New capability

Intelligence-Led Attack Simulation at Machine Speed

Scrutex CART maps active threat actors in your region and sector, extracts their TTPs, and drives AI agents to execute continuous red teaming and penetration testing — automatically, at a fraction of the cost of a manual engagement.

185+

Tracked threat actors

3–5×

Faster than manual engagements

MITRE

ATT&CK mapped TTPs

24/7

Continuous testing coverage

Methodology

From threat intelligence to attack execution

The same intelligence-led methodology that regulators mandate for TIBAS, iCAST, and TIBER-EU — automated and continuous.

01 / Identify

Threat Actor Identification

Scrutex maps threat actors active in your region and sector from our database of 185+ profiled groups. Every actor is tagged by geography, industry vertical, and motivation.

02 / Extract

TTP Extraction & Mapping

Each actor’s tactics, techniques, and procedures are extracted and mapped to MITRE ATT&CK. Attack chains are constructed reflecting actual adversary behaviour, not generic test scripts.

03 / Simulate

Agentic Attack Execution

AI agents execute the mapped attack chains against your environment — replicating real adversary tradecraft across your external attack surface, applications, and infrastructure.

04 / Report

Actionable Findings

Every simulation produces a structured findings report with risk ratings, attack path evidence, and prioritised remediation guidance — ready for your security team and regulators.

Services

Two complementary capabilities

CART and automated penetration testing work together to give you continuous coverage and point-in-time compliance evidence.

Continuous

Continuous Automated Red Teaming (CART)

Red teaming as a continuous process, not an annual event. Scrutex runs ongoing adversarial simulations against your environment using the latest intelligence on who is targeting your sector — and how.

  • Region and sector-specific threat actor profiling
  • TTP-driven attack scenario generation, updated in real time
  • AI agent execution across external attack surface
  • Continuous coverage between formal regulatory test cycles
  • Aligned with TIBER-EU, iCAST, TIBAS, CBEST methodology
  • Purple team replay and remediation tracking
On-demand

Automated Penetration Testing

Point-in-time penetration tests executed by AI agents, structured to produce the technical evidence and reporting formats required for compliance submissions under GL20, C‑RAF, and equivalent frameworks.

  • External attack surface pen testing
  • Web application and API security testing
  • Scenario coverage aligned to regulatory requirements
  • 3 or 5 end-to-end scenario coverage (TIBAS medium/high)
  • Structured compliance report output
  • Human expert review and sign-off available
Regulatory alignment

Built for the frameworks your regulators require

Scrutex operationalises the threat intelligence methodology at the core of every major intelligence-led testing framework globally.

🇭🇰

TIBAS

Hong Kong Insurance Authority · GL20

Scrutex provides the BAS platform layer and threat intelligence feed for TIBAS engagements. IA-acknowledged automated BAS tools are permitted for service providers under GL20.

Platform delivery

🇭🇰

iCAST

Hong Kong Monetary Authority · C-RAF

Scrutex serves as the Threat Intelligence Provider (TIP) component — region and sector-specific TTP mapping — feeding bespoke scenarios into the red team execution phase.

TIP layer

🇪🇺

TIBER-EU / DORA TLPT

European Central Bank · DORA Art. 26

Scrutex’s CART fills the continuous assurance gap between mandatory 3-year TLPT cycles. The threat intelligence layer also supports the external TIP function in partnered formal engagements.

Between-TLPT coverage

🇬🇧

CBEST

Bank of England · PRA / FCA

Provides the Threat Intelligence Service Provider (TISP) component for UK financial market infrastructure tests — bespoke intelligence on threat actors relevant to the UK financial sector.

TIP layer

🇸🇦

FEER

Saudi Arabian Monetary Authority

Scrutex maps threat actors targeting Middle East financial institutions, providing intelligence-driven scenario design for SAMA FEER engagements.

TIP layer

🇸🇬

AASE

Monetary Authority of Singapore · ABS

Supports MAS AASE requirements with Singapore-specific threat actor profiles, regional TTP mapping, and end-to-end scenario design.

Between-AASE coverage

🇦🇺

CORIE

Cyber Security CRC · Australian FS sector

Australian-specific threat actor mapping for the financial sector, supporting CORIE intelligence-led exercises. Aligned with APRA CPS 234 and the Cyber Security Act 2024.

TIP layer

🌐

Broader CTEM

All sectors · All geographies

For organisations outside formal TLPT mandates, Scrutex CART delivers the full intelligence-led red teaming programme — continuous, automated, and aligned with Gartner’s CTEM framework.

Full programme
Why Scrutex CART

What makes this different

Traditional red team engagements happen once or twice a year. Attackers don’t wait. Scrutex runs continuously.

Regional threat actor mapping

Your simulation is built from intelligence on actors actually targeting your region and sector — not generic payloads from a tool library.

Agentic execution

AI agents execute multi-step attack chains autonomously — replicating how real adversaries operate across your environment.

Continuous, not annual

No waiting 12 months for your next engagement. CART runs continuously and alerts when your posture changes relative to threat actor capabilities.

Fraction of the cost

Manual TLPT engagements cost $50K–$200K and take months. Scrutex delivers comparable intelligence-led coverage at a fraction of that investment.

Compliance-ready output

Structured reports formatted for TIBAS, iCAST, APRA, and other regulatory submissions — not generic PDF pen test exports.

Partner-ready

Designed for MSSPs and qualified consultants to deliver TIBAS and iCAST engagements using Scrutex as the intelligence and simulation layer.

Ready to run your first intelligence-led simulation?

Book a live demo and we\u2019ll show you which threat actors are targeting your sector, and how CART simulates their TTPs against your environment.