Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

A New Model You Haven't Heard About (GitHub Raptor Mini)

Can an under-the-radar AI tool actually build a secure, functional CRUD note-taking app from scratch? In this video, I put GitHub Raptor Mini to the test to see if it can design, implement, and reason through a real-world CRUD application — including authentication, data handling, and basic security considerations.

Breaking Chain of Command in 2025 Security Decisions

The Razorwire Christmas Party 2025 episode looks at how decision culture shapes security outcomes across the year. Frontline staff need room to break the chain of command when something feels wrong, so protection in 2025 depends on people lower in the hierarchy raising hard questions and taking timely action. cybersecurity podcast, razorwire podcast, razorwire christmas party, razorthorn, 2025 cybersecurity review, decision making in security, breaking chain of command, frontline empowerment, zero trust culture, organisational trust, incident response decisions, helpdesk security, security leadership.

APT Teens, AI Voices and 2025 Helpdesk Attacks

The 2025 year in review episode shows how advanced threat groups rely on simple steps, from infostealer credentials to AI voice tools, to work through helpdesks. Native language, fake confusion and social engineering still unlock password resets in 2025, opening the door to ransomware and double extortion across networks.

Secret scanning with ggshield (repo, files, changes, commits, archives, Docker, and PyPI)

Now we’re getting to the heart of ggshield: secret scanning. In this section, we jump into ggshield secret and its two subcommands, ignore and scan. Ignore makes a lot more sense once you’ve seen scan in action, so we start by learning what ggshield can scan and why it’s so flexible across the development lifecycle. We’ll open the help menu so you can see every scan target available: ggshield secret scan -h.

AI Automation Dreams in the 2025 Security Budget Squeeze

The Razorwire Christmas Party 2025 review looks at rising expectations for AI and automation while security budgets stall in real terms. Automation in 2025 sits in a tug of war between cost cutting targets and the reality that attackers also use AI, so defensive upgrades have to match a live, adaptive threat.

When to Contact Your Bank About a Suspicious Charge

Fraud doesn’t start big. It starts quiet. Those small, unfamiliar charges (even $1) are often “test” charges scammers use to see what they can get away with. Contact your bank if: You see a charge you don’t recognize (even a small one) Your card suddenly declines mid-purchase You get alerts or texts about “unusual activity” Always verify through your bank’s official app or by calling the number on the back of your card.

miniTalks Podcast | DPDP, Digital Identity, and Real-World Compliance Gaps

India’s Digital Personal Data Protection Act is not just another compliance checkbox. It changes how identities, access, and data must be handled every single day. In this episode of miniTalks by miniOrange, host Puja More speaks with Gaurav Bansod, Director of Strategic Partnerships and Alliances at miniOrange and a PhD in Cybersecurity, to unpack what DPDP really means in practice.

Burnout, Duty of Care and 2025 in Cybersecurity

The Razorwire Christmas Party 2025 episode looks back at a year where burnout in security work feels closer to an occupational hazard than a personal weakness. A legal style “but for” test highlights how organisational decisions, pressure and inaction in 2025 shaped stress, harm and duty of care across cybersecurity teams.

The Razorwire Christmas Special 2025: Looking Back, Looking Forward

What happens when you gather some of the sharpest minds in cybersecurity for an end-of-year chat about where we've been and where we're heading? Welcome to Razorwire's Christmas special. Today I’m chatting with some of our favourite guests from 2025: clinical traumatologist Eve Parmiter, cyber futurist Oliver Rochford, CISO and podcast host Marius Poskus and occupational psychologist Bec McKeown for a roundup of the cybersecurity industry this year. This isn't a glossy year-in-review full of predictions and corporate optimism. We're talking about what's actually happened.

Understand the ggshield help menu ( options and global flags)

Let’s start by learning how to navigate ggshield like any other CLI tool: through its built-in help menu. To see the top-level help, just run ggshield with no options and press enter: ggshield Any time you want help for a specific command, add -h or --help to the end of that command before hitting enter. ggshield follows a standard command-line pattern you’ll see in many tools: ggshield ... If you’re new to CLIs, here’s what that means: ggshield is the program you’re running. are the extra details the command needs, like a path or filename.