LMG Security

LMG Security is an internationally recognized leader in cybersecurity. We are a full-service consulting firm, delivering proactive cybersecurity solutions, advisory and compliance services, penetration testing, training, and more. The LMG Security team has published game-changing cybersecurity research, written books on ransomware, data breaches and network forensics, and routinely speaks or trains at Black Hat, RSA, and many other security conferences. With a wide range of clients, including government agencies, financial institutions, health care organizations, law firms, academia, Fortune 500 companies and more, the LMG Security team has also had their expertise noted on the TODAY show and in The New York Times. Visit us at www.LMGsecurity.com for more information.

2025-05-22

Are your defenses ready for the quantum future?

Quantum computing and cybersecurity are on a collision course—and it's time to start thinking about the impacts it will have on your organization.

Check out our latest blog to learn what quantum computing means for your organization, the NIST standards, how to protect your data, and what steps to take right now to stay ahead of the curve.

Read more: lmgsecurity.com/quantum-comput

#Cybersecurity #QuantumComputing #PostQuantum #DataSecurity #Tech #Cyberaware #NIST #Encryption #Infosec #CISO #RiskManagement #IT #Cyber

2025-05-21

Windows 11 just took a major step into post-quantum security. At Microsoft BUILD 2025, the company announced the integration of quantum-resistant cryptography into Windows 11. For the first time, developers can invoke post-quantum algorithms using standard Windows APIs. It’s a pivotal move to safeguard data from future quantum-enabled threats.

Read the details: arstechnica.com/security/2025/

#PostQuantum #Cryptography #Microsoft #Windows11 #Cybersecurity #QuantumComputing #Encryption #IT #CISO #RiskManagement #InfoSec

509 / 63,206

2025-05-20

The hackers got hacked! In an ironic twist, LockBit, the infamous ransomware-as-a-service gang, was breached. Watch the new episode of Cyberside Chats as @sherridavidoff and @MDurrin share the details and explain what it means for cyber defenders.

We explore what was leaked, why it matters, and how this incident compares to past takedowns like Conti. You'll also get the latest insights into the 2025 ransomware landscape, from victim stats to best practices for defending your organization.

Watch or listen now and get practical takeaways to strengthen your ransomware response playbook.

Watch: youtu.be/xr-8GhazgME
Listen: chatcyberside.com/e/lockbits-o

#Ransomware #Cybersecurity #LockBit #DFIR #IncidentResponse #ThreatIntel #CybersideChats #LMGSecurity #Cybercrime #Hackers #DataBreach #CISO #CyberAware

2025-05-19

New ransomware tactic! Firmware-based attacks could soon target your CPU directly. Rapid7's team has developed a proof-of-concept ransomware capable of infecting CPU microcode, potentially bypassing all traditional cybersecurity defenses and locking drives before the OS even boots.

Read the details: tomshardware.com/pc-components

#cybersecurity #ransomware #infosec #DFIR #CISO #ITsecurity #IT #riskmanagement

2025-05-16

File Transfer Tools Under Fire

Secure file transfer vulnerabilities are fueling massive breaches—and insurers are tightening the rules. In just 9 minutes, get expert insights on:

✅ The ripple effect of the CrowdStrike outage
✅ How the Cleo breach by the Clop gang impacts your data
✅ AI’s role in faster exploits and leaked code weaponization
✅ How cyber insurance is evolving
✅ What your team can do to stay protected

From MoveIt to Cleo, file transfer tools are prime targets. Don’t become the next headline.

Watch now: youtu.be/vAm5N8c2EGk

#CyberInsurance #FileTransferBreach #CleoBreach #ClopRansomware #CrowdStrike #ZeroDay #Cybersecurity #LMGSecurity #DataRisk #VulnerabilityManagement #databreach #CISO #Cyberaware #Infosec #DFIR

2025-05-15

At the recent #RSAC2025 conference, LMG Security's @sherridavidoff and @MDurrin drew packed crowds with their sessions on how hackers use AI to exploit stolen source code and a hands-on tabletop lab exploring deepfake cyber extortion.

We’ve received a lot of inquiries about these sessions! If you couldn’t attend RSA and you're interested in these topics, we also offer custom training and tabletop exercises to help your team prepare for the next generation of AI-powered cyber threats.

Contact us to learn more: lmgsecurity.com/contact-us/

#Cybersecurity #AIsecurity #AI #TabletopExercises #CISO #Infosec #RiskManagement #IT #Deepfake #CIO #DFIR #ITsecurity

2025-05-15

AI-powered features are the new attack surface! Check out our new blog in which LMG Security’s Senior Penetration Tester Emily Gosney @baybedoll shares real-world strategies for testing AI-driven web apps against the latest prompt injection threats.

From content smuggling to prompt splitting, attackers are using natural language to manipulate AI systems. Learn the top techniques—and why your web app pen test must include prompt injection testing to defend against today’s AI-driven threats.

Read now: lmgsecurity.com/are-your-ai-ba

#CyberSecurity #PromptInjection #AIsecurity #WebAppSecurity #PenetrationTesting #LLMvulnerabilities #Pentest #DFIR #AI #CISO #Pentesting #Infosec #ITsecurity

2025-05-14

2025 Ransomware Trends You Need to Know

Ransomware isn’t slowing down—in fact, it’s evolving faster than ever in 2025. Watch our new video for details on ransomware trends, including:

🔹 AI-powered ransomware that evolves faster than defenders can keep up
🔹 A surge in rookie attackers using leaked playbooks and dark web kits
🔹 The 2025 must-have proactive prevention strategies

Watch now for the details! youtu.be/r4_ePm3swE0

#Cybersecurity #Cyberaware #Ransomware #RansomwareTrends #AIThreats #EDR #XDR #SupplyChainSecurity

2025-05-13

The FBI has issued an alert about cybercriminals hijacking outdated routers to power massive proxy-for-hire networks—masking malware, fraud, and credential theft right under your nose.

Watch the full Cyberside Chats episode to hear @sherridavidoff and @MDurrin 's insights on:

🔹 The FBI’s May 2025 alert
🔹 TheMoon malware and the Faceless proxy service
🔹 What these botnets mean for your enterprise
🔹 What you need to do now to stay protected

🎥 Watch the video: youtu.be/x_40BlvWsHk
🎧 Listen to the podcast: chatcyberside.com/e/outdated-r

#Cybersecurity #RouterSecurity #ThreatIntel #Malware #CISO #CybersideChats #ProxyAbuse #TheMoonMalware #Botnets #NetworkSecurity #CISO #Cyberaware #Tech #Infosec #IT #CIO #SMB #Cyber

2025-05-12

Think your network is locked down? Think again.

Register for our May 28th Cyberside Chats Live episode featuring special guest @tompohl, LMG Security’s Head of Penetration Testing, and discover the most common security gaps attackers exploit.

Tom will share how his team routinely gains domain admin access in over 90% of their engagements—and how you can stop real attackers from doing the same. He’ll break down the weak points they target, from insecure default Active Directory settings to overlooked misconfigurations—even in mature environments.

Register now: lmgsecurity.com/event/cybersid

#Cybersecurity #PenetrationTesting #InfoSec #ITsecurity #CybersideChats #CISO #Pentest #DFIR #NetworkSecurity #IT

2025-05-09

Check out TechSpot’s new article featuring LMG Security’s @sherridavidoff and @MDurrin on how “Evil AI” is accelerating cyber threats.

The article recaps their #RSAC2025 presentation, where they demonstrated how rogue AI tools like WormGPT—AI stripped of ethical guardrails—can rapidly detect and help exploit real-world vulnerabilities.

From identifying SQL flaws to delivering working Log4j and Magento exploits, Sherri and Matt reveal how AI is arming cybercriminals faster than traditional defenses can keep up.

Read the full TechSpot article: techspot.com/news/107786-rsa-c

#Cybersecurity #AIsecurity #WormGPT #RSAC #TechSpot #Infosec #LMGSecurity #AI #EvilAI #RiskManagement #CISO #SMB #CIO #IT #ITsecurity #RSAC2025

2025-05-08

Dive into our new technical blog, No Exploits Needed: Using Cisco’s Own Features to Extract Credentials, for a behind-the-scenes look at how default settings can lead to a data breach.

In this post, Penetration Testing Team Manager @tompohl shares how he extracted a Cisco router’s entire running configuration—no credentials required—during a recent penetration test and offers tips for hardening your security. lmgsecurity.com/no-exploits-ne

#Cybersecurity #PenetrationTesting #Pentest #IT #CISO #DFIR #Infosec #ITsecurity #NetworkSecurity #Cisco #SecurityTesting

2025-05-07

Congratulations to @sherridavidoff and @MDurrin for an amazing session at #RSAC! PCWorld called their session on Evil AI and hacker tools like WormGPT “a glimpse into a mirror universe” that provided an “aha” moment about how AI is already impacting cybersecurity.

In a packed room at RSA, Sherri and Matt demonstrated how rogue AI tools are already finding vulnerabilities faster than many defensive systems and how the cybersecurity community must adapt.

Read PCWorld's full article: ow.ly/M6gz50VMXGo

#Cybersecurity #AI #InfoSec #LMGSecurity #WormGPT #EvilAI #CISO #CEO #CyberAware #CIO #RiskManagement #AIThreats #ITsecurity #IT #Tech #Cyber

2025-05-06

AI is making #cyberattacks faster and easier. Are you ready?

In our latest podcast, Hacker AI: Smarter Attacks, Faster Exploits, Higher Stakes, @sherridavidoff and @MDurrin dive into how cybercriminals are weaponizing AI to launch more convincing, scalable attacks—from deepfake scams to AI-assisted exploit development.
You'll hear about original research using real underground AI tools like WormGPT, plus field-tested strategies you can put into action today to defend your organization.

🎥 Watch the full episode: youtu.be/QfhmG7QxTdI
🎧 Listen on your favorite podcast app: chatcyberside.com/e/ai-in-cybe

#Cybersecurity #AI #AIThreats #Cybercrime #InfoSec #IncidentResponse #Cyberaware #SMB #CEO #CISO #RiskManagement #DFIR #CIO

2025-05-05

Cybercriminals are using Google Ads to hijack accounts, steal data, and clone websites using AI—and it’s happening faster than you think.

Want to keep your company safe? Watch our latest video: Malvertising Attacks: How Google Ad Spoofed Account Attacks Work. You'll learn how these attacks work, why phishing is moving beyond email, and what practical steps you can take to defend your organization. youtu.be/Q_qTvyVlGwc

#Cybersecurity #Malvertising #Phishing #Google #GoogleAds #AI #InfoSec #Google #Cyberaware #SMB #RiskManagement #Tech #IT #AI

2025-04-30

For our #Utah friends, the Early Bird Discount for our June 10th live Penetration Testing for IT Pros class ends in 2 days!

Join us in Salt Lake City for a full-day, hands-on class that teaches you how to pentest and secure your organization.

Taught by expert instructors @tompohl and @MDurrin, this hands-on training includes lab work and real-world scenarios so you can learn to find your security gaps before attackers do!

Date: Tuesday, June 10, 2025

Location: Salt Lake City, UT

Early Bird Price: $850 until May 2 ($950 after)

Seats are limited—register today: lmgsecurity.com/event/penetrat

#PenetrationTesting #CyberSecurity #SaltLakeCity #EthicalHacking #Pentest #DataBreach #Utah #ITPros #Infosec #Training #Databreach #DFIR #CybersecurityTraining

2025-04-29

Quantum computing is poised to break some of today's popular encryption standards. Is your organization ready?

From e-commerce transactions to email security, quantum advancements threaten to upend how organizations secure information. In this episode of Cyberside Chats, Sherri Davidoff and Matt Durrin cut through the hype and explain what your organization needs to do now to prepare.

Learn:
• What encryption standards will be broken
• How post-quantum cryptography (PQC) is evolving
• Key steps to protect long-term confidential data
• How to future-proof your encryption strategy

🎥 Watch the full episode: youtu.be/MnhAm4f7Bqk

🎧Listen to the podcast: chatcyberside.com/e/quantum-ap

#Cybersecurity #QuantumComputing #Quantum #Encryption #PostQuantumCryptography #Infosec #CISO #ITSecurity #CybersideChats #SMB #CEO #CIO

2025-04-28

Is your organization prepared for a ransomware attack? Even one weak spot can open the door to data theft, extortion, and operational shutdowns.

Download our free Ransomware Prevention Best Practices Checklist to learn 10 critical steps to reduce your risk. lmgsecurity.com/resources/rans

#Cybersecurity #Ransomware #RiskManagement #DataProtection #Infosec #CISO #SMB #CIO #CEO #IT #Security #ITsecurity

2025-04-25

What happens when a ransomware attack hits… and you’re also holding a glass of premium whiskey?

We had an incredible evening in Portland co-hosting a live ransomware tabletop and whiskey tasting at the Multnomah Whiskey Library, with our partners at Constangy, Brooks, Smith & Prophete, LLP. Huge thanks to Sean Hoar, CISSP, CIPP for co-presenting and bringing his expert insights as a former DOJ cyber attorney.

With every new twist in the scenario—from vendor compromise to ransom negotiation—we paused to say: “We’re going to need a stiff drink!” …and then poured the next spirit. It was a blast.

The conversations were rich, the energy was high, and one attendee told us it was the “best tabletop I’ve been to in years.” We couldn’t agree more.

More events like this are coming soon—stay tuned.

#Cybersecurity #RansomwareResponse #IncidentResponse #Ransomware #TabletopExercise #WhiskeyTasting #Portland #LMGSecurity #Constangy #CISO

2025-04-24

Hybrid cloud environments are now the norm, but they also introduce serious cybersecurity challenges.

In this new blog, Principal Consultant Benjamin Kast breaks down the reality of hybrid cloud security, including how the shared responsibility model is often misunderstood, where attackers are exploiting misconfigurations, and a checklist to help reduce your hybrid cloud security risk.

Read the blog for practical strategies to increase visibility, reduce risk, and secure your hybrid environment before attackers find the gaps: lmgsecurity.com/where-strategy

#HybridCloudSecurity #CloudSecurity #Cloud #Cybersecurity #CloudMisconfigurations #Security #Infosec #CISO #CIO #IT #ITsecurity

Client Info

Server: https://mastodon.social
Version: 2025.04
Repository: https://github.com/cyevgeniy/lmst