Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

No Honour Amongst Thieves: The Hidden World of Hackers and Cyber Criminals

Is there really honour amongst cybercriminals or is it every hacker for themselves? On this episode of Razorwire, I’m joined by Martin Voelk, a seasoned ethical hacker, to take a look at how the world’s most notorious cybercriminal groups really operate. We trace the journey from early hacking culture to today’s sprawling underworld of digital organised crime. Along the way, we ask: What does “hacker” truly mean and who actually gets caught when the authorities close in?

Ep 29: From detection to post-mortem: The complete incident cycle

On this episode of Masters of Data, we break down incident response from detection through containment, forensics, recovery, and postmortem. The foundation? Comprehensive logging. Without it, you're blind. We explore building cross-functional teams and a blame-free culture where people actually report issues. Communication is key: what you tell engineering isn't what you tell executives or customers. AI is accelerating investigations, but the fundamentals still rule: proper tool access, the right people on call, and translating technical chaos into business-speak. The takeaway?

How do AI guardrails protect infrastructure from the unsafe and unpredictable territory of LLM risks

How do AI guardrails protect infrastructure from the unsafe and unpredictable territory of LLM risks? An AI firewall or guardrail device sits between your applications and large language models to keep the data sent and received from LLMs safe, compliant, and high-quality. Its design is to inspect natural-language traffic and protect your infrastructure against LMM vulnerabilities, including prompt injection, jailbreak attacks, data poisoning, system prompt leakage, and OWASP Top 10 vulnerabilities, using advanced, proprietary reasoning models.

Using SSL Inspection and AI Guardrails to Protect Infrastructure

Using SSL Inspection and AI Guardrails to Protect Infrastructure How do you protect your AI infrastructure from threats without impacting user experience? In this video, we'll cover the methods organizations can use to inspect encrypted traffic, including what is sent to AI chatbots, and add guardrails to protect against security risks. We'll cover.

How hackers REALLY operate #cybersecurity #exposé

The episode explores how modern cybercrime works, from the meaning of hacker and the growth of an underground industry to scapegoats, lone wolves and cartel style structures. Listeners hear how criminals cash out, protect themselves better than victims, exploit new AI tools and treat attacks as business, with no honour in sight. ⸻ For more information about us or if you have any questions you would like us to discuss email podcast@razorthorn.com. We give our clients a personalised, integrated approach to information security, driven by our belief in quality and discretion..

CurrentWare 12.0 Update: Mac Monitoring & App Whitelisting

Currentware 12.0 introduces a new era of control for modern workplaces. Built for dynamic environments, it delivers stronger security, unified endpoint management, and accurate productivity insights in one powerful platform. With Application Allow Listing, only approved apps gain access for better protection and compliance. Manage Windows and macOS from a single console with full visibility through Mac Employee Monitoring. Plus, new Mouse Jiggler Detection ensures activity data stays authentic and reliable.

CurrentWare v12 Fireside Chat - App Allowlisting, Mouse Jiggler Detection, Schedule Adherence Report

Senior leadership from the CurrentWare team got together to discuss market trends, cybersecurity, customer demand, and the top new capabilities provided by CurrentWare version 12. Features Covered:Deny-by-Default Application Allowlisting (BrowseControl) Mouse Jiggler Detection (BrowseReporter) Schedule Adherence Report (BrowseReporter) TIMESTAMPS CURRENTWARE'S EMPLOYEE PRODUCTIVITY & SECURITY SOFTWARE Each module in the CurrentWare Suite can be purchased individually or as a bundle for the best value.

How MCP Servers Can Propagate Prompt Injection #mcp #promptinjection #aisecurity

Mend.io, formerly known as Whitesource, has over a decade of experience helping global organizations build world-class AppSec programs that reduce risk and accelerate development -– using tools built into the technologies that software and security teams already love. Our automated technology protects organizations from supply chain and malicious package attacks, vulnerabilities in open source and custom code, and open-source license risks.