and SIGMA rules: Ready-to-use detection rules for security systems. 
  • Sandbox analysis links: Direct access to real-world threat samples in action. 
  • Additional references: Supporting research and external resources for deeper insights. 

New Website Design: A More User-Friendly Experience 

In February, we introduced a redesigned ANY.RUN website, making it more intuitive, structured, and easier to navigate. The new design makes sure that all essential cybersecurity resources and solutions are now better organized and easily accessible. 

The new redesigned webpage of ANY.RUN

Whether you’re exploring threat intelligence, running sandbox analyses, or researching cybersecurity insights, the updated layout enhances usability for both security experts and new users. 

Threat Coverage Updates 

Suricata Rules 

In February, we added 314 new Suricata rules, strengthening our network-based threat detection. Notable updates include: 

  • A Booking.com phishing rule, designed to detect fraudulent activity targeting users. 
  • A rule for Australia Gov phishing attempts, though it covers only partial cases due to dynamic URL changes and regional access restrictions. 

New Behavior Signatures 

This month, we expanded behavior-based detection, adding new mutex findings, threat detections, and suspicious activity signatures. These updates improve the ability to track malware persistence mechanisms and evasive techniques in real-time. 

New Malware & Threat Detections 

Suspicious Activities & Evasion Techniques 

  • Disabling Windows security features: 
  • Firewall 
  • SmartScreen 
  • Task Manager 
  • Command Prompt 
  • Remote Desktop Access 

Additional Mutex Detections 

  • Darkside, Crytox, Xtreme, Funlocker, Redlocker, Roblox, Aida64, Smartsteamemu, Processlasso, Cactus, Phobos 
  • Nitrogen (mutex & detection) 
  • Various software-related mutex detections, including COYOTE mutex, Proxifier, Wireshark, Java, Adguardvpn, Cheatengine, Opera, Electron Js, Adobeinstaller, Hotbar, Quickdriverupdater, And Pcappstore 

New YARA Rule Updates 

In February, we expanded our YARA rule database, enhancing malware detection and classification. The latest rules target a variety of stealers, RATs, ransomware, and loaders, improving detection accuracy for emerging threats. 

  • Spearal 
  • Veaty 
  • Clipog 
  • Cerbfyne 
  • Funklocker 
  • Redlocker 
  • Cloudscout 
  • MillenniumRAT 
  • JasonRAT 
  • Meduza 
  • CelestialRAT 
  • RansomHub 
  • Xorist 
  • Hellcat 
  • HKBot 
  • MiyaRAT 
  • Zhong 
  • DarkTrack 


ANY.RUN cloud interactive sandbox interface

Sandbox for Businesses

Discover all features of the Enterprise plan designed for businesses and large security teams.



About ANY.RUN

ANY.RUN helps more than 500,000 cybersecurity professionals worldwide. Our interactive sandbox simplifies malware analysis of threats that target both Windows and Linux systems. Our threat intelligence products, TI Lookup, YARA Search, and Feeds, help you find IOCs or files to learn more about the threats and respond to incidents faster.

Request free trial of ANY.RUN’s services → 

The post Release Notes: Threat Intelligence Reports, New Website Design, & Enhanced Detection appeared first on ANY.RUN’s Cybersecurity Blog.

ANY.RUN’s Cybersecurity Blog – ​Read More

Over 4,000 ISP IPs Targeted in Brute-Force Attacks to Deploy Info Stealers and Cryptominers

Internet service providers (ISPs) in China and the West Coast of the United States have become the target of a mass exploitation campaign that deploys information stealers and cryptocurrency miners on compromised hosts.
The findings come from the Splunk Threat Research Team, which said the activity also led to the delivery of various binaries that facilitate data exfiltration as well as offer

The Hacker News – ​Read More

Suspected Iranian Hackers Used Compromised Indian Firm’s Email to Target U.A.E. Aviation Sector

Threat hunters are calling attention to a new highly-targeted phishing campaign that singled out “fewer than five” entities in the United Arab Emirates (U.A.E.) to deliver a previously undocumented Golang backdoor dubbed Sosano.
The malicious activity was specifically directed against aviation and satellite communications organizations, according to Proofpoint, which detected it in late October

The Hacker News – ​Read More

Exploitation Long Known for Most of CISA’s Latest KEV Additions

Exploitation has been known for months or years for most of the latest vulnerabilities added by CISA to its KEV catalog.

The post Exploitation Long Known for Most of CISA’s Latest KEV Additions appeared first on SecurityWeek.

SecurityWeek – ​Read More

Cisco, Hitachi, Microsoft, and Progress Flaws Actively Exploited—CISA Sounds Alarm

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Monday added five security flaws impacting software from Cisco, Hitachi Vantara, Microsoft Windows, and Progress WhatsUp Gold to its Known Exploited Vulnerabilities (KEV) catalog, based on evidence of active exploitation.
The list of vulnerabilities is as follows –

CVE-2023-20118 (CVSS score: 6.5) – A command injection

The Hacker News – ​Read More

Google’s March 2025 Android Security Update Fixes Two Actively Exploited Vulnerabilities

Google has released its monthly Android Security Bulletin for March 2025 to address a total of 44 vulnerabilities, including two that it said have come under active exploitation in the wild.
The two high-severity vulnerabilities are listed below –

CVE-2024-43093 – A privilege escalation flaw in the Framework component that could result in unauthorized access to “Android/data,” “Android/obb,”

The Hacker News – ​Read More