Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

The Next-Level Threat: Defending Against BrickStorm and the 393-Day Dwell Time

A new threat campaign, codenamed BrickStorm and attributed to a China nexus group tracked as UNC5221, has security researchers sounding the alarm. This is a highly sophisticated espionage operation, and its most staggering feature is the adversary’s patience. The astonishing average time they remain inside a victim’s network before being detected is well over a year—393 days to be exact.

The Power of Detection Engineering & Custom Parsers

In the fast-paced world of cybersecurity, detection engineering is a growing discipline that helps organizations stay ahead of threats. But success isn’t just about having the right tools or detection workflows in place—it’s about making sure those tools speak the same language to help you scale your efforts and better understand your overall security posture. This is where parsers play a critical role.

SafeBreach

The Only Exposure Validation Platform with Enterprise Expertise Get BAS and CART in one platform that is built to exceed enterprise safety requirements and is backed by a world-renowned research team you won’t find anywhere else. SafeBreach Validate: An award-winning BAS tool designed to utilize the TTPs of malicious actors to test the efficacy of deployed security controls against real-world threats to help you.

Lessons from the Dark Web: What Hackers Teach Us about Cyber Resilience

With a background in philosophy, my transition into the world of cybersecurity as a penetration tester sparked a deep curiosity about the inner workings of the prolific cybercrime groups I saw in the news. To better defend against these groups, I needed to understand more about how they worked, specifically how they recruited people, vetted them, and turned their skills into a profitable business model.

Webinar: SafeBreach Validate + Propagate = Better Together

Webinar: SafeBreach Validate + Propagate = Better Together Discover how combining SafeBreach Validate and Propagate empowers security teams to continuously assess and strengthen their defenses. In this session, our experts will show how integrated breach and attack simulation (BAS) with automated attack path validation can help you.

The Cyber Resilience Act and DORA: Driving Continuous Cybersecurity

The EU Cyber Resilience Act (CRA) and the Digital Operational Resilience Act (DORA) are shaping the regulatory landscape for cybersecurity in Europe and across the globe. While DORA focuses on the financial sector and ICT providers, the upcoming CRA will extend requirements to all digital products and services, emphasizing secure-by-design practices and software resilience.

Ep. 7 - You've Just Run a Penetration Test, What's Next Beyond Pen Testing

In this episode, you'll learn: What happens after a traditional penetration test? In this episode, host Tova Dvorin is joined by Adrian Culley, Senior Sales Engineer and EU lead at SafeBreach, to explore the critical evolution from legacy pentesting to continuous, automated red teaming (CART) and breach and attack simulation (BAS).

Scattered Spider: What You Need to Know

Founded around 2022, Scattered Spider is a well-known group of young, English-speaking threat actors believed to be from the US and UK. The group—which has some members as young as 16—first gained global recognition in September 2023 when they successfully hacked the internal systems of both Caesars Entertainment and MGM Resorts, obtaining sensitive data they used to extort the casinos.

SafeBreach Coverage for CISA Analysis Report AR25-261A: Malicious Listener for Ivanti Endpoint Mobile Management Systems

On September 18, 2025, an Analysis Report was issued by CISA that details information about two sets of malware it obtained from an organization that was compromised during May 2025. To gain initial access, the threat actors chained together known vulnerabilities outlined in CVE-2025-4427 and CVE-2025-4428 in Ivanti Endpoint Manager Mobile (Ivanti EPMM) before deploying the malware, which allowed them to achieve remote code execution (RCE).

Proving DORA Requirements with the SafeBreach Platform

Complying with the Digital Operational Resilience Act (DORA) means proving that resilience is built into daily operations through ongoing, evidence-backed practices. SafeBreach, the leader in enterprise exposure validation, helps institutions meet DORA’s key requirements by simulating real-world threats across the MITRE ATT&CK framework.