Home
Categories
EXPLORE
True Crime
Comedy
Society & Culture
Business
Sports
Technology
Health & Fitness
About Us
Contact Us
Copyright
© 2024 PodJoint
Podjoint Logo
US
00:00 / 00:00
Sign in

or

Don't have an account?
Sign up
Forgot password
https://is1-ssl.mzstatic.com/image/thumb/Podcasts221/v4/fc/be/c1/fcbec10e-4fb1-db92-db0d-58c5c94d3009/mza_13266207384991302425.png/600x600bb.jpg
The Cyber Resilience Brief: A SafeBreach Podcast
SafeBreach
27 episodes
6 days ago
Show more...
Technology
News,
Tech News
RSS
All content for The Cyber Resilience Brief: A SafeBreach Podcast is the property of SafeBreach and is served directly from their servers with no modification, redirects, or rehosting. The podcast is not affiliated with or endorsed by Podjoint in any way.
Show more...
Technology
News,
Tech News
https://is1-ssl.mzstatic.com/image/thumb/Podcasts221/v4/fc/be/c1/fcbec10e-4fb1-db92-db0d-58c5c94d3009/mza_13266207384991302425.png/600x600bb.jpg
Ep. 24 - BrickStorm: From LoTL to "Living Off the Blind Spot"
The Cyber Resilience Brief: A SafeBreach Podcast
12 minutes
2 weeks ago
Ep. 24 - BrickStorm: From LoTL to "Living Off the Blind Spot"
In this episode of The Cyber Resilience Brief, host Tova Dvorin and SafeBreach offensive security expert Adrian Culley unpack BrickStorm — a highly sophisticated espionage operation attributed to China-nexus group UNC5221. With an average dwell time of 393 days, this campaign redefines stealth and persistence in cyber warfare. Discover how attackers are “living off the blind spot” by exploiting critical infrastructure gaps in VPNs, VMware vCenter servers, and ESXi hosts — areas traditional security tools can’t see. Adrian breaks down their use of Go-based malware, delayed activation, and a genius offline credential theft technique that clones virtual machines to exfiltrate data undetected. The episode also explores the strategic implications of this new evolution in supply chain attacks, where adversaries steal today to weaponize tomorrow, and how organizations can defend themselves through proactive security testing, Breach and Attack Simulation (BAS), and Continuous Automated Red Teaming (CART). Key topics: UNC5221’s long-term espionage and data exfiltration tactics How attackers evade EDR and traditional defenses Why BrickStorm represents the “next level” in nation-state cyber operations How BAS and CART expose and close blind spots before attackers do
The Cyber Resilience Brief: A SafeBreach Podcast