Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Ep 9 - Inside Volt Typhoon: Defending Against Chinese State-Sponsored Cyber Threats

In this podcast, we uncover the tactics behind Volt Typhoon, a Chinese state-sponsored operation targeting critical national infrastructure. Learn how this group is moving from espionage to disruption, using stealthy, “living off the land” techniques and exploiting legitimate system tools to hide in plain sight.

Ep 11 - Salt Typhoon Exposed: Breaking Down CISA Advisory AA25-239

In this special episode of The Cyber Resilience Brief, Tova Dvorin and Adrian Culley break down CISA Advisory AA25-239—a joint alert from CISA, NSA, FBI, and global cyber partners on the long-running Chinese state-sponsored threat group Salt Typhoon. Salt Typhoon has been quietly infiltrating critical infrastructure for years by exploiting outdated routers, weak credentials, and “living off the land” techniques like PowerShell, WMI, scheduled tasks, and built-in administrative tools—making them nearly invisible.

Ep 12 - Women in Cyber: Voices of Resilience and Change

Celebrate Women in Cyber Day with us on this episode of the SafeBreach podcast! We explore the evolving role of women in cybersecurity, diving into the unique challenges and privileges they face in a traditionally male-dominated field. Our guests discuss the power of mentorship, confidence, and community support, while highlighting the importance of tailored training and leadership representation. Tune in to hear inspiring insights on how creating opportunities and connections can help build a more inclusive and diverse cybersecurity landscape.

Ep 10 - Beyond CVEs: Why Patching Isn't Enough to Stop Breaches

Most security teams obsess over patching CVEs—but even perfect patch compliance won’t keep you safe. In this episode, SafeBreach Co-Founder & CTO Itzik Kotler and VP of Sales Engineering Michael De Groat reveal the real exposures that hide between patches, from misconfigurations and identity gaps to insider threats, social engineering, and zero-days. Hear why attackers exploit more than just known vulnerabilities, and how adopting an assumed-breach mindset with adversarial simulation strengthens real-world resilience.

Ep 6. Storm-2603 & Warlock: Where Ransomware-as-a-Service Gets Real

A new breed of ransomware is here — and it’s more dangerous than ever. In this episode of the Cyber Resilience Podcast, we unpack the chilling rise of Warlock ransomware, a campaign tied to Chinese threat actor Storm-2603. Discover how this group is combining nation-state tactics with ransomware-as-a-service operations, blurring the line between espionage and profit—and what it means for critical infrastructure defense.

Ep 5. Interlock Ransomware: Don't Accept Code from Strangers

In this episode of the SafeBreach Cyber Resilience Podcast, host Tova Dvorin and Adrian Culley dive deep into Interlock—one of today’s most aggressive ransomware operations. What you’ll learn: From hospitals to schools, no one’s immune—hear how Interlock is rewriting the ransomware playbook and what your team can do to stay resilient.

Ep 2. FBI Advisory, Iranian Threats & Resilience

The FBI, NSA, and CISA just issued a warning about Iranian state-backed actors, including the notorious Cyber Avengers, targeting US networks—especially OT, IoT, water, and aviation systems. These groups aren’t hacktivists—they’re highly skilled, sanctioned members of the IRGC. Key takeaways: Stay proactive: run simulations, remediate vulnerabilities, and lock the stable door before the horse bolts.

Ep 4. ToolShell in the Wild: SharePoint Zero-Day CVE-2025-53770 Explained

In this special episode, host Tova Dvorin sits down with SafeBreach experts Adrian Culley and Tomer Bar to unpack CVE-2025-53770 — a zero-day deserialization flaw in Microsoft SharePoint Server that enables unauthenticated remote code execution and long-term persistence. This isn’t theoretical. It’s actively exploited and tied to the evolving ToolShell attack chain. Here’s what you’ll hear in this episode.

Ep 3. Palo Alto Networks Research and AI Generated Attacks

AI isn’t just changing cyber defense—it’s transforming how attacks happen. In this episode, Tova Dvorin sits down with Tomer Bar and Shelly Zucker from SafeBreach to explore how AI-powered threats are reshaping the battlefield. Hear about: If you’re in cybersecurity, risk, or IT, this is your must-listen guide to preparing for the AI-enabled threat era.

SafeBreach Coverage for Updated CISA AR25-338A: BRICKSTORM Backdoor

On December 4, 2025, the U.S. Cybersecurity and Infrastructure Security Agency (CISA), National Security Agency (NSA), and the Canadian Centre for Cyber Security jointly released Malware Analysis Report AR25-338A analyzing BrickStorm malware, a sophisticated backdoor attributed to the People’s Republic of China (PRC) state-sponsored cyber actors.

Ep 1. Building DORA Ready Defenses

In this premiere episode of The Cyber Resilience Brief, we dive into the EU’s Digital Operational Resilience Act (DORA) — and why its impact goes far beyond Europe. Host Tova Dvorin is joined by Adrian Culley and David Murray from SafeBreach to break down what means for financial institutions, insurers, and ICT providers worldwide. The session covers: Listen now for actionable insights on evolving from incident response to instant anticipation, staying ahead of attackers, and meeting tomorrow’s regulatory demands today.