Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

RondoDox Botnet: From Zero to 174 Exploited Vulnerabilities

According to a 2024 report from IoT Analytics, there were 16.6 billion Internet of Things (IoT) connected devices at the end of 2023, and that number is expected to grow to 41.1 billion by 2030. This means an increased attack surface for malicious actors to take advantage of, especially given that the security posture of the vendors that provide these devices varies greatly.

Trust Nothing: The Rise of Deepfakes in Cybercrime

Are you confident you could spot a deepfake in your next meeting, or could someone be using your identity without you knowing? Welcome back to Razorwire, the cybersecurity podcast where we explore the challenges professionals face at the cutting edge of threat intelligence. In this episode, I sit down with Alexandra Jorissen, a specialist in deepfake detection and digital identity safeguards. We discuss the explosive rise of deepfake technology, where it’s already being used and what it means for personal and professional security.

How A Deepfake Heist Stole 25 Million Dollars

A finance manager followed a standard process, joined a video call with what looked like known colleagues, and approved urgent payments that totalled twenty five million dollars. Every face and voice on that call was synthetically generated, which shows how deepfakes now bypass email scepticism and hit payment workflows directly. ⸻ For more information about us or if you have any questions you would like us to discuss email podcast@razorthorn.com. We give our clients a personalised, integrated approach to information security, driven by our belief in quality and discretion..

Webinar Recap: The Context Engine - Why Consolidation is the Natural Future of AppSec

As the software development lifecycle continues to evolve, the rise of AI is introducing both unprecedented productivity and unprecedented risk. In a recent webinar hosted by JFrog, Jens Eckels sat down with Forrester Senior Analyst Janet Worthington to discuss the state of application security (AppSec), the explosive growth of agentic software development, and why consolidating security tools is no longer a luxury, but a necessity.

Best GRC software solutions for 2026

The right GRC platform does more than help you check boxes. As compliance requirements grow and security threats become more complex, Governance, Risk, and Compliance (GRC) software is essential for protecting your organization, enabling proactive risk management, and building stronger resilience. ‍ In this article, we review five of the best GRC solutions, highlighting their key features, strengths, limitations, and use cases, to help you pick the right tool for your organization. ‍ ‍

What is Smishing in Cybersecurity and How to Prevent it?

Cybercriminals are increasingly using sophisticated techniques such as smishing to exploit mobile users. Smishing is a type of scam conducted through SMS (Short Message Service). Attackers use this method to get people to give up private information or click on harmful links. This fraudulent method exploits the speed and trust people place in text messages by pretending to be a trusted organization, such as a bank or the government.

15 Local Favorite SEO Agencies in Cincinnati for HVAC Companies - Helium SEO is #1 Choice (2026)

Your phones should be ringing. If they're not, and your competitors keep showing up ahead of you on Google Maps whenever someone searches for furnace repair or AC installation in Cincinnati, the problem is rarely your service quality. It's your search visibility. And in 2026, fixing that means finding an SEO partner who actually understands HVAC. Choosing the wrong SEO agency wastes money, months, and momentum. Choosing the right one compounds your visibility through every heating and cooling season.