This glorious-looking Linux distro left me awestruck – see what it’s all about

The developers got everything right with this custom desktop: Arch-based StratOS with Hyprland is about as cool as they come.

Latest news – ​Read More

Hackers Targeting Cisco Unified CM Zero-Day 

Cisco has released patches for CVE-2026-20045, a critical vulnerability that can be exploited for unauthenticated remote code execution.

The post Hackers Targeting Cisco Unified CM Zero-Day  appeared first on SecurityWeek.

SecurityWeek – ​Read More

ANY.RUN Sandbox & MISP Integration: Confirm Alerts Faster, Stop Incidents Early 

Most SOC teams are overloaded with routine work. Tier 1 & 2 analysts spend too much time validating alerts, moving samples between tools, and chasing missing context. When integrations are weak, investigations slow down, MTTR grows, and SLAs suffer delays. That directly increases operational risk and cost for the business.  

ANY.RUN has already helped teams close part of this gap with continuous, high-quality Threat Intelligence Feeds. Now, with the ANY.RUN Sandbox integration for MISP, analysts can go further: enrich alerts with real execution behavior, speed up triage, and use actionable evidence to stop incidents before they have a chance to escalate.

ANY.RUN x MISP: Boost Your Triage & Response 

With this integration, analysts can send suspicious files and URLs from MISP straight into the ANY.RUN Sandbox. The integration is deployed through native MISP modules. There is no need to export samples or switch tools. Everything happens inside the analyst’s usual workspace. 

MISP “Phishing attempt” event enriched with ANY.RUN Sandbox and phishing-related tags 

Integrate the modules using these links:  

The analysis uses Automated Interactivity, which means the sandbox behaves like a real user. It clicks, opens files, and waits when needed. This matters because many modern threats stay quiet until they see user activity.  

As a result, the sandbox reveals evasive malware that most detection systems miss, giving the SOC earlier and clearer signals.  

After execution, the results are automatically returned to MISP, including the verdict, related IOCs, a link to the interactive analysis session, an HTML report, and mapped MITRE ATT&CK techniques and tactics. 

MITRE ATT&CK technique expanded inside MISP
MITRE ATT&CK technique (T1082 – System Information Discovery) expanded inside MISP, displaying its description and related metadata 

Here’s what your SOC can do with the integration: 

  • Catch evasive threats earlier by triggering delayed or user-driven malware behavior that bypasses traditional detection. 
  • Validate alerts using real execution evidence instead of relying on static indicators. 
  • Work faster by running analysis and reviewing results without leaving MISP. 
  • Make confident escalation or closure decisions backed by real behavioral evidence. 

Add behavior-based evidence to your MISP

Cut triage time and reduce noise



Reach out for details 


Benefits for Your SOC and Business 

For your organization, this integration means: 

  • Lower incident costs: Shorter investigations reduce operational effort per case. 
  • Reduced MTTR: Faster response limits business impact. 
  • Stronger SLA performanceHelp MSSPs meet response time and quality commitments. 
  • No extra headcount: Scale SOC performance without growing the team. 
  • Zero integration costs: No need for custom development if MISP is already in use. 
Enriched MISP event attributes, including the ANY.RUN verdict, report, & IOC 

For MSSPs, the integration helps meet customer SLA requirements by reducing response times, increasing analysis quality, and improving the overall value of managed security services without increasing operational costs. 

Expand Threat Coverage in MISP with ANY.RUN TI Feeds 

Sandbox analysis helps with individual investigations, while ANY.RUN’s Threat Intelligence Feeds help the SOC stay ahead at scale.

TI Feeds contribute to your company’s proactive defense and help you catch attacks early

ANY.RUN’s Threat Intelligence Feeds continuously deliver verified malicious network IOCs extracted from real attacks observed across more than 15,000 organizations. Indicators come directly from live sandbox executions and are delivered in STIX/TAXII format, ready for use in MISP, SIEM, or SOAR platforms. 

Learn more about TI Feeds integration with MISP

  • Early detectionNew IOCs appear as soon as they are seen in real attacks. 
  • Expanded coverage: 99 percent unique indicators expose threats traditional feeds miss. 
  • Reduced false positives: Only confirmed malicious data reaches analysts. 
  • Better correlation: Shared attributes help link incidents and campaigns faster. 
  • Lower analyst workload: Continuous enrichment removes manual lookup and curation. 

Improve early detection at scale

Get fresh IOCs from over 15k+ orgs



Contact us 


Conclusion 

The ANY.RUN Sandbox integration turns MISP into a practical investigation tool, not just an IOC repository. Analysts get real behavior, faster verdicts, and better context without changing how they work. TI Feeds add continuous visibility into active attacker infrastructure. Together, these capabilities reduce MTTR, lower analyst workload, and help protect the business more effectively. 

Discover all ANY.RUN integrations and simplify your analysis flow → 

About ANY.RUN 

ANY.RUN is a leading provider of interactive malware analysis and threat intelligence solutions trusted by more than 500,000 cybersecurity professionals and 15,000 organizations worldwide. 

The platform gives defenders a clear view of real attacker behavior by combining: 

  • Interactive Sandbox: Runs files, URLs, and entire infection chains with automatic user-like activity to reveal tactics hidden from classic detection tools. 
  • TI FeedsContinuous delivery of fresh, confirmed-malicious network indicators in STIX/TAXII format. 
  • Enterprise-grade workflows: API, SDK, SSO, teamwork tools, and privacy-focused private analysis modes for large SOCs and MSSPs. 

ANY.RUN helps analysts work faster, strengthen decisions, and investigate advanced threats with clarity and confidence. 

FAQ

Do analysts have to download samples before sending them to the sandbox? 

No. The integration sends files/URLs directly from the MISP event to ANY.RUN. Everything stays in the same workflow. 

How does Automated Interactivity help? 

Some malware won’t run until it sees something that looks like a real human action, opening a document, clicking a dialog, waiting a few seconds, or browsing a link. Automated Interactivity performs those actions, helping expose behavior that static tools or non-interactive sandboxes never trigger. 

Does this integration help reduce MTTR? 

Yes. Analysts can confirm or dismiss alerts faster because they work with real execution evidence, not just metadata. This speeds up triage, shortens response cycles, and lowers the number of cases that require escalation. 

Can MSSPs use this to improve their SLAs? 

Yes. Faster verdicts, better evidence, and fewer manual steps mean MSSPs can return higher-quality reports to customers and stay within SLA targets without increasing team size. 

Is there any cost to enabling the MISP integration? 

The MISP modules are built into the platform and can be enabled without custom development. However, running analyses still requires an active ANY.RUN subscription. Once the account is connected, the integration can be used right away. 

How do TI Feeds fit into this workflow? 

TI Feeds bring fresh, confirmed-malicious indicators into MISP through STIX/TAXII. They complement sandbox analysis by improving correlation and early detection. 

The post ANY.RUN Sandbox & MISP Integration: Confirm Alerts Faster, Stop Incidents Early  appeared first on ANY.RUN’s Cybersecurity Blog.

ANY.RUN’s Cybersecurity Blog – ​Read More

Automated FortiGate Attacks Exploit FortiCloud SSO to Alter Firewall Configurations

Cybersecurity company Arctic Wolf has warned of a “new cluster of automated malicious activity” that involves unauthorized firewall configuration changes on Fortinet FortiGate devices.
The activity, it said, commenced on January 15, 2026, adding it shares similarities with a December 2025 campaign in which malicious SSO logins on FortiGate appliances were recorded against the admin account from

The Hacker News – ​Read More

Cisco Fixes Actively Exploited Zero-Day CVE-2026-20045 in Unified CM and Webex

Cisco has released fresh patches to address what it described as a “critical” security vulnerability impacting multiple Unified Communications (CM) products and Webex Calling Dedicated Instance that it has been actively exploited as a zero-day in the wild.
The vulnerability, CVE-2026-20045 (CVSS score: 8.2), could permit an unauthenticated remote attacker to execute arbitrary commands on the

The Hacker News – ​Read More

How to strip AI from Chrome, Edge, and Firefox with one simple script

Chrome, Edge, and Firefox are more bloated than ever, with AI are other features most of us don’t want. This free tool is your ticket back to the good old days.

Latest news – ​Read More

Slow Fire TV? This quick 30-second fix made mine run like new again

You can speed up your Fire TV instantly by clearing its app cache. Here’s how.

Latest news – ​Read More

Goodbye, VirtualBox – I found a better, more reliable VM manager for Linux

Virt-Manager is a free and easy-to-install virtual machine manager. Here’s how it compares to VirtualBox.

Latest news – ​Read More

This OS quietly powers all AI – and most future IT jobs, too

Without Linux, there is no ChatGPT. No AI at all. None. Here’s why.

Latest news – ​Read More

I found the Lenovo ThinkPad to rule them all – and its modular RAM changes everything

Lenovo’s eighth-generation ThinkPad P1 is a portable workstation that has it all, but you’ll have to be willing to pay to play.

Latest news – ​Read More