Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest Videos

Unveiling the Secret Realms: Private Intelligence, Mercenaries, and Cyber Intrigues #cybersecurity

Dive into the secret world of growing art! In this video, we explore the expansion of private intelligence and the mercenary sector, questioning whether cyber warfare is now part of their arsenal. Join the discussion as we shine a light on prominent players like NSO and uncover interesting facts. Are these industries integrating with cyber capabilities? We dissect the possibilities and shed light on the shadows of individual actions. From corporate espionage scandals to Uber's infamous software installation in drivers' cars, we uncover different aspects of industrial espionage.

From Cards to Cryptos: Unraveling Cybercrime's Evolution with Robert Rodriguez's Shocking Tale

Embark on a journey into the shadowy realms of cybercrime with the intriguing tale of Robert Rodriguez. Join me as we delve into the underworld of credit card fraud, retail network hacks, and the evolution that reshaped the landscape of cyber criminality.

Decoding Ransomware's Code of Conduct: Surprising Rules of Engagement & the Robin Hood Twist #crypto

Dive into the intriguing world of cybersecurity as we explore the surprising ethical guidelines followed by ransomware groups in this eye-opening video. It's crazy, but many of these cybercriminals adhere to a set of Rules of Engagement, steering clear of unthinkable targets like children's hospitals. While some still cross the line, a remarkable instance emerged when a ransomware group, upon realizing they had hit a kids' hospital, apologized and handed over the decryptor – a Robin Hood-esque gesture in the digital realm.

Unleashing the Hidden World of Cybercriminals: The Growing Threat of Cybercrime-as-a-Service

Welcome to Razorwire, the podcast where we cut through the tangled web of cybersecurity to bring you the latest insights and expert analysis. Victor Acin and Oliver Rochford, two esteemed guests, are with me in today's episode. In this episode, we’re exploring the dangerous world of cybercrime as a service and its implications for individuals, organizations, and even nation-states. Join us this week as we unveil the dark side of cybercrime. Victor, the Head of Threat Intelligence at Outpost 24, shares his expertise on the rise of cybercrime as a service. Discover how cybercriminals have adapted their tactics, the motivations driving their actions, and the alarming ease with which they operate. Stay ahead of the game with insider knowledge from Oliver's research, where he discusses the striking similarities between cybercrime services and legitimate tech services. Learn about the techniques used by cybercriminals to infiltrate organizations and exploit their vulnerabilities. Whether you're a seasoned professional or just starting your cybersecurity journey, this episode offers some excellent, practical advice for strengthening your defences. We share some effective ways to protect against credential theft, insider threats, and targeted attacks. Hear about tried and trusted remedies recommended by our experts that can make a significant impact on securing your organization. So, if you're a cybersecurity professional looking to expand your knowledge and sharpen your skills, join us on Razorwire as we unravel the intricate world of cybercrime as a service.

Cyber Crime Surge: Unmasking Employee Collusion and Modular Attack Chains || Razorthorn Security

In the evolving landscape of cyber threats, a seismic shift has occurred over the last couple of years. Join us in unraveling the intricate web of cyber crime as a service, where operators entice employees into collusion by dangling lucrative financial incentives. This phenomenon has contributed to a staggering rise in organized cyber attacks.

Unraveling Conspiracies: Hacking, Allegiances, and Corporate Chess || Razorthorn Security

Dive deep into the realm of intrigue with our latest video, "Double Conspiracy Theories Unveiled!" Grab your tin foil hats because we're about to explore two mind-boggling mysteries that will leave you questioning everything. In Conspiracy #1, we venture into the shadows to unravel the mystery of a hacking incident. Who was behind it, and were they working for someone sinister? The plot thickens as we peel back the layers, and the truth seems to be shrouded in secrecy.

Legal Risks for CESOs in Public Companies: A Critical Advisory for Executives Worldwide #podcast

In this eye-opening video, we delve into the complex landscape that CESOs associated with publicly listed companies are currently facing. The stakes are high, and executives find themselves in a challenging position with limited options. Whether it's the proverbial 'damned if you do, damned if you don't' scenario or the looming possibility of legal action, the urgency for thorough documentation and sign-offs cannot be overstated.

ISO 27001 Truths: Appliance Security Unraveling Risks in Corporate Governance |Razorthorn Security

Unlock the reality behind ISO 27001 certification in this eye-opening video. Just because a company boasts ISO 27,1 doesn't automatically mean they are secure. Join me as we delve into the intricacies of convincing auditors, the dangers of mistaking appliances for security, and the critical vulnerabilities that might be overlooked. Prepare for some candid insights that might stir the pot! Share your thoughts in the comments - I'm ready for the discussion! Remember, an appliance does not equal security.

Corporate Espionage Exposed: Unveiling High-Level Intrigues for Self-Preservation | Scandal Unveiled

Uncover the shocking truth behind corporate maneuvers in our latest video! Watch as high-level executives resort to drastic measures to protect themselves, leaving a trail of deceit and manipulation. In this eye-opening exposé, we delve into a covert plan to divert blame, erase evidence, and scapegoat an unsuspecting employee. The high-stakes game of self-preservation unfolds, revealing the cutthroat reality lurking behind the polished exterior of big corporations.

Unlocking Corporate Secrets: Always Demand Proof! || Razorthorn Security

Uncover the truth with our latest video, "Always Get Proof: Corporate Secrets Revealed!" In a world where actions speak louder than words, we delve into the unsettling reality of individuals, including CISOs and InfoSec professionals, who discreetly store sensitive information beyond corporate boundaries. Don't be in the dark – empower yourself with knowledge! Explore the hidden practices that often go unnoticed. Learn why demanding proof is crucial in today's digital landscape. Discover the risks associated with storing confidential data outside corporate limits.