LMG Security

LMG Security is an internationally recognized leader in cybersecurity. We are a full-service consulting firm, delivering proactive cybersecurity solutions, advisory and compliance services, penetration testing, training, and more. The LMG Security team has published game-changing cybersecurity research, written books on ransomware, data breaches and network forensics, and routinely speaks or trains at Black Hat, RSA, and many other security conferences. With a wide range of clients, including government agencies, financial institutions, health care organizations, law firms, academia, Fortune 500 companies and more, the LMG Security team has also had their expertise noted on the TODAY show and in The New York Times. Visit us at www.LMGsecurity.com for more information.

Website:
www.LMGsecurity.com
Cybersecurity services:
Penetration testing, advisory, solutions & training.
Blog:
www.LMGsecurity.com/blog
Tip sheets:
www.LMGsecurity.com/LMG-resources
Events & webinars:
www.LMGsecurity.com/events
Videos:
www.youtube.com/@LMGsecurity
2025-12-30

Fake employees and compromised contractors are forcing organizations to rethink vendor vetting, hiring security, and identity controls.

Our team is seeing more incidents where attackers don’t exploit vulnerabilities—they exploit trust. In the latest Cyberside Chats episode, @sherridavidoff and @MDurrin unpack Amazon’s recent incident in which a North Korean IT worker was detected through behavioral anomalies and a Russian state-sponsored campaign abusing trusted infrastructure and edge devices.

Watch or listen to hear why hiring workflows, contractors, credentials, and edge devices are now part of your attack surface and what to do about it.

Watch the video: youtu.be/WE8p9I3uUuA

Listen to the podcast: chatcyberside.com/e/amazon-s-d

#LMGSecurity #CybersideChats #IdentitySecurity #VendorRisk #InitialAccess #ZeroTrust #SecurityLeadership

2025-12-29

Russian state-sponsored hackers linked to the GRU have been targeting Western critical infrastructure for years, not with flashy zero-days, but by abusing misconfigured network edge devices to harvest credentials and persist inside victim systems.

Read the full report: aws.amazon.com/blogs/security/

#Cybersecurity #ThreatIntelligence #CriticalInfrastructure #NetworkSecurity #CloudSecurity #GRU #IdentityAccessManagement #RiskManagement

2025-12-23

Many organizations still treat identity as something you check once at login. On this week’s Cyberside Chats, Sherri Davidoff and Matt Durrin break down how AI-driven impersonation has made that model unsafe, and why authentication has to extend into calls, chats, approvals, and support workflows in 2026.

They also cover practical ways to add verification where mistakes are costly and how to retrain employees when visual and verbal cues can’t be trusted. If identity is on your 2026 roadmap, this conversation helps clarify what needs to change.

Watch the video: youtu.be/J0UJSV6wYlI

Listen here: chatcyberside.com/e/when-ai-st

#CybersideChats #IdentitySecurity #Authentication #AIThreats #EnterpriseSecurity #SecurityPrograms #RiskManagement #ITSecurity

2025-12-22

The holidays are in full swing, and the attackers (and evil AI tools) have been busy. In this 2-minute video, we show what happened when our team asked WormGPT, a dark-web AI with no guardrails, to generate a holiday scam. Watch it here: youtube.com/watch?v=YCS75iScU-E

#AI #EvilAI #WormGPT #Cybersecurity #Infosec #HolidayScams #Holidays #Phishing

2025-12-19

Collaboration tools like Teams, Slack, and Zoom have become prime targets for attackers—and Microsoft’s latest roadmap updates reflect that shift.

These new security features tell us a lot about the evolving threat landscape and where organizations still need to pay attention. If your security strategy hasn’t caught up with how people actually communicate, this Cyberside Chats episode is worth a listen: chatcyberside.com/e/collaborat

#CybersideChats #Cybersecurity #ThreatLandscape #Microsoft365 #CollaborationSecurity #Phishing #IdentitySecurity #SecurityAwareness

2025-12-18

Microsoft’s upcoming 2026 security features highlight a shift many organizations are already experiencing: collaboration platforms and identity workflows are now prime attack paths.

From Teams-based impersonation to AI-driven data exposure, these updates address behaviors attackers are actively abusing — often without malware or zero-days. Security leaders should treat this roadmap as a planning signal, not a future wish list.

Read our blog for a full breakdown: lmgsecurity.com/5-new-ish-micr

#Microsoft365 #CollaborationTools #IdentityAndAccess #AIinSecurity #CISO #SecurityOperations #ThreatDetection #CyberDefense

2025-12-17

A single cloud outage can disrupt every core system you depend on, which is why digital resilience has to extend far beyond traditional continuity planning.

In this quick video, we outline five steps every CISO should prioritize—from mapping third- and fourth-party dependencies to running cloud-outage tabletop exercises that mirror real conditions. Watch it here: youtube.com/watch?v=-fgyWb1dq_g

#DigitalResilience #CloudSecurity #BusinessContinuity #IncidentResponse #CISO #RiskManagement #ThirdPartyRisk #InfoSec

2025-12-16

What do Microsoft’s 2026 security features tell us about how attackers are actually breaching collaboration platforms?

On this week’s Cyberside Chats, Sherri Davidoff and Matt Durrin break down the updates—from anomaly reporting to tenant restrictions—and show why every organization needs clearer data classifications, stronger identity boundaries, and easier ways for users to report suspicious activity. It’s a practical roadmap for securing the tools employees rely on every day.

Watch the video: youtube.com/watch?v=60bYlgCI7zw

Listen here: chatcyberside.com/e/collaborat

Or find Cyberside Chats wherever you get your podcasts.

#CollaborationTools #Microsoft365 #IdentityManagement #AnomalyDetection #AICopilots #DataSecurity #SecurityTraining #CybersideChats

2025-12-15

Start 2026 with one upgrade that pays off immediately: tighten identity verification across your organization. In this week’s Cyberside Chats: Live, Sherri Davidoff and Matt Durrin break down how AI-driven impersonation is changing the rules and the quick wins security teams should prioritize first.

Two more days to register: lmgsecurity.com/event/cybersid

#CybersideChats #IdentitySecurity #AIThreats #Deepfakes #Authentication #SecurityAwareness #CyberRisk #EnterpriseSecurity

2025-12-11

Think browser extensions are harmless? Think again. A multi-year campaign turned popular, trusted browser add-ons into full-blown spyware featuring remote code execution, session hijacking, token theft and real-time browsing surveillance.

If you’re managing enterprise security, audit all extensions now, enforce allow-lists, and treat them as part of your software supply chain.

Read the blog here: lmgsecurity.com/4-3-million-re

#browserextensions #cyberrisk #threatintelligence #endpointsecurity #supplychainsecurity #identityprotection #enterpriseIT

2025-12-10

If AI can spoof your people, your processes, and your communications, what’s left to trust?

In the next Cyberside Chats: Live, Sherri Davidoff and Matt Durrin break down the identity upgrades every organization needs for 2026: tighter verification, stronger authentication, and user training built for an era where old phishing cues no longer apply.

Register here to join us on December 17th: lmgsecurity.com/event/cybersid

#CybersideChats #AIImpersonation #IdentityManagement #AccessControl #SecurityAwareness #PhishingPrevention #EnterpriseSecurity #CyberRisk

2025-12-09

More than 4.3 million users were affected before anyone realized ShadyPanda’s extensions had turned into full surveillance tools.

In the latest Cyberside Chats episode, Sherri Davidoff and Matt Durrin break down how attackers built trust for years, then used auto-updates to harvest browsing data, authentication tokens, and even live session cookies. The discussion also covers why session hijacking is so dangerous—and the safeguards security leaders should be implementing now.

Watch the full conversation: youtu.be/x9AaE94KanM

Or listen to the podcast: chatcyberside.com/e/shady-pand

#CybersideChats #BrowserSecurity #SupplyChainRisk #SessionHijacking #CyberThreats #IdentitySecurity #EnterpriseSecurity #SecurityOperations

2025-12-08

Imagine you receive a call from an AI-generated voice clone of a loved one. They say they’re in trouble, and it sounds exactly like them.

That scenario is no longer fiction. In Sherri Davidoff’s recent NBC Montana and Clearwater Credit Union interview, she and Kyle Rholl explain how AI-driven voice cloning is being used to impersonate friends and family—and why reacting under pressure is exactly what scammers count on. If a call feels rushed or emotional, hang up and call back a trusted number.

Full story: nbcmontana.com/news/spot-the-s

#fraudprevention #scams #cybersecurity #voicecloning #socialengineering #fraudawareness #financialsafety

2025-12-05

When insider incidents can hit even the most security-focused companies, it forces every organization to reconsider how much “trust” is built into their workflows. Effective insider-threat defense now requires continuous monitoring, tighter access governance, and stronger guardrails around employee privileges—because the risk isn’t theoretical anymore.

Explore how these attacks unfold and what you can do to reduce exposure on our blog: lmgsecurity.com/betrayed-from-

Or listen to the podcast: chatcyberside.com/e/when-secur

#InsiderThreat #Cybersecurity #ZeroTrust #AccessManagement #SecurityOperations #RiskManagement #InsiderRisk

2025-12-04

Insider threats are no longer edge cases — they’re becoming one of the most common drivers of real-world incidents.

Our latest article analyzes insider cases at CrowdStrike, DigitalMint, Tesla, and more, highlighting how attackers are:
- Buying insider access
- Recruiting disgruntled employees
- Exploiting remote hiring processes
- And impersonating workers using stolen identities

We outline five actionable steps security leaders can take today to strengthen insider-threat defenses.

➡️ Betrayed From Within: The Modern Insider Attack lmgsecurity.com/betrayed-from-

#InsiderThreat #DataProtection #AccessControl #SecurityOperations #CompanyCulture #RiskReduction #CyberDefense

2025-12-03

Recovery times are improving, and the rise of truly immutable backups is a major reason why.

This short video breaks down what “immutable” actually means, why it matters for ransomware resilience, and how proactive planning accelerates recovery.

If you’re reassessing your backup strategy, this is a clear look at what’s driving faster bounce-backs.

Watch here: youtube.com/watch?v=XgdPWZ5OKB0

#Cybersecurity #Ransomware #DataRecovery #BackupSecurity #ImmutableBackups #Resilience #IncidentResponse #BusinessContinuity

2025-12-02

Insider threats aren’t theoretical anymore—they’re happening inside organizations just like yours.

This week on Cyberside Chats, Sherri and Matt break down major insider cases—from the new CrowdStrike leak and DigitalMint ransomware indictments to Tesla’s multi-year insider problems, and the crackdown on North Korean operatives using stolen identities to get hired.

Attackers are buying, recruiting, and embedding insiders faster than organizations are adapting their defenses.

Watch this week’s full episode for actionable strategies to reduce your organization’s risk.

Watch: youtu.be/s7QW_BkkAvM

Listen: chatcyberside.com/e/when-secur

#Ransomware #InsiderThreats #Cybersecurity #CrowdStrike #DigitalMint #Tesla #Cyberaware #Infosec

2025-11-25

A single “smart” device with undocumented connectivity can quietly tunnel out of your network—and most organizations don’t discover it until something goes wrong.

On the latest Cyberside Chats episode, Sherri Davidoff and Matt Durrin walk through real-world scenarios where hidden radios, cloud paths, and offshore update servers slipped in through routine hardware purchases. They explain how simple policies, ABOM requirements, and smart segmentation can stop these surprises before they become security incidents.

Listen here: chatcyberside.com/e/chinas-hid

Watch the video: youtu.be/WYq6YTqanA4

#CybersideChats #HardwareRisk #SupplyChainSecurity #ThirdPartyRisk #ABOM #NetworkSecurity #FirmwareIntegrity #ConnectedTech

2025-11-24

MFA alone isn’t enough if attackers can exploit fatigue prompts or weak fallback options.

In this 1-minute video, Sherri Davidoff and Matt Durrin break down the most common gaps and what defenders must reassess. A strong security program starts with understanding how your MFA behaves under pressure. youtube.com/watch?v=x290l-EAo8Q

#Cybersecurity #MFA #MultifactorAuthentication #2FA #Authentication #AccessControl #Credentials #SecurityBestPractices

2025-11-21

Holiday-season scams now hit businesses as hard as consumers, with bots, spoofed sites, and AI-driven phishing targeting employees across SSO, VPN, and admin portals.

This checklist highlights practical steps security teams can take now — from enforcing strong MFA to tuning bot-detection rules and running focused awareness pushes before Black Friday and Christmas. Download it here: lmgsecurity.com/resources/holi

#Cybersecurity #FraudPrevention #MFA #DNSFiltering #BotDetection #SecurityAwareness #BYOD #Phishing

Client Info

Server: https://mastodon.social
Version: 2025.07
Repository: https://github.com/cyevgeniy/lmst