Cyber Defense Magazine Special Annual Edition for RSA Conference 2021
Cyber Defense Magazine Special Annual Edition for RSA Conference 2021 - the INFOSEC community's largest, most popular cybersecurity event in the world. Hosted every year in beautiful and sunny San Francisco, California, USA. This year, post COVID-19, virtually with #RESILIENCE! In addition, we're in our 9th year of the prestigious Global InfoSec Awards. This is a must read source for all things infosec.
Cyber Defense Magazine Special Annual Edition for RSA Conference 2021 - the INFOSEC community's largest, most popular cybersecurity event in the world. Hosted every year in beautiful and sunny San Francisco, California, USA. This year, post COVID-19, virtually with #RESILIENCE! In addition, we're in our 9th year of the prestigious Global InfoSec Awards. This is a must read source for all things infosec.
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
To install different operating systems and set additional programs whenever malware doesn’t show up –<br />
can be time-consuming and expensive. Thankfully, there is a unique solution that both saves your money<br />
and speeds up analysis. ANY.RUN service can do it all.<br />
A new trend <strong>for</strong> detecting and investigation<br />
ANY.RUN is a cloud-based interactive sandbox. Analysts use it to detect malware and investigate<br />
incidents. Moreover, a large sample database of IOCs and ready-made reports can improve the everyday<br />
work of a cybersecurity specialist.<br />
The service has an interactive approach to the analysis of malicious content that other sandboxes are<br />
lacking. The malware analysis takes place in real-time, and you are directly involved in the process.<br />
In a matter of seconds, you get a ready-made workplace where you can run malicious files. There is no<br />
need to configure additional tools <strong>for</strong> logging file events and network traffic. This is what ANY.RUN offers,<br />
and unlike many systems, it doesn’t limit you in the number of submissions.<br />
Nowadays, it is not enough to run a suspicious file in an automated detection system to conclude that it's<br />
secure. Some types of threats (such as APTs) require direct human interaction during analysis. Our<br />
toolset <strong>for</strong> online malware analysis allows you to monitor the research process and make adjustments<br />
when necessary, just as you would do when working with a real system. There is no need to rely only on<br />
automated detection.<br />
A new interactive approach in real-time<br />
Let’s have a look at what stands <strong>for</strong> interactive access in ANY.RUN. During your investigation in realtime<br />
you can:<br />
• Move and click a mouse, input data, reboot the system, open files – any kind of interaction with<br />
the virtual environment is possible;<br />
• Change the settings: pre-installed soft set, several OSs with different bit-versions, and builds are<br />
ready <strong>for</strong> you;<br />
• Download files and modules;<br />
• Research network connections;<br />
• Monitor systems processes;<br />
• Collect incident indicators;<br />
• Get Mitre attack matrix;<br />
• Have a process graph.<br />
All of these features help to reveal sophisticated malware and see the anatomy of the attack in real-time.<br />
38