Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

What 'Hacker' REALLY Means

The episode breaks down what hacking means in security, from finding flaws and bypassing controls to the point where it turns into crime. The word hacker is often treated as a label for villains, yet many security researchers still use it with pride, so intent and context decide when it becomes malicious. ⸻ For more information about us or if you have any questions you would like us to discuss email podcast@razorthorn.com. We give our clients a personalised, integrated approach to information security, driven by our belief in quality and discretion..

How to Set up the OTP Verification Plugin with WooCommerce Checkout Form?

The miniOrange OTP Verification Plugin validates customers' email addresses or mobile numbers by sending a One-Time Password (OTP) during the checkout process. By confirming the authenticity of the provided contact details, this plugin helps prevent fake orders, reduces fraud, and ensures secure transactions. In this video, we walk you through the complete step-by-step setup of the miniOrange OTP Verification plugin with the WooCommerce Checkout form. Follow along to enable OTP verification and enhance your store’s security.

Who Controls LLMs? Digital Sovereignty, Policy, and AI Security Risks | India AI Impact Summit 2026

AI agents are quickly becoming first-class actors in the digital ecosystem—logging into systems, invoking multiple APIs, collaborating, and even interacting socially with other agents. In a panel discussion on “Enhancing Cyber Resilience Across the Digital Ecosystem”, the miniOrange Founder & CEO Mr. Anirban Mukherji highlighted why digital identity is now the foundation for securing agent-driven environments, especially as authentication and authorization protocols expand globally across platforms and enterprises.

From DevOps to Runtime: Engineering the Right CWPP Strategy for Your Cloud Environment

Cloud-native architectures have fundamentally changed how organizations build, deploy, and scale applications. But they have also introduced new security challenges, especially when it comes to protecting workloads that span virtual machines, containers, Kubernetes, and serverless environments.

What is Vanta?

Vanta is the Agentic Trust Platform—built to help companies earn trust and prove it, continuously. ‍ Every company’s trust journey starts with two connected goals: earning and proving that trust. You earn trust by demonstrating a strong security foundation to customers, partners, auditors, and your board. You prove trust by continuously strengthening that foundation—managing risk, monitoring threats, and acting on real-world feedback.

Wiz names Vanta among its most popular integrations

Wiz recently published its first Wiz Integration Network (WIN) Partner Index 2025, which looks at which tools and vendors Wiz users are connecting with most. We were honored to show up on this list—not once—but four different times. ‍ The WIN Partner Index is built from actual customer adoption and usage, offering a practical view into which integrations deliver the most meaningful impact as security teams grow.

Acronis Cyberthreats Report H2 2025: Cybercriminals are now scaling attacks with AI

Cybercriminals are spending less time using AI to develop new kinds of cyberattacks. Unfortunately, that’s not good news. According to the Acronis Cyberthreats Report H2 2025, cybercriminals are focusing on using AI to scale and refine the attacks they’ve already developed. As a result, they’re working more efficiently. The Acronis Cyberthreats Report H2 2025 delves into many more cybersecurity trends and goes into much deeper detail on the evolving impact of AI on cyberthreats.

Intelligence Agencies: Proxy Action & 'Plozny Jurak'

In today’s cyber landscape, intelligence services often rely on proxy networks to expand their reach. Through ransomware affiliates, access brokers, and loosely connected cybercriminal ecosystems — sometimes referred to conceptually as “Plozny Jurak” — states can benefit from disruptive or espionage activity without direct attribution. To dive deeper, watch the full podcast, Blueprint Thieves: Inside Iran’s Industrial Espionage Machine, at the links below.