Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

You Can Create a Convincing Deepfake in Under an Hour

A non technical user can produce a credible deepfake in under an hour using off the shelf tools and footage from normal video meetings. Common habits such as recording calls for later review give attackers enough material to train models, so every routine sales or onboarding call becomes potential training data. ⸻ For more information about us or if you have any questions you would like us to discuss email podcast@razorthorn.com. We give our clients a personalised, integrated approach to information security, driven by our belief in quality and discretion..

Scammers Only Need 30 Seconds of Video to Clone You

Training a convincing voice model now needs as little as thirty seconds of audio, which public videos, podcasts and recorded calls provide in abundance. Open profiles reveal who reports to whom, so attackers can pair cloned voices with organisational charts and pressure staff into authorising payments or sharing access. ⸻ For more information about us or if you have any questions you would like us to discuss email podcast@razorthorn.com. We give our clients a personalised, integrated approach to information security, driven by our belief in quality and discretion..

The Top Industries Targeted By Deepfake Scams

Financial institutions and insurers sit at the front line of deepfake abuse, with digital onboarding, KYC, AML checks and app based claims all exposed to synthetic media. Fraudsters can fake identity documents, accident photos and invoices at scale, which pushes these sectors to rethink verification beyond simple photo uploads. ⸻ For more information about us or if you have any questions you would like us to discuss email podcast@razorthorn.com. We give our clients a personalised, integrated approach to information security, driven by our belief in quality and discretion..

Why You Can't Trust Video of Celebrities Anymore

Deepfake clips can place public figures or executives in fabricated scandals, with contentious statements that never happened spreading at speed across social feeds. Proving something did not happen is hard, so people need a zero trust mindset for video and audio, checking sources and context before they react or share. ⸻ For more information about us or if you have any questions you would like us to discuss email podcast@razorthorn.com. We give our clients a personalised, integrated approach to information security, driven by our belief in quality and discretion..

Perimeter Defence is Dead - What's Killing Your Security Now?

Cybersecurity perimeter defence is dead. Third party risk management and supply chain security are now where breaches actually happen. Cloud security, SaaS solutions and AI agents have completely changed the threat landscape, but most organisations are still using outdated security models. In this episode of Razorwire Raw, Jim explains why everything you thought you knew about perimeter security no longer applies. Your critical business systems aren't where you think they are anymore. And those third party questionnaires you're relying on? There's a problem.

North Korean Hackers Are Using Deepfakes to Get Jobs

Recruiters now see job candidates turn up on camera using deepfakes to hide their identity, including state linked operators who want access to source code and infrastructure. Small visual glitches used to give these attempts away, but quality keeps improving, which forces organisations to review hiring, verification and remote work security. ⸻ For more information about us or if you have any questions you would like us to discuss email podcast@razorthorn.com. We give our clients a personalised, integrated approach to information security, driven by our belief in quality and discretion..

How A Deepfake Heist Stole 25 Million Dollars

A finance manager followed a standard process, joined a video call with what looked like known colleagues, and approved urgent payments that totalled twenty five million dollars. Every face and voice on that call was synthetically generated, which shows how deepfakes now bypass email scepticism and hit payment workflows directly. ⸻ For more information about us or if you have any questions you would like us to discuss email podcast@razorthorn.com. We give our clients a personalised, integrated approach to information security, driven by our belief in quality and discretion..

Trust Nothing: The Rise of Deepfakes in Cybercrime

Are you confident you could spot a deepfake in your next meeting, or could someone be using your identity without you knowing? Welcome back to Razorwire, the cybersecurity podcast where we explore the challenges professionals face at the cutting edge of threat intelligence. In this episode, I sit down with Alexandra Jorissen, a specialist in deepfake detection and digital identity safeguards. We discuss the explosive rise of deepfake technology, where it’s already being used and what it means for personal and professional security.

The C-Suite's Biggest Mistake During a Cyber Crisis

After a major breach, grand statements about taking security seriously ring hollow when customer data sits in fraudsters’ hands. The biggest mistake in a crisis is clinging to control instead of trusting security specialists, stepping back for a short period and letting the expert lead the technical response. ⸻ For more information about us or if you have any questions you would like us to discuss email podcast@razorthorn.com. We give our clients a personalised, integrated approach to information security, driven by our belief in quality and discretion..

The £2 Million Reason Your CISO Needs Power

Major incidents demand rapid hiring, outside support and big spends within hours, not after weeks of approvals and budget meetings. Strong incident response gives security leaders pre agreed authority to sign contracts and access funds, so they bring in hundreds of specialists at speed instead of watching the breach spread. ⸻ For more information about us or if you have any questions you would like us to discuss email podcast@razorthorn.com. We give our clients a personalised, integrated approach to information security, driven by our belief in quality and discretion..