Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Why Hospitals Pay Ransom to Hackers

Targets in western countries are picked with care, since hospitals and critical services face lives at risk and heavy legal fallout after breaches. When attackers weigh up ransom against long court battles and recovery costs, payment becomes the path many victims choose, feeding the growth of cybercrime. ⸻ For more information about us or if you have any questions you would like us to discuss email podcast@razorthorn.com. We give our clients a personalised, integrated approach to information security, driven by our belief in quality and discretion..

The Untouchable Hacker Kingpins

Some of the most skilled ransomware operators sit in jurisdictions where western law enforcement has no reach and local corruption offers cover. These groups share profit with officials or criminal partners, enjoy freedom to attack targets abroad and spend heavily on their own security while victims struggle to keep up. ⸻ For more information about us or if you have any questions you would like us to discuss email podcast@razorthorn.com. We give our clients a personalised, integrated approach to information security, driven by our belief in quality and discretion..

How Hacker Groups Use Scapegoats

Organised hacker crews keep weaker operators and money mules at the edge of each scheme, ready to serve as scapegoats when police start making arrests. Cashing out and handling drop accounts carries the highest risk, so those at the bottom of the food chain end up expendable while the core group remains hidden. ⸻ For more information about us or if you have any questions you would like us to discuss email podcast@razorthorn.com. We give our clients a personalised, integrated approach to information security, driven by our belief in quality and discretion..

A Real Life Encounter with Cybercriminals

A street level story follows carders feeding bag after bag of cloned credit cards into cash machines, throwing each dead card into a case and moving on to the next ATM. The scene captures how industrialised fraud looks in practice and how exposure to that behaviour pulls people toward a career in security. ⸻ For more information about us or if you have any questions you would like us to discuss email podcast@razorthorn.com. We give our clients a personalised, integrated approach to information security, driven by our belief in quality and discretion..

The 3 Types of Criminal Hackers

Criminal hacker groups fall into three broad camps, from ideologically driven actors attacking targets they dislike, to profit focused crews and state backed operators hiding behind deniability. Money driven groups dominate the landscape, yet all three types break systems, disrupt services and shape the threat model security teams face. ⸻ For more information about us or if you have any questions you would like us to discuss email podcast@razorthorn.com. We give our clients a personalised, integrated approach to information security, driven by our belief in quality and discretion..

No Honour Amongst Thieves: The Hidden World of Hackers and Cyber Criminals

Is there really honour amongst cybercriminals or is it every hacker for themselves? On this episode of Razorwire, I’m joined by Martin Voelk, a seasoned ethical hacker, to take a look at how the world’s most notorious cybercriminal groups really operate. We trace the journey from early hacking culture to today’s sprawling underworld of digital organised crime. Along the way, we ask: What does “hacker” truly mean and who actually gets caught when the authorities close in?

How hackers REALLY operate #cybersecurity #exposé

The episode explores how modern cybercrime works, from the meaning of hacker and the growth of an underground industry to scapegoats, lone wolves and cartel style structures. Listeners hear how criminals cash out, protect themselves better than victims, exploit new AI tools and treat attacks as business, with no honour in sight. ⸻ For more information about us or if you have any questions you would like us to discuss email podcast@razorthorn.com. We give our clients a personalised, integrated approach to information security, driven by our belief in quality and discretion..

Security Professionals Aren't Pessimists, They're Realists

Security professionals aren't pessimists - we're realists. Cybersecurity requires realistic risk management, not blind optimism. Information security teams prepare for breaches, system failures and cyber threats through threat modelling, incident response planning and security controls. This security mindset focuses on organisational resilience and breach preparation, not hope.

The Importance of Realism in Cybersecurity

Hope is not a security control. Security professionals aren't pessimists - we're realists preparing for when systems fail and humans make errors. We model worst-case scenarios and likely threats because probability beats hope every time. Cybersecurity requires realistic risk management and incident response planning, not blind optimism. That's the security mindset. Realism understands controls decay and breaches happen. Preparation stops incidents, not positivity.