• Microsoft
  • Purple Teams
  • XDR & CyberSOC
  • AI Security
  • Red Teams
  • Blue Teams
  • Cloud Security
  • OT Security
  • Risk & Compliance

Benchmarked Threat Resilience

VECTR™ helps facilitate the process to test controls, record outcomes and report on your resilience and improvement over time.

VECTR™’s Index Threat Resilience Benchmarks™ are the only global cybersecurity collaboration to answer the question “how do we compare to our peers?”

Cut Cloud Technology Costs

SCALR™ XDR uses a security data lake architecture to minimize SIEM costs, maximize your ability to store security events, and accelerate search and hunting capabilities. The SCALR™ XDR service is enhanced by our distinctive SCALR™ AI, Purple Teams & Threat Resilience Metrics.

Vulnerability Management Simplified

Despite the many tools in the market, Vulnerability Management in most organizations still requires significant manual efforts to “find and fix” critical vulnerabilities in the enterprise. SCALR™ Sight focuses on simplifying the process without the need to change your current tools.

Intelligence by Design

SCALR AI is a multi-agentic workflow engine for large, complex task execution in your SRA-powered SCALR XDR Security Operations Center.

  • Webinars
  • Partnerships
  • Services
  • Platforms
  • Blog
  • About Us
  • Careers
  • Contact

Get SRA’s free report: The Purple Perspective 2026

  • Services
    • Microsoft
    • Purple Teams
    • XDR & CyberSOC
    • AI Security
    • Red Teams
    • Blue Teams
    • Cloud Security
    • OT Security
    • Risk & Compliance
  • Platforms
    • VECTR™
    • SCALR™ XDR
    • SCALR™ Sight
    • SCALR™ AI
  • Blog
    • Webinars
  • About Us
    • Partnerships
  • Careers
  • Contact

Threat actors abuse Anthropic’s Claude Code AI assistant to create functional ransomware platforms, conduct automated data extortion campaigns, and develop malware.

by TIGR Threat Watch | Sep 2, 2025 | TIGR

Anthropic has documented multiple instances where cybercriminals have used their Claude Code large language model to create malware and conduct cyberattacks. In the most concerning case (GTG-5004), a UK-based threat actor used Claude Code to develop and commercialize...

Storm-0501 Shifts to Cloud-Based Ransomware Targeting Hybrid Environments via Azure Resource Destruction

by TIGR Threat Watch | Aug 28, 2025 | TIGR

Microsoft Threat Intelligence has documented Storm-0501’s evolution from traditional on-premises ransomware operations to sophisticated cloud-based attacks targeting hybrid environments. The threat actor, previously known for deploying Sabbath and Embargo...

ESET Discovers First Known AI-Powered Ransomware Using Local Language Models for Dynamic Attacks

by TIGR Threat Watch | Aug 28, 2025 | TIGR

ESET researchers discovered PromptLock, which they identified as the first known AI-powered ransomware that uses artificial intelligence models to generate malicious code dynamically, published August 26, 2025. The malware leverages the gpt-oss-20b model from OpenAI...

Hook Banking Trojan Version 3 Introduces Ransomware Overlays and 107 Remote Commands

by TIGR Threat Watch | Aug 28, 2025 | TIGR

Zimperium’s zLabs research team has discovered a new variant of the Hook Android banking trojan featuring enhanced capabilities discovered in August 2025. This version introduces ransomware-style overlays displaying extortion messages, fake NFC overlays to...

Akira Ransomware Exploits Zero-Day SonicWall SSL VPN Vulnerability

by TIGR Threat Watch | Aug 5, 2025 | TIGR

Arctic Wolf observed increased ransomware activity targeting SonicWall firewall devices beginning July 15, 2025, with similar attacks occurring since October 2024. The campaign involves Akira ransomware gaining initial access through SonicWall SSL VPNs, with evidence...
« Older Entries
Next Entries »

Follow us on social media

  • Follow
  • Follow
  • Follow
  • Follow

View our Webinars

Get the TIGR Threat Watch email bulletin here!

(215) 867-9051

Advisories

Privacy Policy

Copyright © 2020-2026. Security Risk Advisors Intl., LLC. All Rights Reserved.

Manage Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
  • Manage options
  • Manage services
  • Manage {vendor_count} vendors
  • Read more about these purposes
View preferences
  • {title}
  • {title}
  • {title}
 

Loading Comments...