Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Ep. 52 - The Russian Cyber Triad: GRU, SVR, FSB Explained

In this episode of the Cyber Resilience Brief, we shift from chaotic cybercriminals to the calculated world of Russian nation-state threat actors—breaking down the three agencies that dominate Russia’s cyber operations: the GRU, SVR, and FSB. What many organizations mistakenly treat as a single “Russian threat” is actually a complex ecosystem of competing intelligence agencies—each with distinct goals, tactics, and operational philosophies.

Ep. 51 - 2026 Cyber War Update: Handala, MuddyWater, and the Rise of Destructive Attacks

Iranian cyber attacks are escalating—shifting from espionage to destructive, large-scale operations. In this episode, we break down what CISOs need to know. Host Tova Dvorin and offensive security expert Adrian Culley analyze the latest Iranian cyber threat activity, including groups like Handala (Void Manticore) and MuddyWater (Mango Sandstorm), and how their tactics are evolving.

Ep. 50 - Inside Trump's 2026 Cyber Strategy: Why "Check-the-Box Security" Is Dead

The U.S. just made its boldest cybersecurity move in decades. In this episode of the Cyber Resilience Brief, we break down President Trump’s 2026 Cyber Strategy—and why it signals a massive shift from reactive defense to proactive, offensive cybersecurity. What does this mean for CISOs, security leaders, and the private sector? We unpack the strategy’s most critical pillars, including: This isn’t regulation—it’s a call to action. And for organizations that fail to continuously validate their defenses, the risks have never been higher.

Ep. 49 - Iran's AI-Powered Cyber Warfare: The Next Phase of the Global Cyber Threat

Iranian cyber operations are entering a new era. In this final episode of our Iran cyber series, we explore how Iranian APT groups are evolving — leveraging AI, targeting supply chains, and bypassing the billion-dollar security stacks built to stop them. Hosts Tova Dvorin and Adrian Culley break down the emerging threats shaping 2026, including: The perimeter is gone. Your weakest vendor may now be your biggest risk.

Ep. 38 - The Evolution of Offensive Cybersecurity

"Hope is not a strategy." The roots of hacking go deeper than you think—all the way back to Bletchley Park and the first computers ever built. In the latest episode, Adrian Culley joins Tova Dvorin to trace the evolution of offensive security: from 1970s "phone freakers" to the sophisticated Breach & Attack Simulation (BAS) of today. The Insight: Penetration testing was a vital evolution, but it’s a "photo of a moving target." Modern resilience requires a "cyber training gym"—a continuous, automated sparring partner that validates your defenses against the latest TTPs 24/7/365.

Ep. 48 - Iran's 12 Days of Cyber War: How Missiles Triggered a Global OT Hacking Campaign

June 2025 marked a turning point in cyber warfare. In this episode of The Cyber Resilience Brief, Tova Dvorin and offensive engineer Adrian Cully break down the cyber escalation that followed Operation Rising Lion—what some analysts now describe as Iran’s 12 days of cyber war. As missiles struck Iranian strategic targets, coordinated hacktivist groups like Cyber Avengers and Handala launched psychological operations, mass SMS spoofing campaigns, and attacks targeting operational technology (OT) systems—including Unitronics PLCs used in water and industrial facilities worldwide.

Ep. 47 - APT42 & Iran's AI Social Engineering: Deepfakes, Phishing & Hack-and-Leak

Iran’s APT42 — also known as Charming Kitten or Mint Sandstorm — is redefining social engineering with generative AI, deepfake voice cloning, and long-term phishing campaigns. In this episode of the Cyber Resilience Brief, we break down how Iranian state-sponsored threat actors are using AI-powered phishing, MFA fatigue attacks, credential harvesting, and hack-and-leak operations to target journalists, political campaigns, academics, and enterprise executives.

Ep. 46 - Blueprint Thieves: Inside Iran's Industrial Espionage Machine

In this episode of _The Cyber Resilience Brief_, we break down the modern reality of *Iranian cyber warfare and industrial espionage*. Host Tova Dvorin and offensive security engineer Adrian Culley analyze the tactics, techniques, and procedures (TTPs) of *APT33, OilRig (APT34), and MuddyWater* — three of the most active Iranian state-sponsored threat actors targeting *energy, aviation, manufacturing, government, and critical infrastructure*.