Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

SafeBreach's Evolution into an AI-First Development Team: Part 2

In this second installment of a series on the transformation of SafeBreach’s development organization, VP of Development Yossi Attas details a structured operational workflow that integrates Jira, BitBucket, and Claude Code to turn AI usage from ad-hoc prompting into a rigorous engineering methodology.

Ep. 47 - APT42 & Iran's AI Social Engineering: Deepfakes, Phishing & Hack-and-Leak

Iran’s APT42 — also known as Charming Kitten or Mint Sandstorm — is redefining social engineering with generative AI, deepfake voice cloning, and long-term phishing campaigns. In this episode of the Cyber Resilience Brief, we break down how Iranian state-sponsored threat actors are using AI-powered phishing, MFA fatigue attacks, credential harvesting, and hack-and-leak operations to target journalists, political campaigns, academics, and enterprise executives.

Engineer Custom Attack Validation at Scale - with the Developer-First VS Code Workflow for Breach Studio

The new SafeBreach extension for VS Code integrates Breach Studio’s powerful custom attack development capabilities directly into the world’s most popular IDE to enable security teams to engineer custom attack simulations with unprecedented speed and precision. Security engineers can leverage Git-native version control, AI-assisted authoring, and real-time IntelliSense linting to eliminate friction and reduce failed executions.

EventLog-in: Propagating With Weak Credentials Using the Eventlog Service in Microsoft Windows (CVE-2025-29969)

While attackers often find low-privileged credentials after creating a process dump of LSASS or harvesting hashes with a tool like Responder, they are rarely able to do anything with those credentials (RDP aside). We set out to discover how malicious actors might exploit Microsoft Windows remote procedure call (RPC) protocols to gather data remotely as a low-privileged user using RPC as an attack surface.

SafeBreach's Evolution into an AI-First Development Team: Part I

In this first installment of a series on the transformation of SafeBreach’s development organization, VP of Development Yossi Attas outlines how his team is managing the strategic shift toward an AI-First development methodology. This includes moving beyond simple tool adoption to a fundamental redefinition of the software engineer’s role. Read on as we explore.

Intelligence Agencies: Proxy Action & 'Plozny Jurak'

In today’s cyber landscape, intelligence services often rely on proxy networks to expand their reach. Through ransomware affiliates, access brokers, and loosely connected cybercriminal ecosystems — sometimes referred to conceptually as “Plozny Jurak” — states can benefit from disruptive or espionage activity without direct attribution. To dive deeper, watch the full podcast, Blueprint Thieves: Inside Iran’s Industrial Espionage Machine, at the links below.

Ep. 46 - Blueprint Thieves: Inside Iran's Industrial Espionage Machine

In this episode of _The Cyber Resilience Brief_, we break down the modern reality of *Iranian cyber warfare and industrial espionage*. Host Tova Dvorin and offensive security engineer Adrian Culley analyze the tactics, techniques, and procedures (TTPs) of *APT33, OilRig (APT34), and MuddyWater* — three of the most active Iranian state-sponsored threat actors targeting *energy, aviation, manufacturing, government, and critical infrastructure*.

Ep. 45 - Teen Hackers, SIM Swaps & Russian Ransomware

In Part 2 of our Russia cyber threat series, we unpack the Western cybercrime ecosystem powering Russian ransomware operations. We examine *Scattered Spider, LAPSUS$, and Shiny Hunters*, and how social engineering, SIM swapping, MFA bypass, and AI-driven voice spoofing are breaching Fortune 100 companies — without zero-days. Learn how access brokers commoditize breaches, why help desks are prime targets, and what this shift means for CISOs and security teams.