Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Ep. 59 - Russia's Cyber Arsenal Exposed: Defeating the FSB, GRU, and BlackCat Before They Strike

In the finale of our Russian intelligence and proxy threat series, SafeBreach engineer Adrian Culley joins host Tova Dvorin to turn five episodes of analysis into concrete, actionable defense. The threat is real—now here's how you stop it.

Ep. 58 - Double Dragon: How China's APT 41 Works for the State by Day - and Itself by Night

China's cyber shadow has already reached your software. APT 41 — known as Double Dragon — isn't just stealing state secrets. They've pioneered a new generation of supply chain attacks, trojanizing the shared code libraries that thousands of organizations trust without question. And their latest splinter unit, UAT 7290, has been inside North American developer environments for over a year — not triggering anything, just watching, learning, and waiting to strike in a way that looks completely native.

The CRINK Catalog: In-Depth Resources to Navigate a New Era of Cyber Threats

The emergence of the CRINK axis—a coordinated cyber-threat nexus comprised of China, Russia, Iran, and North Korea—has dramatically impacted the 2026 global risk landscape. As these nation-states utilize AI-driven scale and living-off-the-land (LOTL) tactics to target critical infrastructure, SafeBreach’s new content series provides essential intelligence on their evolving motivations and methods.

Dirty Frag Vulnerability (CVE-2026-43284 & CVE-2026-43500): Why Reliable Linux Privilege Escalation Changes the Defense Equation

Dirty Frag (comprising CVE-2026-43284 and CVE-2026-43500) is a high-impact Linux kernel vulnerability chain that enables deterministic, reliable local privilege escalation (LPE) to root across major enterprise distributions. Unlike previous race-condition exploits, this logic flaw in the IPsec ESP and RxRPC subsystems offers a near 100% success rate, allowing attackers to escalate from a minor foothold to full system control without triggering typical kernel panics.

Ep. 57 - Russia's Proxy Bridge: BlackCat, Scattered Spider, and the Kremlin

In Part 4 of our Russian intelligence series, host Tova Dvorin and Adrian Culley map the proxy bridge between Western teenage hackers and Moscow. BlackCat (ALPHV) ransomware-as-a-service is the operational hinge: Scattered Spider breaks in, BlackCat encrypts, and the FSB watches the dashboard. Hear how the Kremlin earns plausible deniability, why a $115M extortion stream self-funds Russian intelligence, and what MI6's new "hybrid shadow war" warning means for defenders simulating Rust-based ransomware in their own networks.

"Copy Fail" Vulnerability (CVE-2026-31431): Linux Kernel Privilege Escalation

CVE-2026-31431— the “Copy Fail” vulnerability—is a critical local privilege escalation (LPE) flaw in the Linux kernel’s cryptographic subsystem that allows unprivileged users to gain root access with near-perfect reliability. Boasting a CVSS score of 7.8 and affecting nearly every mainstream distribution since 2017 (including Ubuntu, RHEL, and Amazon Linux), Copy Fail has been added to the CISA KEV catalog due to its active exploitation and portable, low-footprint nature.

CTEM Explained in 60 Seconds (And Why Your Security Strategy Has Gaps)

(CTEM) Continuous Threat Exposure Management—isn't just another framework. It's a philosophy for finally connecting the parts of your security program that aren't talking to each other. SafeBreach Helm makes it actionable for any organization, no matter where you're starting from.

Ep. 56 - 10,000 Bugs, 12 That Matter: Using AI to Cut Through Exposure Noise with CTEM

Are you still stuck on the vulnerability hamster wheel? In this episode of the Cyber Resilience Brief, host Tova Dvorin is joined by SafeBreach VP of Product Koby Bar and offensive security expert Adrian Culley to unpack a major shift in how enterprises approach proactive security — and to announce the launch of SafeBreach Helm, the AI validation layer built for Continuous Threat Exposure Management (CTEM).

Ep. 55 - The 'Typhoon' Hack: How China Hid Inside Your Home Router

Your home router isn’t just sitting there. It might already be part of a global cyberattack. In Part 2 of our deep dive into Chinese cyber operations, Tova Dvorin and Adrian Culley unpack the “Typhoon” threat groups—Volt Typhoon, Salt Typhoon, and Flax Typhoon—and how they’re quietly reshaping modern cyber warfare. This isn’t about stealing data. It’s about staying hidden, pre-positioning, and being ready to strike.