Skyhawk Security has added Threat Actor Context to its cloud security platform, giving security teams a way to understand simulated attack scenarios through the lens of known adversary behavior. The enhancement connects Skyhawk’s AI Red Team attack simulations to real-world threat actors, their campaigns, and affiliated CVEs.
The capability goes beyond mapping to tactics, techniques, and procedures. Skyhawk’s attribution engine layers in curated threat intelligence that accounts for targeted industries, geographies, and malicious campaign methods, so organizations can see not just what a simulated scenario looks like, but why it matters given their specific business context.
At launch, Threat Actor Context ties scenarios to five named adversary groups:
- Scattered Spider: Patterns linked to identity-driven intrusions, including high-profile attacks on MGM Resorts and Caesars Entertainment.
- APT29: Tradecraft associated with NOBELIUM and TeamCity-related cloud intrusion activity.
- APT44 / Sandworm: Patterns tied to disruptive operations such as BadPilot.
- TraderTraitor: Techniques connected to the JumpCloud compromise and the Bybit theft.
- APT41: Behavior associated with Operation CuckooBees and broader public sector targeting.
“Security teams have plenty of data, telemetry and alerts. What they’re usually lacking is the context to transform that data into security insights and pinpoint why simulated attack scenarios matter to their business based on activity seen in the wild,” said Chen Burshan, CEO of Skyhawk Security. “We’re helping them view scenarios through the lens of known attacker behavior to better assess exposure and improve prioritization.”
The underlying idea is prioritization grounded in real-world threat activity. Rather than treating all simulated attack paths as equally urgent, Threat Actor Context helps teams focus attention on scenarios that mirror the tradecraft of active threat groups targeting organizations like theirs. The platform already incorporates Skyhawk’s Continuous Proactive Protection and AI-powered Purple Team approach to cloud security.
Skyhawk Security is a spin-off of Radware (NASDAQ: RDWR) and is presenting the new capability at RSA Conference 2026 in San Francisco.