Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Can You Trust AI Code? I Built a Scanner to Find Out

Can you trust the code AI generates? In this video, we build a custom AI Security Benchmarking tool to put models like Gemini, Mistral, and GLM 4.5 to the test. Using Windsurf, OpenRouter, and Snyk, we automate a pipeline that prompts multiple LLMs to write an application, then immediately scans the output for security vulnerabilities.

Institutional Crypto Liquidity: CME, Fireblocks & Cumberland | Consensus Hong Kong 2026

Why are institutions finally moving into crypto at scale? It's not just about the technology. At Consensus Hong Kong 2026, leaders from CME Group, Fireblocks, and Cumberland break down what's driving institutional adoption, where liquidity is flowing, and how the gap between TradFi and crypto-native markets is closing.

Intel Chat: Russian cyber ops, Sygnia, Ollama & TeamPCP [293]

In this episode of The Cybersecurity Defenders Podcast, we discuss some intel being shared in the LimaCharlie community. Support our show by sharing your favorite episodes with a friend, subscribe, give us a rating or leave a comment on your podcast platform. This podcast is brought to you by LimaCharlie, maker of the SecOps Cloud Platform, infrastructure for SecOps where everything is built API first. Scale with confidence as your business grows.

Is AI dangerous?

AI is everywhere—writing emails, creating videos, even cloning voices. But artificial intelligence also comes with real risks, including privacy concerns, deepfakes, and smarter online scams. Artificial intelligence learns by spotting patterns in massive amounts of data—and that power can be misused. AI tools may collect personal information, create realistic fake content, or help scammers craft messages that look completely legit.

The Untouchable Hacker Kingpins

Some of the most skilled ransomware operators sit in jurisdictions where western law enforcement has no reach and local corruption offers cover. These groups share profit with officials or criminal partners, enjoy freedom to attack targets abroad and spend heavily on their own security while victims struggle to keep up. ⸻ For more information about us or if you have any questions you would like us to discuss email podcast@razorthorn.com. We give our clients a personalised, integrated approach to information security, driven by our belief in quality and discretion..

How Hacker Groups Use Scapegoats

Organised hacker crews keep weaker operators and money mules at the edge of each scheme, ready to serve as scapegoats when police start making arrests. Cashing out and handling drop accounts carries the highest risk, so those at the bottom of the food chain end up expendable while the core group remains hidden. ⸻ For more information about us or if you have any questions you would like us to discuss email podcast@razorthorn.com. We give our clients a personalised, integrated approach to information security, driven by our belief in quality and discretion..

A Real Life Encounter with Cybercriminals

A street level story follows carders feeding bag after bag of cloned credit cards into cash machines, throwing each dead card into a case and moving on to the next ATM. The scene captures how industrialised fraud looks in practice and how exposure to that behaviour pulls people toward a career in security. ⸻ For more information about us or if you have any questions you would like us to discuss email podcast@razorthorn.com. We give our clients a personalised, integrated approach to information security, driven by our belief in quality and discretion..

AI Attacks, CaaS & the New Reality of Banking Security

This week, in the episode – Guardians of the Enterprise, Ashish Tandon, Founder & CEO, Indusface, speaks with Madhur Joshi, CISO at HDB Financial Services (part of the HDFC Group), on how large financial institutions are navigating a rapidly evolving cyber threat landscape. The conversation covers the rise of AI-driven attacks, Cybercrime-as-a-Service (CaaS), and the growing complexity that comes with expanding digital footprints across cloud, applications, and APIs.