{
"$type": "site.standard.document",
"bskyPostRef": {
"cid": "bafyreie3wblvjkoyy5vz6xubhhewqrtzvsucwipe4dqqm6mvtz6rma2hg4",
"uri": "at://did:plc:iir655mcoipvnewhnkv6fb3u/app.bsky.feed.post/3mgubszl7yaf2"
},
"coverImage": {
"$type": "blob",
"ref": {
"$link": "bafkreiegesvtvhjfhcqgoa4qcr4llw7p2b55m4iemhhaqdfwelcyvacrq4"
},
"mimeType": "image/png",
"size": 1533445
},
"path": "/cybersecurity-blog/microstealer-technical-analysis/",
"publishedAt": "2026-03-12T10:03:55.000Z",
"site": "https://any.run",
"tags": [
"link"
],
"textContent": "\nExplore how MicroStealer operates, what risks it creates for enterprises, and how ANY.RUN helps security teams detect it faster.",
"title": "MicroStealer Analysis: A Fast-Spreading Infostealer with Limited Detection"
}