Syndicated Blog

SafeBreach
The Leading Continuous Breach and Attack Simulation Platform | SafeBreach
SafeBreach Coverage for AA24-109A (Akira Ransomware)

SafeBreach Coverage for AA24-109A (Akira Ransomware)

|
FBI, CISA, EC3, and NCSC-NL issued an urgent advisory highlighting the use of new TTPs and IOCs by the Akira ransomware group. The post SafeBreach Coverage for AA24-109A (Akira Ransomware) appeared first ...
Cortex EDR Research Shmuel Cohen

The Dark Side of EDR: Repurpose EDR as an Offensive Tool

|
See how a SafeBreach Labs researcher bypassed the anti-tampering mechanism of a leading EDR to execute malicious code within one of the EDR's own processes and altered the mechanism to gain unique, ...
MagicDot SafeBreach

MagicDot: A Hacker’s Magic Show of Disappearing Dots and Spaces

|
See how a SafeBreach Labs researcher discovered a set of vulnerabilities and unprivileged rootkit-like techniques leveraging a known issue within the Microsoft Windows DOS-to-NT path conversion process. The post MagicDot: A Hacker’s ...
Building Resiliency in the Face of Ransomware 

Building Resiliency in the Face of Ransomware 

|
Ransomware is not going away. So how can organizations defend against it? Dig deeper to learn how to build cybersecurity resiliency. The post Building Resiliency in the Face of Ransomware  appeared first ...
A Look Back with SafeBreach’s Co-Founders

A Look Back with SafeBreach’s Co-Founders

|
CEO Guy Bejerano and CTO Itzik Kotler reflect on the highs, lows, and lessons learned since founding SafeBreach one decade ago.  The post A Look Back with SafeBreach’s Co-Founders appeared first on ...
Complex Scenarios: Branching & Success Criteria

Replicating Realistic Threat Behavior is Critical to Red Teaming, But It Doesn’t Have to Be Complicated

|
SafeBreach Studio’s conditional branching allows security teams to replicate dynamic and realistic attacker behavior without complex coding or programming The post Replicating Realistic Threat Behavior is Critical to Red Teaming, But It ...
How a Fortune 500 data company leveraged SafeBreach to transition to 100% cloud

How a Fortune 500 data company leveraged SafeBreach to transition to 100% cloud

|
When a large data company decided to migrate their systems fully to the cloud, their cybersecurity team knew it would be a challenge. “Our CTO said, we're going completely to cloud. Everyone ...
SafeBreach Coverage for AA24-060A (Phobos Ransomware) and AA24-060B (Ivanti Connect Secure)

SafeBreach Coverage for AA24-060A (Phobos Ransomware) and AA24-060B (Ivanti Connect Secure)

|
CISA issued two separate advisories related to malicious behavior exhibited by threat actors. AA24-060A pertains to Phobos Ransomware and AA24-060B pertains to exploitation of vulnerabilities in Ivanti Connect Secure and Policy Secure ...
™

ALPHV Blackcat, GCP-Native Attacks, Bandook RAT, NoaBot Miner, Ivanti Secure Vulnerabilities, and More: Hacker’s Playbook Threat Coverage Round-up: February 2024

|
New and updated coverage for ransomware and malware variants, including ALPHV Blackcat, NoaBot Miner, and others. The post ALPHV Blackcat, GCP-Native Attacks, Bandook RAT, NoaBot Miner, Ivanti Secure Vulnerabilities, and More: Hacker’s ...
Ten Years of SafeBreach

10 Years of SafeBreach

|
Join us as we reflect on the professional milestones and personal memories from our decade-long journey as pioneers in the breach and attack simulation industry. The post 10 Years of SafeBreach appeared ...

Secure Guardrails