Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Building Digital Operational Resilience in the DORA Era

In this session, our team breaks down the Digital Operational Resilience Act (DORA) — the EU regulation reshaping cybersecurity expectations across the financial sector. DORA mandates continuous testing and validation of critical live production systems, emphasizing adversary emulation and real-world attack simulations to ensure true operational resilience. Learn how organizations are adapting their programs, what the rise of the Chief Resilience Officer means for cybersecurity leadership, and how continuous validation supports both compliance and readiness.

LDAP Nightmare - Windows LDAP Denial of Service Vulnerability

In this technical webinar, SafeBreach security experts explore recent LDAP vulnerabilities, focusing on CVE-2024-49113 — a critical flaw capable of crashing unpatched Windows Servers. The team breaks down: This session emphasizes the importance of proactive patching, continuous validation, and understanding the underlying mechanics of directory services to strengthen enterprise resilience.

From Chaos to Clarity: How SafeBreach Parsers Elevate Detection Engineering at Scale

Unlock the power of proactive security. Stop drowning in alert fatigue and chaos. Learn how to fix manual Detection Engineering processes that fail to keep up with evolving threats and cause critical coverage gaps. Watch this on-demand webinar to learn how SafeBreach’s new, effortless Parsers and a robust Breach and Attack Simulation (BAS) strategy can transform your security operations from reactive firefighting to continuous, proactive defense.

The Next-Level Threat: Defending Against BrickStorm and the 393-Day Dwell Time

A new threat campaign, codenamed BrickStorm and attributed to a China nexus group tracked as UNC5221, has security researchers sounding the alarm. This is a highly sophisticated espionage operation, and its most staggering feature is the adversary’s patience. The astonishing average time they remain inside a victim’s network before being detected is well over a year—393 days to be exact.

The Power of Detection Engineering & Custom Parsers

In the fast-paced world of cybersecurity, detection engineering is a growing discipline that helps organizations stay ahead of threats. But success isn’t just about having the right tools or detection workflows in place—it’s about making sure those tools speak the same language to help you scale your efforts and better understand your overall security posture. This is where parsers play a critical role.

SafeBreach

The Only Exposure Validation Platform with Enterprise Expertise Get BAS and CART in one platform that is built to exceed enterprise safety requirements and is backed by a world-renowned research team you won’t find anywhere else. SafeBreach Validate: An award-winning BAS tool designed to utilize the TTPs of malicious actors to test the efficacy of deployed security controls against real-world threats to help you.

Lessons from the Dark Web: What Hackers Teach Us about Cyber Resilience

With a background in philosophy, my transition into the world of cybersecurity as a penetration tester sparked a deep curiosity about the inner workings of the prolific cybercrime groups I saw in the news. To better defend against these groups, I needed to understand more about how they worked, specifically how they recruited people, vetted them, and turned their skills into a profitable business model.

Webinar: SafeBreach Validate + Propagate = Better Together

Webinar: SafeBreach Validate + Propagate = Better Together Discover how combining SafeBreach Validate and Propagate empowers security teams to continuously assess and strengthen their defenses. In this session, our experts will show how integrated breach and attack simulation (BAS) with automated attack path validation can help you.

The Cyber Resilience Act and DORA: Driving Continuous Cybersecurity

The EU Cyber Resilience Act (CRA) and the Digital Operational Resilience Act (DORA) are shaping the regulatory landscape for cybersecurity in Europe and across the globe. While DORA focuses on the financial sector and ICT providers, the upcoming CRA will extend requirements to all digital products and services, emphasizing secure-by-design practices and software resilience.

Ep. 7 - You've Just Run a Penetration Test, What's Next Beyond Pen Testing

In this episode, you'll learn: What happens after a traditional penetration test? In this episode, host Tova Dvorin is joined by Adrian Culley, Senior Sales Engineer and EU lead at SafeBreach, to explore the critical evolution from legacy pentesting to continuous, automated red teaming (CART) and breach and attack simulation (BAS).