{
	"id": "886cdabe-b7b8-4047-abb0-ecd9ab1dfa89",
	"created_at": "2026-04-06T00:06:31.485301Z",
	"updated_at": "2026-04-10T03:19:56.773536Z",
	"deleted_at": null,
	"sha1_hash": "aef69b3a7cdcb31d48bb7e025ca6cfd0d383d85e",
	"title": "Not Found",
	"llm_title": "",
	"authors": "",
	"file_creation_date": "0001-01-01T00:00:00Z",
	"file_modification_date": "0001-01-01T00:00:00Z",
	"file_size": 78416,
	"plain_text": "Not Found\r\nArchived: 2026-04-05 20:14:18 UTC\r\nSkip to main content\r\nAgentic SOC Platform Overview\r\nUnifies threat intelligence, security data, and agentic AI into a single platform, enabling SOC and CTI\r\nteams to collaborate seamlessly. Teams gain context and AI-guided workflows to detect hidden threats,\r\nprioritize high-risk incidents, and respond faster.\r\nProducts\r\nUnified Security Data Lake\r\nComplete visibility, AI-guided insights, and unified workflows to detect, investigate, and respond at\r\nmachine speed.\r\nThe industry’s leading threat intelligence platform (TIP) that provides curated access to the world’s\r\nlargest repository of curated threat intelligence.\r\nAdvanced AI and natural language processing to simplify and speed up analysis so you can stop\r\nthreats in their tracks.\r\nUse Cases\r\nAll-in-one ETL, SIEM, XDR, UEBA, and SOAR for blazing fast threat detection, investigation, and\r\nresponse.\r\nThe industry’s leading threat intelligence platform (TIP) that provides curated access to the world’s\r\nlargest repository of curated threat intelligence.\r\nInvestigation and Response\r\nAdvanced AI and natural language processing to simplify and speed up analysis so you can stop\r\nthreats in their tracks.\r\nAdvanced AI and natural language processing to simplify and speed up analysis so you can stop\r\nthreats in their tracks.\r\nhttps://www.anomali.com/blog/targeted-ransomware-activity\r\nPage 1 of 12\n\nAdvanced AI and natural language processing to simplify and speed up analysis so you can stop\r\nthreats in their tracks.\r\nIntelligence Distribution\r\nAdvanced AI and natural language processing to simplify and speed up analysis so you can stop\r\nthreats in their tracks.\r\nCapabilities\r\nThreat Intelligence (TIP)\r\nAll-in-one ETL, SIEM, XDR, UEBA, and SOAR for blazing fast threat detection, investigation, and\r\nresponse.\r\nThe industry’s leading threat intelligence platform (TIP) that provides curated access to the world’s\r\nlargest repository of curated threat intelligence.\r\nAdvanced AI and natural language processing to simplify and speed up analysis so you can stop\r\nthreats in their tracks.\r\nAdvanced AI and natural language processing to simplify and speed up analysis so you can stop\r\nthreats in their tracks.\r\nAdvanced AI and natural language processing to simplify and speed up analysis so you can stop\r\nthreats in their tracks.\r\nUnified Security Data lake\r\nAll-in-one ETL, SIEM, XDR, UEBA, and SOAR for blazing fast threat detection, investigation, and\r\nresponse.\r\nThe industry’s leading threat intelligence platform (TIP) that provides curated access to the world’s\r\nlargest repository of curated threat intelligence.\r\nInvestigation and Response\r\nAdvanced AI and natural language processing to simplify and speed up analysis so you can stop\r\nthreats in their tracks.\r\nAdvanced AI and natural language processing to simplify and speed up analysis so you can stop\r\nthreats in their tracks.\r\nThreatStream Next-Gen\r\nThe industry’s leading threat intelligence platform (TIP) that provides curated access to the world’s\r\nlargest repository of curated threat intelligence.\r\nInvestigation and Response\r\nhttps://www.anomali.com/blog/targeted-ransomware-activity\r\nPage 2 of 12\n\nAdvanced AI and natural language processing to simplify and speed up analysis so you can stop\r\nthreats in their tracks.\r\nAdvanced AI and natural language processing to simplify and speed up analysis so you can stop\r\nthreats in their tracks.\r\nAdvanced AI and natural language processing to simplify and speed up analysis so you can stop\r\nthreats in their tracks.\r\nIntelligence Distribution\r\nAdvanced AI and natural language processing to simplify and speed up analysis so you can stop\r\nthreats in their tracks.\r\nAgentic AI\r\nAll-in-one ETL, SIEM, XDR, UEBA, and SOAR for blazing fast threat detection, investigation, and\r\nresponse.\r\nThe industry’s leading threat intelligence platform (TIP) that provides curated access to the world’s\r\nlargest repository of curated threat intelligence.\r\nThe Anomali Marketplace\r\nA unique cybersecurity marketplace providing instant access to a growing catalog of threat intelligence\r\nproviders, integration partners, and threat analysis tools.\r\nThreat Intelligence Feeds\r\nTrial and purchase threat intelligence feeds from Anomali partners – find the right intelligence for\r\nyour organization, industry, geography, and more.\r\nThreat Analysis Tools and Enrichments\r\nGain the tools to pivot quickly from one piece of information to look up other sources of data to get\r\na complete picture of a threat – all one click away.\r\nTrial and purchase threat intelligence feeds from Anomali partners – find the right intelligence for\r\nyour organization, industry, geography, and more.\r\nGain the tools to pivot quickly from one piece of information to look up other sources of data to get\r\na complete picture of a threat – all one click away.\r\nExplore Resources\r\nDive into the latest cybersecurity and threat intelligence news, tips, and insights through our library of\r\narticles, webinars, datasheets, industry reports, case studies, and more.\r\nGlobal InfoSec Awards\r\nhttps://www.anomali.com/blog/targeted-ransomware-activity\r\nPage 3 of 12\n\nAnomali scores triple win for SIEM, SecOps, and TIP\r\nSIEM Optimization\r\nOptimize SIEM with an intelligence-native approach built for speed, scale, and action.\r\nSTAXX\r\nYour free STIX/TAXII solution\r\nExplore\r\nTrial and purchase threat intelligence feeds from Anomali partners – find the right intelligence for\r\nyour organization, industry, geography, and more.\r\nTrial and purchase threat intelligence feeds from Anomali partners – find the right intelligence for\r\nyour organization, industry, geography, and more.\r\nTrial and purchase threat intelligence feeds from Anomali partners – find the right intelligence for\r\nyour organization, industry, geography, and more.\r\nEngage\r\nTrial and purchase threat intelligence feeds from Anomali partners – find the right intelligence for\r\nyour organization, industry, geography, and more.\r\nTrial and purchase threat intelligence feeds from Anomali partners – find the right intelligence for\r\nyour organization, industry, geography, and more.\r\nTrial and purchase threat intelligence feeds from Anomali partners – find the right intelligence for\r\nyour organization, industry, geography, and more.\r\nLearn\r\nWhat is a Threat Intelligence Platform (TIP)?\r\nTrial and purchase threat intelligence feeds from Anomali partners – find the right intelligence for\r\nyour organization, industry, geography, and more.\r\nGain the tools to pivot quickly from one piece of information to look up other sources of data to get\r\na complete picture of a threat – all one click away.\r\nWhat is Threat Intelligence?\r\nGain the tools to pivot quickly from one piece of information to look up other sources of data to get\r\na complete picture of a threat – all one click away.\r\nGain the tools to pivot quickly from one piece of information to look up other sources of data to get\r\na complete picture of a threat – all one click away.\r\nhttps://www.anomali.com/blog/targeted-ransomware-activity\r\nPage 4 of 12\n\nWhat is Security Analytics?\r\nGain the tools to pivot quickly from one piece of information to look up other sources of data to get\r\na complete picture of a threat – all one click away.\r\nAbout Anomali\r\nAnomali delivers the first Intelligence-Native Agentic SOC Platform, unifying a fully-featured-security\r\ndata lake, threat intelligence, and agentic AI into a single modern experience. The platform accelerates\r\ndetection, investigation, and response, delivering earlier insights, faster action, and scalable modernization\r\nacross any environment.\r\nTrial and purchase threat intelligence feeds from Anomali partners – find the right intelligence for\r\nyour organization, industry, geography, and more.\r\nGain the tools to pivot quickly from one piece of information to look up other sources of data to get\r\na complete picture of a threat – all one click away.\r\nGain the tools to pivot quickly from one piece of information to look up other sources of data to get\r\na complete picture of a threat – all one click away.\r\nTrial and purchase threat intelligence feeds from Anomali partners – find the right intelligence for\r\nyour organization, industry, geography, and more.\r\nGain the tools to pivot quickly from one piece of information to look up other sources of data to get\r\na complete picture of a threat – all one click away.\r\nGain the tools to pivot quickly from one piece of information to look up other sources of data to get\r\na complete picture of a threat – all one click away.\r\nPartners Overview\r\nAnomali is dedicated to fostering strong partnerships, ensuring shared success and growth through\r\ncollaborative innovation and mutual support.\r\nTrial and purchase threat intelligence feeds from Anomali partners – find the right intelligence for\r\nyour organization, industry, geography, and more.\r\nTrial and purchase threat intelligence feeds from Anomali partners – find the right intelligence for\r\nyour organization, industry, geography, and more.\r\nTrial and purchase threat intelligence feeds from Anomali partners – find the right intelligence for\r\nyour organization, industry, geography, and more.\r\nTechnology Alliance Partners\r\nTrial and purchase threat intelligence feeds from Anomali partners – find the right intelligence for\r\nyour organization, industry, geography, and more.\r\nhttps://www.anomali.com/blog/targeted-ransomware-activity\r\nPage 5 of 12\n\nTrial and purchase threat intelligence feeds from Anomali partners – find the right intelligence for\r\nyour organization, industry, geography, and more.\r\nTrial and purchase threat intelligence feeds from Anomali partners – find the right intelligence for\r\nyour organization, industry, geography, and more.\r\nTrial and purchase threat intelligence feeds from Anomali partners – find the right intelligence for\r\nyour organization, industry, geography, and more.\r\nTrial and purchase threat intelligence feeds from Anomali partners – find the right intelligence for\r\nyour organization, industry, geography, and more.\r\nTrial and purchase threat intelligence feeds from Anomali partners – find the right intelligence for\r\nyour organization, industry, geography, and more.\r\nBecome a Technology Alliance Partner\r\nTrial and purchase threat intelligence feeds from Anomali partners – find the right intelligence for\r\nyour organization, industry, geography, and more.\r\nBecome a Threat Intel Sharing Partner\r\nTrial and purchase threat intelligence feeds from Anomali partners – find the right intelligence for\r\nyour organization, industry, geography, and more.\r\nAgentic SOC Platform Overview\r\nUnifies threat intelligence, security data, and agentic AI into a single platform, enabling SOC and CTI\r\nteams to collaborate seamlessly. Teams gain context and AI-guided workflows to detect hidden threats,\r\nprioritize high-risk incidents, and respond faster.\r\nProducts\r\nUnified Security Data Lake\r\nComplete visibility, AI-guided insights, and unified workflows to detect, investigate, and respond at\r\nmachine speed.\r\nThe industry’s leading threat intelligence platform (TIP) that provides curated access to the world’s\r\nlargest repository of curated threat intelligence.\r\nhttps://www.anomali.com/blog/targeted-ransomware-activity\r\nPage 6 of 12\n\nAdvanced AI and natural language processing to simplify and speed up analysis so you can stop\r\nthreats in their tracks.\r\nUse Cases\r\nAll-in-one ETL, SIEM, XDR, UEBA, and SOAR for blazing fast threat detection, investigation, and\r\nresponse.\r\nThe industry’s leading threat intelligence platform (TIP) that provides curated access to the world’s\r\nlargest repository of curated threat intelligence.\r\nInvestigation and Response\r\nAdvanced AI and natural language processing to simplify and speed up analysis so you can stop\r\nthreats in their tracks.\r\nAdvanced AI and natural language processing to simplify and speed up analysis so you can stop\r\nthreats in their tracks.\r\nAdvanced AI and natural language processing to simplify and speed up analysis so you can stop\r\nthreats in their tracks.\r\nIntelligence Distribution\r\nAdvanced AI and natural language processing to simplify and speed up analysis so you can stop\r\nthreats in their tracks.\r\nCapabilities\r\nThreat Intelligence (TIP)\r\nAll-in-one ETL, SIEM, XDR, UEBA, and SOAR for blazing fast threat detection, investigation, and\r\nresponse.\r\nThe industry’s leading threat intelligence platform (TIP) that provides curated access to the world’s\r\nlargest repository of curated threat intelligence.\r\nAdvanced AI and natural language processing to simplify and speed up analysis so you can stop\r\nthreats in their tracks.\r\nAdvanced AI and natural language processing to simplify and speed up analysis so you can stop\r\nthreats in their tracks.\r\nAdvanced AI and natural language processing to simplify and speed up analysis so you can stop\r\nthreats in their tracks.\r\nUnified Security Data lake\r\nhttps://www.anomali.com/blog/targeted-ransomware-activity\r\nPage 7 of 12\n\nAll-in-one ETL, SIEM, XDR, UEBA, and SOAR for blazing fast threat detection, investigation, and\r\nresponse.\r\nThe industry’s leading threat intelligence platform (TIP) that provides curated access to the world’s\r\nlargest repository of curated threat intelligence.\r\nInvestigation and Response\r\nAdvanced AI and natural language processing to simplify and speed up analysis so you can stop\r\nthreats in their tracks.\r\nAdvanced AI and natural language processing to simplify and speed up analysis so you can stop\r\nthreats in their tracks.\r\nThreatStream Next-Gen\r\nThe industry’s leading threat intelligence platform (TIP) that provides curated access to the world’s\r\nlargest repository of curated threat intelligence.\r\nInvestigation and Response\r\nAdvanced AI and natural language processing to simplify and speed up analysis so you can stop\r\nthreats in their tracks.\r\nAdvanced AI and natural language processing to simplify and speed up analysis so you can stop\r\nthreats in their tracks.\r\nAdvanced AI and natural language processing to simplify and speed up analysis so you can stop\r\nthreats in their tracks.\r\nIntelligence Distribution\r\nAdvanced AI and natural language processing to simplify and speed up analysis so you can stop\r\nthreats in their tracks.\r\nAgentic AI\r\nAll-in-one ETL, SIEM, XDR, UEBA, and SOAR for blazing fast threat detection, investigation, and\r\nresponse.\r\nThe industry’s leading threat intelligence platform (TIP) that provides curated access to the world’s\r\nlargest repository of curated threat intelligence.\r\nThe Anomali Marketplace\r\nA unique cybersecurity marketplace providing instant access to a growing catalog of threat intelligence\r\nproviders, integration partners, and threat analysis tools.\r\nThreat Intelligence Feeds\r\nhttps://www.anomali.com/blog/targeted-ransomware-activity\r\nPage 8 of 12\n\nTrial and purchase threat intelligence feeds from Anomali partners – find the right intelligence for\r\nyour organization, industry, geography, and more.\r\nThreat Analysis Tools and Enrichments\r\nGain the tools to pivot quickly from one piece of information to look up other sources of data to get\r\na complete picture of a threat – all one click away.\r\nTrial and purchase threat intelligence feeds from Anomali partners – find the right intelligence for\r\nyour organization, industry, geography, and more.\r\nGain the tools to pivot quickly from one piece of information to look up other sources of data to get\r\na complete picture of a threat – all one click away.\r\nExplore Resources\r\nDive into the latest cybersecurity and threat intelligence news, tips, and insights through our library of\r\narticles, webinars, datasheets, industry reports, case studies, and more.\r\nGlobal InfoSec Awards\r\nAnomali scores triple win for SIEM, SecOps, and TIP\r\nSIEM Optimization\r\nOptimize SIEM with an intelligence-native approach built for speed, scale, and action.\r\nSTAXX\r\nYour free STIX/TAXII solution\r\nExplore\r\nTrial and purchase threat intelligence feeds from Anomali partners – find the right intelligence for\r\nyour organization, industry, geography, and more.\r\nTrial and purchase threat intelligence feeds from Anomali partners – find the right intelligence for\r\nyour organization, industry, geography, and more.\r\nTrial and purchase threat intelligence feeds from Anomali partners – find the right intelligence for\r\nyour organization, industry, geography, and more.\r\nEngage\r\nTrial and purchase threat intelligence feeds from Anomali partners – find the right intelligence for\r\nyour organization, industry, geography, and more.\r\nTrial and purchase threat intelligence feeds from Anomali partners – find the right intelligence for\r\nyour organization, industry, geography, and more.\r\nhttps://www.anomali.com/blog/targeted-ransomware-activity\r\nPage 9 of 12\n\nTrial and purchase threat intelligence feeds from Anomali partners – find the right intelligence for\r\nyour organization, industry, geography, and more.\r\nLearn\r\nWhat is a Threat Intelligence Platform (TIP)?\r\nTrial and purchase threat intelligence feeds from Anomali partners – find the right intelligence for\r\nyour organization, industry, geography, and more.\r\nGain the tools to pivot quickly from one piece of information to look up other sources of data to get\r\na complete picture of a threat – all one click away.\r\nWhat is Threat Intelligence?\r\nGain the tools to pivot quickly from one piece of information to look up other sources of data to get\r\na complete picture of a threat – all one click away.\r\nGain the tools to pivot quickly from one piece of information to look up other sources of data to get\r\na complete picture of a threat – all one click away.\r\nWhat is Security Analytics?\r\nGain the tools to pivot quickly from one piece of information to look up other sources of data to get\r\na complete picture of a threat – all one click away.\r\nAbout Anomali\r\nAnomali delivers the first Intelligence-Native Agentic SOC Platform, unifying a fully-featured-security\r\ndata lake, threat intelligence, and agentic AI into a single modern experience. The platform accelerates\r\ndetection, investigation, and response, delivering earlier insights, faster action, and scalable modernization\r\nacross any environment.\r\nTrial and purchase threat intelligence feeds from Anomali partners – find the right intelligence for\r\nyour organization, industry, geography, and more.\r\nGain the tools to pivot quickly from one piece of information to look up other sources of data to get\r\na complete picture of a threat – all one click away.\r\nGain the tools to pivot quickly from one piece of information to look up other sources of data to get\r\na complete picture of a threat – all one click away.\r\nTrial and purchase threat intelligence feeds from Anomali partners – find the right intelligence for\r\nyour organization, industry, geography, and more.\r\nGain the tools to pivot quickly from one piece of information to look up other sources of data to get\r\na complete picture of a threat – all one click away.\r\nhttps://www.anomali.com/blog/targeted-ransomware-activity\r\nPage 10 of 12\n\nGain the tools to pivot quickly from one piece of information to look up other sources of data to get\r\na complete picture of a threat – all one click away.\r\nPartners Overview\r\nAnomali is dedicated to fostering strong partnerships, ensuring shared success and growth through\r\ncollaborative innovation and mutual support.\r\nTrial and purchase threat intelligence feeds from Anomali partners – find the right intelligence for\r\nyour organization, industry, geography, and more.\r\nTrial and purchase threat intelligence feeds from Anomali partners – find the right intelligence for\r\nyour organization, industry, geography, and more.\r\nTrial and purchase threat intelligence feeds from Anomali partners – find the right intelligence for\r\nyour organization, industry, geography, and more.\r\nTechnology Alliance Partners\r\nTrial and purchase threat intelligence feeds from Anomali partners – find the right intelligence for\r\nyour organization, industry, geography, and more.\r\nTrial and purchase threat intelligence feeds from Anomali partners – find the right intelligence for\r\nyour organization, industry, geography, and more.\r\nTrial and purchase threat intelligence feeds from Anomali partners – find the right intelligence for\r\nyour organization, industry, geography, and more.\r\nTrial and purchase threat intelligence feeds from Anomali partners – find the right intelligence for\r\nyour organization, industry, geography, and more.\r\nTrial and purchase threat intelligence feeds from Anomali partners – find the right intelligence for\r\nyour organization, industry, geography, and more.\r\nTrial and purchase threat intelligence feeds from Anomali partners – find the right intelligence for\r\nyour organization, industry, geography, and more.\r\nBecome a Technology Alliance Partner\r\nTrial and purchase threat intelligence feeds from Anomali partners – find the right intelligence for\r\nyour organization, industry, geography, and more.\r\nBecome a Threat Intel Sharing Partner\r\nTrial and purchase threat intelligence feeds from Anomali partners – find the right intelligence for\r\nyour organization, industry, geography, and more.\r\nhttps://www.anomali.com/blog/targeted-ransomware-activity\r\nPage 11 of 12\n\n404.7\r\nEven our error codes want to\r\nBe Different.\r\nTHIS IS ANOMALI FEED TEXT\r\nTHIS IS ANOMALI FEED TEXT\r\nSource: https://www.anomali.com/blog/targeted-ransomware-activity\r\nhttps://www.anomali.com/blog/targeted-ransomware-activity\r\nPage 12 of 12",
	"extraction_quality": 1,
	"language": "EN",
	"sources": [
		"Malpedia"
	],
	"references": [
		"https://www.anomali.com/blog/targeted-ransomware-activity"
	],
	"report_names": [
		"targeted-ransomware-activity"
	],
	"threat_actors": [],
	"ts_created_at": 1775433991,
	"ts_updated_at": 1775791196,
	"ts_creation_date": 0,
	"ts_modification_date": 0,
	"files": {
		"pdf": "https://archive.orkl.eu/aef69b3a7cdcb31d48bb7e025ca6cfd0d383d85e.pdf",
		"text": "https://archive.orkl.eu/aef69b3a7cdcb31d48bb7e025ca6cfd0d383d85e.txt",
		"img": "https://archive.orkl.eu/aef69b3a7cdcb31d48bb7e025ca6cfd0d383d85e.jpg"
	}
}