Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Claude Code Security: Why Cyber Investors are Panicking

Artificial intelligence, cybersecurity, Claude Code Security, AI security tools and cybersecurity stocks are dominating headlines, but is AI really replacing security professionals? In this Razorwire Raw episode, Jim breaks down the market panic following Anthropic’s Claude Code Security launch, why cybersecurity investors reacted so strongly and what AI can actually do today versus industry hype.

From Security Theatre to Real Resilience: Why Most Incident Response Plans Fall Apart

Are you ready for the cybersecurity incident that could bring your business to a standstill? On this episode of Razorwire, I sit down with Marius Poskus, a CISO and vCISO, to tackle one of the most crucial yet overlooked aspects of information security: incident response. Whether you’re leading a cyber team, supporting your board, or simply keen to sharpen your readiness, we dig into what happens when your best defences fail and chaos strikes.

When Security Fails, Incident Response Decides Everything

The episode explores what happens after security fails, from inevitable incidents and one big ransomware hit away from collapse to money, media noise and decision power at 1 a.m. Viewers hear how poor planning burns cash without progress, why authority and rehearsal matter, and how psychology, struggle and resilience shape every response. ⸻ For more information about us or if you have any questions you would like us to discuss email podcast@razorthorn.com. We give our clients a personalised, integrated approach to information security, driven by our belief in quality and discretion..

How AI Is Powering The Next Super Criminals

Shadow AI models with weaker guardrails increase the power of already talented attackers and help less skilled users assemble dangerous campaigns. Frontier systems write malware when prompted as penetration tests, scale up attack speed and make it easier than ever to launch offensive operations against defenders. ⸻ For more information about us or if you have any questions you would like us to discuss email podcast@razorthorn.com. We give our clients a personalised, integrated approach to information security, driven by our belief in quality and discretion..

What 'Hacker' REALLY Means

The episode breaks down what hacking means in security, from finding flaws and bypassing controls to the point where it turns into crime. The word hacker is often treated as a label for villains, yet many security researchers still use it with pride, so intent and context decide when it becomes malicious. ⸻ For more information about us or if you have any questions you would like us to discuss email podcast@razorthorn.com. We give our clients a personalised, integrated approach to information security, driven by our belief in quality and discretion..

Flipper Zero And Dual Use Security Tools

Multi purpose devices such as Flipper Zero support security audits through radio, infrared and bluetooth testing, while also enabling garage door opens and other abuse. Some countries ban these tools outright and treat them as malicious, yet the real issue sits with intent, in the same way a weapon in the wrong hands becomes a problem. ⸻ For more information about us or if you have any questions you would like us to discuss email podcast@razorthorn.com. We give our clients a personalised, integrated approach to information security, driven by our belief in quality and discretion..

Why Hospitals Pay Ransom to Hackers

Targets in western countries are picked with care, since hospitals and critical services face lives at risk and heavy legal fallout after breaches. When attackers weigh up ransom against long court battles and recovery costs, payment becomes the path many victims choose, feeding the growth of cybercrime. ⸻ For more information about us or if you have any questions you would like us to discuss email podcast@razorthorn.com. We give our clients a personalised, integrated approach to information security, driven by our belief in quality and discretion..

The Untouchable Hacker Kingpins

Some of the most skilled ransomware operators sit in jurisdictions where western law enforcement has no reach and local corruption offers cover. These groups share profit with officials or criminal partners, enjoy freedom to attack targets abroad and spend heavily on their own security while victims struggle to keep up. ⸻ For more information about us or if you have any questions you would like us to discuss email podcast@razorthorn.com. We give our clients a personalised, integrated approach to information security, driven by our belief in quality and discretion..

How Hacker Groups Use Scapegoats

Organised hacker crews keep weaker operators and money mules at the edge of each scheme, ready to serve as scapegoats when police start making arrests. Cashing out and handling drop accounts carries the highest risk, so those at the bottom of the food chain end up expendable while the core group remains hidden. ⸻ For more information about us or if you have any questions you would like us to discuss email podcast@razorthorn.com. We give our clients a personalised, integrated approach to information security, driven by our belief in quality and discretion..

A Real Life Encounter with Cybercriminals

A street level story follows carders feeding bag after bag of cloned credit cards into cash machines, throwing each dead card into a case and moving on to the next ATM. The scene captures how industrialised fraud looks in practice and how exposure to that behaviour pulls people toward a career in security. ⸻ For more information about us or if you have any questions you would like us to discuss email podcast@razorthorn.com. We give our clients a personalised, integrated approach to information security, driven by our belief in quality and discretion..

The 3 Types of Criminal Hackers

Criminal hacker groups fall into three broad camps, from ideologically driven actors attacking targets they dislike, to profit focused crews and state backed operators hiding behind deniability. Money driven groups dominate the landscape, yet all three types break systems, disrupt services and shape the threat model security teams face. ⸻ For more information about us or if you have any questions you would like us to discuss email podcast@razorthorn.com. We give our clients a personalised, integrated approach to information security, driven by our belief in quality and discretion..

No Honour Amongst Thieves: The Hidden World of Hackers and Cyber Criminals

Is there really honour amongst cybercriminals or is it every hacker for themselves? On this episode of Razorwire, I’m joined by Martin Voelk, a seasoned ethical hacker, to take a look at how the world’s most notorious cybercriminal groups really operate. We trace the journey from early hacking culture to today’s sprawling underworld of digital organised crime. Along the way, we ask: What does “hacker” truly mean and who actually gets caught when the authorities close in?

How hackers REALLY operate #cybersecurity #exposé

The episode explores how modern cybercrime works, from the meaning of hacker and the growth of an underground industry to scapegoats, lone wolves and cartel style structures. Listeners hear how criminals cash out, protect themselves better than victims, exploit new AI tools and treat attacks as business, with no honour in sight. ⸻ For more information about us or if you have any questions you would like us to discuss email podcast@razorthorn.com. We give our clients a personalised, integrated approach to information security, driven by our belief in quality and discretion..

Security Professionals Aren't Pessimists, They're Realists

Security professionals aren't pessimists - we're realists. Cybersecurity requires realistic risk management, not blind optimism. Information security teams prepare for breaches, system failures and cyber threats through threat modelling, incident response planning and security controls. This security mindset focuses on organisational resilience and breach preparation, not hope.

The Importance of Realism in Cybersecurity

Hope is not a security control. Security professionals aren't pessimists - we're realists preparing for when systems fail and humans make errors. We model worst-case scenarios and likely threats because probability beats hope every time. Cybersecurity requires realistic risk management and incident response planning, not blind optimism. That's the security mindset. Realism understands controls decay and breaches happen. Preparation stops incidents, not positivity.

Why You Can No Longer Trust What You See

Deepfakes and AI driven attacks are making it hard even for experts to tell what is genuine, from casual social videos to targeted messages. Recent cases used convincing voice and chat to pressure staff into password resets, fund transfers and access changes, forcing organisations to rethink how people validate what they see and hear.

Third Party Supplier Security: Are Your Vendors Safe?

Your third party suppliers probably aren’t as secure as you think they are. SecurityScorecard’s 2025 Global Third Party Breach Report found that at least 35.5% of all data breaches in 2024 originated from third party compromises. That’s not a minor risk you can ignore. The numbers tell a stark story. But here’s what most organisations miss: the real figure is likely higher since many breaches aren’t disclosed or are mistakenly reported as internal incidents.

Cybercrime's New Goal: It's Not Your Data, It's Your Time

The economic model of cybercrime is shifting from stealing data to creating time drag on the systems that keep the business running. Loud ransomware taught everyone to expect clear incidents, but quieter attacks now focus on prolonged disruption, where boards pay to restore growth and confidence without ever declaring a cyber event.

Achieving PCI DSS Compliance: A Guide for UK Businesses

Let’s get right to it: Razorthorn Security helps organisations achieve and maintain PCI DSS compliance through expert consultancy, gap analysis and preparation for formal assessment and has been recognised by Gartner as a market leader in PCI DSS QSA services. If you’re handling payment card data, you’ll need qualified support to navigate the 500+ controls that PCI DSS demands.

What A Real Nation State Cyber Attack Looks Like

A realistic nation state style attack is less cinematic blackout and more slow grind, with degraded services, conflicting information and outages that are hard to prioritise. Public confidence erodes as friction spreads and misinformation amplifies the chaos, and history shows societies fail when trust in key systems collapses faster than those systems adapt.

Inside A Government Agency With No Threat Model

A central government department relied on a part time virtual security lead, ageing tools and no central view of security data, with nobody owning real decisions. When asked what type of attacker would target their systems or whether they had a threat led defence, nobody from engineering to leadership had an answer, despite direct access to national guidance.