Submission declined on 1 March 2024 by Stuartyeates (talk).
Where to get help
How to improve a draft
You can also browse Wikipedia:Featured articles and Wikipedia:Good articles to find examples of Wikipedia's best writing on topics similar to your proposed article. Improving your odds of a speedy review To improve your odds of a faster review, tag your draft with relevant WikiProject tags using the button below. This will let reviewers know a new draft has been submitted in their area of interest. For instance, if you wrote about a female astronomer, you would want to add the Biography, Astronomy, and Women scientists tags. Editor resources
|
- Comment: Literally the only acceptable source here is the https://www.bleepingcomputer.com/ one. Stuartyeates (talk) 22:13, 1 March 2024 (UTC)
This article has multiple issues. Please help improve it or discuss these issues on the talk page. (Learn how and when to remove these template messages)
|
Company type | Private |
---|---|
Industry | Cybersecurity |
Founder | Aleksey Lapshin |
Headquarters | Dubai, UAE |
Products | Malware sandbox |
ANY.RUN is a cybersecurity company headquartered in Dubai, the United Arab Emirates.[1] It is a vendor of an interactive sandbox for malware analysis.[2] [3]
The company was founded in 2016 by Aleksey Lapshin and has a team of 70 people working on its products.[4] [5]
The ANY.RUN Sandbox
editANY.RUN provides a cloud-based sandbox environment for analyzing potentially malicious software and URLs.[6] [7] Users can upload samples to conduct dynamic malware analysis and observe their behavior in real time, as well as to collect indicators of compromise (IoCs) and enrich security information and event management (SIEM) systems.[8] [9]
ANY.RUN offers a free public community plan with limited features, including analysis in a Windows 7 32-bit VM.[10] [11] The free version offers detailed information about the uploaded file's execution, including the launched processes, network and registry activity, and file data, while upgraded paid plans provide additional functionalities.[11] [12] [13] The sandbox provides several operating system options for analysis.[14]
References
edit
- ^ "ANY.RUN - Crunchbase Company Profile & Funding".
- ^ "ANY.RUN - Interactive Online Malware Sandbox". any.run. Retrieved 2024-02-22.
- ^ Yahia, Mostafa (2024-02-22). Effective Threat Investigation for SOC Analysts: The ultimate guide to examining various threats and attacker techniques using security logs. Packt Publishing (published 2023). pp. 24–26. ISBN 9781837638758.
- ^ "Aleksey Lapshin | CEO - ANY.RUN". Forbes Technology Council. Retrieved 2024-03-01.
- ^ "Any.Run - An Interactive Malware Analysis Tool - Is Now Open To The Public". BleepingComputer. Retrieved 2024-02-22.
- ^ Kleymenov, Alexey; Thabet, Amr (2022). Mastering Malware Analysis: A malware analyst's practical guide to combating malicious software, APT, cybercrime, and IoT attacks (2nd ed.). Packt Publishing Ltd. pp. 112–113. ISBN 9781803230818.
- ^ Ahmed, Mohiuddin; Moustafa, Nour; Barkat, Abu; Haskell-Dowland, Paul, eds. (2022). Next-Generation Enterprise Security and Governance. CRC Press. p. 27. ISBN 9781000569797.
- ^ Dahj, Jean Nestor M. (2022). Mastering Cyber Intelligence: Gain comprehensive knowledge and skills to conduct threat intelligence for effective system defense. Packt Publishing Ltd. p. 206. ISBN 9781800208285.
- ^ Muñoz, Diego; Cordero, David; Barría Huidobro, Cristian (2019). "Methodology for Malware Scripting Analysis in Controlled Environments Based on Open Source Tools". In Mata-Rivera, Miguel Felix; Zagal-Flores, Roberto; Barría-Huidobro, Cristian (eds.). Telematics and Computing. Communications in Computer and Information Science. Vol. 1053. Cham: Springer International Publishing. p. 348. doi:10.1007/978-3-030-33229-7_29. ISBN 978-3-030-33229-7.
- ^ Davidoff, Sherri; Durrin, Matt; Sprenger, Karen (2022). Ransomware and Cyber Extortion: Response and Prevention. Addison-Wesley Professional. ISBN 9780137450435.
- ^ a b Dawson, Maurice; Tabona, Oteng; Maupong, Thabiso (2022). Cybersecurity Capabilities in Developing Nations and Its Impact on Global Security. IGI Global. p. 208. ISBN 9781799886938.
- ^ Marais, Benjamin; Quertier, Tony; Chesneau, Christophe (2022). "Malware Analysis with Artificial Intelligence and a Particular Attention on Results Interpretability". In Matsui, Kenji; Omatu, Sigeru; Yigitcanlar, Tan; González, Sara Rodríguez (eds.). Distributed Computing and Artificial Intelligence, Volume 1: 18th International Conference. Lecture Notes in Networks and Systems. Vol. 327. Cham: Springer International Publishing. pp. 43–55. arXiv:2107.11100. doi:10.1007/978-3-030-86261-9_5. ISBN 978-3-030-86261-9. S2CID 236318540.
- ^ Preeti; Agrawal, A. K. (2022). "A Comparative Analysis of Open Source Automated Malware Tools". 2022 9th International Conference on Computing for Sustainable Global Development (INDIACom). pp. 226–230. doi:10.23919/indiacom54597.2022.9763227. ISBN 978-93-80544-44-1. S2CID 248518588. Retrieved 2024-03-01.
- ^ Wilhoit, Kyle; Opacki, Joseph (2022). Operationalizing Threat Intelligence: A guide to developing and operationalizing cyber threat intelligence programs. Packt Publishing ltd. ISBN 9781801818667.
- in-depth (not just passing mentions about the subject)
- reliable
- secondary
- independent of the subject
Make sure you add references that meet these criteria before resubmitting. Learn about mistakes to avoid when addressing this issue. If no additional references exist, the subject is not suitable for Wikipedia.