A newly discovered bug in the open source password manager, if exploited, lets attackers retrieve a target’s master password — and proof-of-concept code is available. Read More
Related Posts
General Electric investigates claims of cyberattack, data theft
General Electric investigates claims of cyberattack, data theft
General Electric is investigating claims that a threat actor breached the company’s development environment in a cyberattack and leaked allegedly stolen data. […] Read More
BleepingComputer
Free Malware Research with ANY.RUN Sandbox: Now Windows 10 Access for All Users
Free Malware Research with ANY.RUN Sandbox: Now Windows 10 Access for All Users
In a significant move to enhance cybersecurity analysis for all its users, ANY.RUN has announced that Windows 10 is now available to everyone, including Community plan users. This update marks a substantial improvement in the platform’s ability to detect and analyze modern threats for SOC and DFIR Teams.
Previously, Community plan users were restricted to a basic Windows 7 32-bit virtual machine (VM), which limited their ability to analyze newer, more sophisticated threats. With this update, ALL users can access a Windows 10 64-bit environment, significantly improving overall threat detection and analysis capabilities.
“We believe everyone should have access to good security analysis tools, regardless of whether they’re on a paid or free plan,” said a spokesperson for ANY.RUN. “This update is our way of making that happen.”
With ANY.RUN’s new update, you can:
Detect malware in under 40s.
Interact with samples in real-time.
Save time and money on sandbox setup and maintenance
Record and study all aspects of malware behavior.
Collaborate with your SOC/DFIR team
Scale as you need.
Are you From SOC/DFIR Team? Launch your first analysis in Win 10 VM – Free Sign-Up
Benefits of Windows 10 for Malware Analysis
The shift to Windows 10 brings several advantages:
Improved analysis of newer threats targeting popular systems
Higher detection rates
More accurate reporting
Ability to emulate 64-bit malware
A practical example highlighted by ANY.RUN is the Latrodectus malware, which doesn’t complete its full execution chain on Windows 7 but reveals itself fully on Windows 10.
This update is expected to benefit the entire ANY.RUN community. As more users adopt Windows 10 for analysis, the sandbox environment will detect a wider range of threats more effectively.
According to ANY.RUN Report, “We believe everyone should have good security analysis tools, whether you’re paying or using our free plan. This update is our way of making that happen.”
“But this update also benefits our entire community. As more users use Windows 10, our sandbox environment will become more effective at detecting a wider range of threats.”
How to Access Windows 10 on ANY.RUN
Community Plan users can now select Windows 10 64-bit from the drop-down menu when creating a new task. This option was previously grayed out for these users.
About ANY.RUN
ANY.RUN serves over 400,000 cybersecurity professionals worldwide with its interactive sandbox for malware analysis. The platform offers threat intelligence products including TI Lookup, Yara Search, and Feeds, helping professionals respond to incidents faster.
Key advantages of ANY.RUN include:
Rapid malware detection (under 40 seconds)
Real-time interaction with samples
Time and cost savings on sandbox setup and maintenance
Comprehensive malware behavior recording and study
Team collaboration features
Scalability
With this update, ANY.RUN continues demonstrating its commitment to providing cutting-edge tools for cybersecurity professionals across all subscription levels.
Free Malware Research with ANY.RUN – Start Now for Free
The post Free Malware Research with ANY.RUN Sandbox: Now Windows 10 Access for All Users appeared first on Cyber Security News.
![CISA Adds Citrix ShareFile Flaw to KEV Catalog Due to In-the-Wild Attacks](https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjBZJ2hLViON6Trcz9G7kDDjPOgttwK5ihU-EiIk6Q-5S4Q7-ambRMc0kXe2zco7wS7CYME3h9Ps-O12g6m6Tc9h0uFTZ_A_wAmcADFvVAh4iUHpWl7vQptwldbnI-ospzL0aDM0Lu91npKQ6IV4BjXimNpWrkraJ5t2pboXuYJIZRJn_hNsPPNRWd36jEn/s72-c/citrix.jpg)
CISA Adds Citrix ShareFile Flaw to KEV Catalog Due to In-the-Wild Attacks
CISA Adds Citrix ShareFile Flaw to KEV Catalog Due to In-the-Wild Attacks
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added a critical security flaw in Citrix ShareFile storage zones controller to its Known Exploited Vulnerabilities (KEV) catalog, based on evidence of active in-the-wild exploitation.
Tracked as CVE-2023-24489 (CVSS score: 9.8), the shortcoming has been described as an improper access control bug that, if successfully exploited Read More
The Hacker News | #1 Trusted Cybersecurity News Site