{
  "$type": "site.standard.document",
  "bskyPostRef": {
    "cid": "bafyreie3wblvjkoyy5vz6xubhhewqrtzvsucwipe4dqqm6mvtz6rma2hg4",
    "uri": "at://did:plc:iir655mcoipvnewhnkv6fb3u/app.bsky.feed.post/3mgubszl7yaf2"
  },
  "coverImage": {
    "$type": "blob",
    "ref": {
      "$link": "bafkreiegesvtvhjfhcqgoa4qcr4llw7p2b55m4iemhhaqdfwelcyvacrq4"
    },
    "mimeType": "image/png",
    "size": 1533445
  },
  "path": "/cybersecurity-blog/microstealer-technical-analysis/",
  "publishedAt": "2026-03-12T10:03:55.000Z",
  "site": "https://any.run",
  "tags": [
    "link"
  ],
  "textContent": "\nExplore how MicroStealer operates, what risks it creates for enterprises, and how ANY.RUN helps security teams detect it faster.",
  "title": "MicroStealer Analysis: A Fast-Spreading Infostealer with Limited Detection"
}