Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Intelligence Agencies: Proxy Action & 'Plozny Jurak'

In today’s cyber landscape, intelligence services often rely on proxy networks to expand their reach. Through ransomware affiliates, access brokers, and loosely connected cybercriminal ecosystems — sometimes referred to conceptually as “Plozny Jurak” — states can benefit from disruptive or espionage activity without direct attribution. To dive deeper, watch the full podcast, Blueprint Thieves: Inside Iran’s Industrial Espionage Machine, at the links below.

Ep. 45 - Teen Hackers, SIM Swaps & Russian Ransomware

In Part 2 of our Russia cyber threat series, we unpack the Western cybercrime ecosystem powering Russian ransomware operations. We examine *Scattered Spider, LAPSUS$, and Shiny Hunters*, and how social engineering, SIM swapping, MFA bypass, and AI-driven voice spoofing are breaching Fortune 100 companies — without zero-days. Learn how access brokers commoditize breaches, why help desks are prime targets, and what this shift means for CISOs and security teams.

Ep. 42 - Iran's Cyber Shadow War: IRGC, MOIS, and the Battle for Control

*Episode 2 of 6 – Iran’s Cyber Program Explained* In *Iran’s Cyber Shadow War: IRGC, MOIS, and the Battle for Control*, we continue our deep-dive into Iran’s cyber operations by exposing the internal power struggle driving its most dangerous digital attacks.

The New 2026 China Cybersecurity Law Podcast

A new Chinese cybersecurity law just changed the global threat landscape. In this clip, Tova Dvorin and Adrian Culley break down what went into effect on January 20, 2026—and why it’s unprecedented. Under the updated law, vulnerabilities discovered by Chinese citizens or companies must be reported to the state within 48 hours and cannot be disclosed to vendors until approved. The result? A government-first window to exploit zero-days before they’re patched—at global scale.

AI in Cybersecurity: Force Multiplier or Just More Noise? #podcast #aisecurity #aicybersecurity

Is AI actually making security teams safer—or just adding more noise? In this episode of IEN's Security Breach podcast, SafeBreach CTO Itzik Kotler joins Jeff Reinke to break down how attackers are using AI, why alert fatigue keeps getting worse, and what security teams should focus on before chasing the next “shiny object.” This conversation is a grounded take on preparation, detection engineering, and using AI intentionally—not reactively.

Cyber War is Already Here. CISOs Must Prepare for Cyber Conflict

Cyber warfare isn’t coming—it’s already here. This conversation on The Cyber Resilience Brief dives into the Fifth Domain of Warfare—and why nation-state cyber activity should matter to every organization. From Russia’s chaos-driven campaigns to China’s long-game persistence, Iran’s retaliatory attacks, and North Korea’s financial theft—your network isn’t a bystander.

Ep 9 - Inside Volt Typhoon: Defending Against Chinese State-Sponsored Cyber Threats

In this podcast, we uncover the tactics behind Volt Typhoon, a Chinese state-sponsored operation targeting critical national infrastructure. Learn how this group is moving from espionage to disruption, using stealthy, “living off the land” techniques and exploiting legitimate system tools to hide in plain sight.