{"total":6,"offset":0,"limit":6,"data":[{"icon":"","title":"NEW AI-powered Malware Hunting","description":"Upskill analysts faster with natural language querying capabilities. Dive deep into both static and dynamic malware behaviors without complex queries. And analyze trends and changes in malware over time.","link":""},{"icon":"","title":"NEW Auto YARA rules","description":"Instantly generate detection rules for new and emerging malware, validate them against known good filesets to prevent false positives, and apply them at scale across file systems, email, and downloaded binaries.","link":""},{"icon":"","title":"NEW Malware Alerts","description":"Transform threat hunts from reactive to proactive with real-time alerts. Create, manage, and refine custom detection rules through an intuitive interface, and spot emerging threats before they become problems.","link":""},{"icon":"","title":"ENHANCED Malware analysis sandbox","description":"Detect, observe, and detonate malware in a controlled environment, get full sandbox report details in the dashboard, and understand malware impacts through direct observation.","link":""},{"icon":"","title":"ENHANCED Malware data","description":"Access the world’s largest structured malware dataset, get context from Intelligence Graph enrichment, and see relationships across the threat landscape.","link":""},{"icon":"","title":"ENHANCED APIs","description":"Connect all your systems and workflows by using APIs to run searches via natural language, and integrate alerts into your existing security tools.","link":""}],"columns":["icon","title","description","link"],":type":"sheet"}