Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

How Hacker Groups Use Scapegoats

Organised hacker crews keep weaker operators and money mules at the edge of each scheme, ready to serve as scapegoats when police start making arrests. Cashing out and handling drop accounts carries the highest risk, so those at the bottom of the food chain end up expendable while the core group remains hidden. ⸻ For more information about us or if you have any questions you would like us to discuss email podcast@razorthorn.com. We give our clients a personalised, integrated approach to information security, driven by our belief in quality and discretion..

A Real Life Encounter with Cybercriminals

A street level story follows carders feeding bag after bag of cloned credit cards into cash machines, throwing each dead card into a case and moving on to the next ATM. The scene captures how industrialised fraud looks in practice and how exposure to that behaviour pulls people toward a career in security. ⸻ For more information about us or if you have any questions you would like us to discuss email podcast@razorthorn.com. We give our clients a personalised, integrated approach to information security, driven by our belief in quality and discretion..

AI Attacks, CaaS & the New Reality of Banking Security

This week, in the episode – Guardians of the Enterprise, Ashish Tandon, Founder & CEO, Indusface, speaks with Madhur Joshi, CISO at HDB Financial Services (part of the HDFC Group), on how large financial institutions are navigating a rapidly evolving cyber threat landscape. The conversation covers the rise of AI-driven attacks, Cybercrime-as-a-Service (CaaS), and the growing complexity that comes with expanding digital footprints across cloud, applications, and APIs.

What is OpenClaw andAgentic AI? The Security Issues You Need to Be Aware of Now

Over the past several weeks, OpenClaw and MaltBook have exploded across the headlines. Outlets have published stories about AI agents organizing themselves or even acting independently on Moldtbook. SecurityScorecard’s Jeremy Turner, VP of Threat Intelligence & Research and Anne Griffin, Head of AI Product Strategy discuss what OpenClaw is, how agentic AI works, and where the real security issues are based on new research from SecurityScorecard's STRIKE Threat Intelligence team.

How KeeperPAM Integrates With IGA Platforms

Privileged Access Management (PAM) and Identity Governance and Administration (IGA) play important roles in securing modern organizations, but what happens when they work together? In this short video, learn how integrating KeeperPAM with IGA platforms extends identity governance into privileged access and delivers full visibility into privileged activity.

Real-Time Cloud Detection & Response (CDR)

As adversaries accelerate with GenAI and blend into legitimate cloud activity, real-time correlation between telemetry and control plane events is critical. Without it, investigations stall and visibility gaps grow. CrowdStrike delivers real-time detections and automated cloud-native response to stop adversaries in seconds. Subscribe and Stay Updated.

Moltworker (for OpenClaw) & Markdown for Agents: Running AI on Cloudflare

Celso explains how Markdown for Agents was conceived, built, and shipped in just one week, why AI systems prefer markdown over HTML, and how converting a typical blog post from 16,000 HTML tokens to roughly 3,000 markdown tokens can reduce cost, improve speed, and increase accuracy for AI models. We also explore Moltworker, a proof-of-concept showing how a personal AI agent originally designed to run on a Mac Mini can instead run on Cloudflare’s global network using Workers, R2, Browser Rendering, AI Gateway, and Zero Trust.