Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Ep. 47 - APT42 & Iran's AI Social Engineering: Deepfakes, Phishing & Hack-and-Leak

Iran’s APT42 — also known as Charming Kitten or Mint Sandstorm — is redefining social engineering with generative AI, deepfake voice cloning, and long-term phishing campaigns. In this episode of the Cyber Resilience Brief, we break down how Iranian state-sponsored threat actors are using AI-powered phishing, MFA fatigue attacks, credential harvesting, and hack-and-leak operations to target journalists, political campaigns, academics, and enterprise executives.

From Security Theatre to Real Resilience: Why Most Incident Response Plans Fall Apart

Are you ready for the cybersecurity incident that could bring your business to a standstill? On this episode of Razorwire, I sit down with Marius Poskus, a CISO and vCISO, to tackle one of the most crucial yet overlooked aspects of information security: incident response. Whether you’re leading a cyber team, supporting your board, or simply keen to sharpen your readiness, we dig into what happens when your best defences fail and chaos strikes.

Falcon Cloud Security Cloud Detection and Response (CDR)

Discover how CrowdStrike Falcon Cloud Security stops breaches with Cloud Detection & Response (CDR). Witness our Real-Time Cloud Detections in action as we identify and mitigate a sophisticated attack by LABYRINTH CHOLLIMA. Learn how our integrated threat intelligence and unified detection & response capabilities help SOC teams outpace modern cloud adversaries.

Autonomous Service Desk: Possible NOW - Tanium Tech Talks #155

Meet the autonomous service desk - powered by live endpoint intelligence. See how ServiceNow NowAssist + Tanium deliver agentic triage, real‑time diagnostics, and guided remediation the moment an incident hits. Agentic triage kicks off instantly when an incident is created Real-time endpoint intelligence beats assumptions every time Confidence‑scored root cause analysis reduces investigation from hours to minutes The power of bounded autonomy (strong guardrails + powerful automation)

When Security Fails, Incident Response Decides Everything

The episode explores what happens after security fails, from inevitable incidents and one big ransomware hit away from collapse to money, media noise and decision power at 1 a.m. Viewers hear how poor planning burns cash without progress, why authority and rehearsal matter, and how psychology, struggle and resilience shape every response. ⸻ For more information about us or if you have any questions you would like us to discuss email podcast@razorthorn.com. We give our clients a personalised, integrated approach to information security, driven by our belief in quality and discretion..

Speed, Stealth, and AI: The CrowdStrike 2026 Global Threat Report

It’s that time of year: The CrowdStrike 2026 Global Threat Report is live, and Adam and Cristian are here to break down the key findings. This year’s report spotlights adversaries’ heightened speed, their evolving use of AI, an increase in activity from China and North Korea, and the growth of supply chain attacks, zero-day exploitation, and cloud targeting. For new listeners, the annual Global Threat Report delivers an analysis of the modern threat landscape based on CrowdStrike's frontline observations and real-world threat intelligence from the previous year.

The Howler Episode 27 - Charlie Smith, SVP Global Acquisition Sales Engineering

This month, we sit down with Charlie Smith, SVP of Global Acquisition Sales Engineering, as she shares leadership advice he wished he'd learned earlier in his career, why he thinks sales engineering is a "hidden gem," and so much more!