Artwork
iconShare
 
Manage episode 523168932 series 3675440
Content provided by SafeBreach. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by SafeBreach or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://staging.podcastplayer.com/legal.

In Episode 33 of The Cyber Resilience Brief, hosts Tova Dvorin and Adrian Culley revisit the BRICKSTORM threat—this time through the lens of the new CISA, NSA, and Canadian Cyber Centre joint advisory. While Episode 24 explored BRICKSTORM’s origin, stealth techniques, and UNC5221’s long-term espionage campaign, this episode focuses on what’s changed, and why BRICKSTORM remains a critical concern for defenders in 2025 and into 2026.

Tova and Adrian break down the advisory’s latest findings, including expanded targeting of government and IT sectors, advanced persistence mechanisms, and new insights into how attackers leverage VMware environments to maintain full, covert control of compromised systems.

The conversation underscores a central message: these tactics aren’t static. BRICKSTORM is evolving, and organizations must evolve their defenses too. That means shifting from occasional checks to continuous validation, embracing Breach and Attack Simulation (BAS), and operationalizing threat exposure management to match the pace of modern threat actors.

What’s New in This Episode
  • Key updates from the CISA/NSA/CCCS advisory on BRICKSTORM

  • Evolving persistence and communication-hiding techniques

  • How attackers continue to exploit VMware and web-facing infrastructure

  • Why high-value organizations remain prime targets

  • The growing need for continuous, proactive security validation

  • How BAS helps validate Zero Trust and uncover blind spots before adversaries do

For more information on SafeBreach's BRICKSTORM coverage, click here to read our blog.

  continue reading

33 episodes