Skip to main content
Suzu Logo
  • Home
  • Product
  • Our Solutions
    • AI Advisory
    • AI Assessment
    • AI Integration
    • Cybersecurity Services
  • About
    • About Us
    • FAQ's
  • Resources
    • Blog
    • In The Media
    • Podcasts
    • All Resources
Contact Us
Back to Blog
Threat Intelligence Cybersecurity Incident Response Offensive Security Purple Teaming Red Teaming

Simply Offensive Podcast: Emulated Cyber Crime with Dahvid Schloss

Phillip Wylie February 10, 2026 3 min read
Table of Contents

    Beyond the Pentest: Why Adversarial Emulation is the Future of Defensive Training

    Many organizations operate under the assumption that a clean pentest report means they are secure. However, as Dahvid Schloss explains, there is a massive gap between checking for vulnerabilities and actually preparing for a criminal onslaught.

     The Three Tiers of Risk

    Schloss breaks down offensive testing into three distinct buckets to help organizations understand what they are actually buying:

      • Hypothetical Risk (Vulnerability Scanning): This identifies missing patches or potential weaknesses without proving they can be exploited. It’s a "maybe".

      • Practical Risk (Penetration Testing): A scoped, controlled test to see if a specific vertical (like a web app or active directory) can be breached. It proves the hypothetical but doesn't necessarily show the risk to business revenue.

      • Real Risk (Adversarial Emulation/Red Teaming): This mimics actual criminal or nation-state behavior. It has no "scope" in terms of attack paths, focusing instead on how an attacker moves from zero access to a major business impact.

    "Train How You Fight"

    The term "Red Team" originated in the Vietnam War era when the U.S. Army needed to train for guerrilla warfare; a style of combat they weren't used to. The philosophy was simple: train how you fight [05:32]. Schloss argues that in cybersecurity, you don't want to be performing "CPR" for the first time during a real breach. Adversarial emulation provides a sparring partner so defenders can run their playbooks before the stakes are real [12:11].

    The "Purple Team" Necessity

    Is Purple Teaming a new discipline? Not exactly. Schloss views it as a "necessity created by poor red teaming" [15:52]. True red teaming should always have included a sit down between attackers and defenders to bridge the gap. Because the industry shifted toward a "you vs. me" gatekeeping mentality, Purple Teaming emerged to force the collaboration that should have been happening all along [16:42].

    Custom Tooling vs. "Script Kiddies"

    There is a common myth that all cybercriminals are elite hackers writing custom zero-days. In reality, many are "script kiddies" using Google and existing tech because it's easier [18:23]. However, the danger lies in the more advanced actors who build custom loaders and agents. These don't have to be complex, custom code simply equals evasion because it doesn't match the signatures that EDR tools like CrowdStrike or Sentinel One are looking for [19:04].

    The Current State of AI in Offensive Security

    Despite the hype, Schloss is skeptical of "autonomous AI red teams." He notes that:

      • AI is an amplifier: It can speed up recon and help write decent malware, but it isn't bypassing top-tier security controls on its own yet.

      • Operational Security (OPSEC): AI currently lacks the nuanced OPSEC required to stay undetected in a well-guarded environment. If an environment is strong enough to catch Metasploit, it will likely catch current AI agents too.

      • The Timeline: He estimates we are still 1 to 5 years away from AI truly emulating the desperation and creativity of human attackers.

    Final Takeaway

    The goal of security isn't just to stop an exploit; it's to understand what the criminal actually wants (PII, ransomware, etc.) and ensure the defensive team knows exactly who to call and what to do when that specific threat appears.


    Watch the full episode here: Emulated Cyber Crime with Dahvid Schloss


    Tags: Threat Intelligence Cybersecurity Incident Response Offensive Security Purple Teaming Red Teaming
    Phillip Wylie
    Phillip Wylie
    ← Previous Under Armour Breach: What The Forum Data Actually Shows Next → Simply Offensive Podcast: Exploring AI Vulnerabilities in Cybersecurity with Mike Bell of Suzu Labs

    Latest Posts

    View All
    Simply Offensive Podcast: The Future of Pentesting: AI, Automation, and Better Reporting with Dan DeCloss
    Cybersecurity
    Mar 16, 2026 Phillip Wylie

    Simply Offensive Podcast: The Future of Pentesting: AI, Automation, and Better Reporting with Dan DeCloss

    The Future of Pentesting: AI, Automation, and Better Reporting with Dan DeCloss In this episode of Simply Offensive, ...

    Read More
    From Silence to Strike: Tracking Iran's Cyber Escalation in Real Time
    Critical Infrastructure
    Mar 13, 2026 Denis Calderone

    From Silence to Strike: Tracking Iran's Cyber Escalation in Real Time

    On March 12, medical technology giant Stryker confirmed a cyberattack that wiped devices across 79 countries. The ...

    Read More
    Internal Analysis: Even Realities G2 Smart Glasses Security & Privacy Investigation
    Social Engineering
    Mar 09, 2026 Suzu Labs Intelligence

    Internal Analysis: Even Realities G2 Smart Glasses Security & Privacy Investigation

    Executive Summary Even Realities markets its G2 smart glasses as the privacy-conscious alternative to Meta Ray-Bans. ...

    Read More
    The Company Reviewing Your Meta Glasses Footage Has a Security Problem
    Threat Intelligence
    Mar 06, 2026 Mike Bell

    The Company Reviewing Your Meta Glasses Footage Has a Security Problem

    Last week, Swedish journalists revealed that Meta sends video footage from Meta Ray-Ban smart glasses to human data ...

    Read More
    The Death of the CTF: How Agentic AI Is Reshaping Competitive Hacking
    CTF
    Mar 03, 2026 Jacob Krell

    The Death of the CTF: How Agentic AI Is Reshaping Competitive Hacking

    View White Paper Abstract: Agentic AI systems are compressing competitive hacking timelines faster than the ...

    Read More
    Simply Offensive Podcast: AI Killed the CTF Star with Jacob Krell
    Cybersecurity
    Mar 03, 2026 Phillip Wylie

    Simply Offensive Podcast: AI Killed the CTF Star with Jacob Krell

    In this thought-provoking episode of Simply Offensive, host Philip Wylie sits down with Jacob Krell, a penetration ...

    Read More
    Anthropic and Claude: 2026 AI Powerhouse
    Supply Chain Security
    Feb 26, 2026 Hannah Perez

    Anthropic and Claude: 2026 AI Powerhouse

    In early 2026, the image of Anthropic as a cautious, safety-oriented "research lab" has effectively been replaced by ...

    Read More
    Simply Offensive Podcast: Navigating AI's Challenges in Problem Solving with Darius Houle
    Cybersecurity
    Feb 24, 2026 Phillip Wylie

    Simply Offensive Podcast: Navigating AI's Challenges in Problem Solving with Darius Houle

    In this episode of Simply Offensive, host Philip Wylie welcomes Darius Houle, an Application Security (AppSec) and ...

    Read More
    Simply Offensive Podcast: Exploring the World of Hardware Hacking with Matt Brown
    Cybersecurity
    Feb 17, 2026 Phillip Wylie

    Simply Offensive Podcast: Exploring the World of Hardware Hacking with Matt Brown

    In the latest episode of the Simply Offensive podcast, host Philip Wylie sat down with Matt Brown, a renowned hardware ...

    Read More
    Simply Offensive Podcast: Exploring AI Vulnerabilities in Cybersecurity with Mike Bell of Suzu Labs
    Cybersecurity
    Feb 12, 2026 Phillip Wylie

    Simply Offensive Podcast: Exploring AI Vulnerabilities in Cybersecurity with Mike Bell of Suzu Labs

    In today’s rapidly evolving technological landscape, the convergence of artificial intelligence (AI) and cybersecurity ...

    Read More
    Simply Offensive Podcast: Emulated Cyber Crime with Dahvid Schloss
    Threat Intelligence
    Feb 10, 2026 Phillip Wylie

    Simply Offensive Podcast: Emulated Cyber Crime with Dahvid Schloss

    Beyond the Pentest: Why Adversarial Emulation is the Future of Defensive Training Many organizations operate under the ...

    Read More
    Under Armour Breach: What The Forum Data Actually Shows
    Threat Intelligence
    Jan 30, 2026 Mike Bell

    Under Armour Breach: What The Forum Data Actually Shows

    On January 18, 2026, the Everest ransomware group made good on their threat and released Under Armour customer data to ...

    Read More
    Brightspeed Breach: Crimson Collective and the Infostealer Problem
    Threat Intelligence
    Jan 20, 2026 Mike Bell

    Brightspeed Breach: Crimson Collective and the Infostealer Problem

    Recently Crimson Collective claimed they breached Brightspeed and grabbed 1 million+ customer records. The list of data ...

    Read More
    When Grid Data Goes Dark Web
    Power Grid
    Jan 19, 2026 Mike Bell

    When Grid Data Goes Dark Web

    Inside a threat actor's critical infrastructure targeting In January 2026, 139 gigabytes of engineering data from a ...

    Read More
    The $150,000 Password
    Critical Infrastructure
    Jan 19, 2026 Mike Bell

    The $150,000 Password

    How one threat actor turned stolen credentials into a global breach portfolio Between December 2025 and January 2026, a ...

    Read More
    Logo copy 3-1

    Fortified Security. Intelligent Innovation.

    +1 (702) 766-6257
    P.O. Box 750111
    Las Vegas, Nevada 89136

    Follow Us

    About

    • About Us
    • Contact

    Solutions

    • Products
    • AI Advisory
    • AI Assessment
    • Cybersecurity

    Resources

    • Insights
    • In The Media
    • Podcasts
    © 2026 All rights reserved.
    • Privacy Policy
    • Terms & Conditions