LMG Security

LMG Security is an internationally recognized leader in cybersecurity. We are a full-service consulting firm, delivering proactive cybersecurity solutions, advisory and compliance services, penetration testing, training, and more. The LMG Security team has published game-changing cybersecurity research, written books on ransomware, data breaches and network forensics, and routinely speaks or trains at Black Hat, RSA, and many other security conferences. With a wide range of clients, including government agencies, financial institutions, health care organizations, law firms, academia, Fortune 500 companies and more, the LMG Security team has also had their expertise noted on the TODAY show and in The New York Times. Visit us at www.LMGsecurity.com for more information.

Website:
www.LMGsecurity.com
Cybersecurity services:
Penetration testing, advisory, solutions & training.
Blog:
www.LMGsecurity.com/blog
Tip sheets:
www.LMGsecurity.com/LMG-resources
Events & webinars:
www.LMGsecurity.com/events
Videos:
www.youtube.com/@LMGsecurity
2025-12-04

Insider threats are no longer edge cases — they’re becoming one of the most common drivers of real-world incidents.

Our latest article analyzes insider cases at CrowdStrike, DigitalMint, Tesla, and more, highlighting how attackers are:
- Buying insider access
- Recruiting disgruntled employees
- Exploiting remote hiring processes
- And impersonating workers using stolen identities

We outline five actionable steps security leaders can take today to strengthen insider-threat defenses.

➡️ Betrayed From Within: The Modern Insider Attack lmgsecurity.com/betrayed-from-

#InsiderThreat #DataProtection #AccessControl #SecurityOperations #CompanyCulture #RiskReduction #CyberDefense

2025-12-03

Recovery times are improving, and the rise of truly immutable backups is a major reason why.

This short video breaks down what “immutable” actually means, why it matters for ransomware resilience, and how proactive planning accelerates recovery.

If you’re reassessing your backup strategy, this is a clear look at what’s driving faster bounce-backs.

Watch here: youtube.com/watch?v=XgdPWZ5OKB0

#Cybersecurity #Ransomware #DataRecovery #BackupSecurity #ImmutableBackups #Resilience #IncidentResponse #BusinessContinuity

2025-12-02

Insider threats aren’t theoretical anymore—they’re happening inside organizations just like yours.

This week on Cyberside Chats, Sherri and Matt break down major insider cases—from the new CrowdStrike leak and DigitalMint ransomware indictments to Tesla’s multi-year insider problems, and the crackdown on North Korean operatives using stolen identities to get hired.

Attackers are buying, recruiting, and embedding insiders faster than organizations are adapting their defenses.

Watch this week’s full episode for actionable strategies to reduce your organization’s risk.

Watch: youtu.be/s7QW_BkkAvM

Listen: chatcyberside.com/e/when-secur

#Ransomware #InsiderThreats #Cybersecurity #CrowdStrike #DigitalMint #Tesla #Cyberaware #Infosec

2025-11-25

A single “smart” device with undocumented connectivity can quietly tunnel out of your network—and most organizations don’t discover it until something goes wrong.

On the latest Cyberside Chats episode, Sherri Davidoff and Matt Durrin walk through real-world scenarios where hidden radios, cloud paths, and offshore update servers slipped in through routine hardware purchases. They explain how simple policies, ABOM requirements, and smart segmentation can stop these surprises before they become security incidents.

Listen here: chatcyberside.com/e/chinas-hid

Watch the video: youtu.be/WYq6YTqanA4

#CybersideChats #HardwareRisk #SupplyChainSecurity #ThirdPartyRisk #ABOM #NetworkSecurity #FirmwareIntegrity #ConnectedTech

2025-11-24

MFA alone isn’t enough if attackers can exploit fatigue prompts or weak fallback options.

In this 1-minute video, Sherri Davidoff and Matt Durrin break down the most common gaps and what defenders must reassess. A strong security program starts with understanding how your MFA behaves under pressure. youtube.com/watch?v=x290l-EAo8Q

#Cybersecurity #MFA #MultifactorAuthentication #2FA #Authentication #AccessControl #Credentials #SecurityBestPractices

2025-11-21

Holiday-season scams now hit businesses as hard as consumers, with bots, spoofed sites, and AI-driven phishing targeting employees across SSO, VPN, and admin portals.

This checklist highlights practical steps security teams can take now — from enforcing strong MFA to tuning bot-detection rules and running focused awareness pushes before Black Friday and Christmas. Download it here: lmgsecurity.com/resources/holi

#Cybersecurity #FraudPrevention #MFA #DNSFiltering #BotDetection #SecurityAwareness #BYOD #Phishing

2025-11-19

“WormGPT did in 30 seconds what used to take hours to build.” - Matt Durrin, LMG Security

Attackers are now using malicious AI to launch holiday scams at a scale we’ve never seen before. And those stolen consumer credentials? They’re flowing straight into SSO, Microsoft 365, and VPN attacks.

We just published a breakdown of this year’s AI-driven holiday fraud surge — plus a free checklist your team can use today: lmgsecurity.com/holiday-hacker

#Cybersecurity #Fraud #AI #MaliciousAI #Holidays #HolidayScams #RemoteWork #Infosec

2025-11-18

AI-driven fraud is hitting holiday shoppers at machine speed. In today’s Cyberside Chats episode, Sherri Davidoff and Matt Durrin unpack what that looks like in the real world. They discuss how phishing kits, prebuilt configs, and bot-driven takeovers are giving attackers a near-instant launchpad for credential abuse.

This breakdown shows how quickly these tools scale—and why teams need to shore up people, passwords, and payments before the rush.

Listen here: chatcyberside.com/e/holiday-ha

Watch the video: youtu.be/TpMD5v5JUNc

Or find Cyberside Chats wherever you get your podcasts.

#CyberDefense #SecurityAwareness #OnlineFraud #DigitalRisk #ThreatResearch #AIinSecurity #Malvertising #HolidayThreats

2025-11-17

When security assessments leak, the fallout can eclipse the original incident.

In our latest Cyberside Chats episode on the Louvre heist, Sherri Davidoff and Matt Durrin dig into how exposed audit findings fueled public scrutiny and what every organization should learn from it.

If you want to hear how a seven-minute robbery turned into a reputational firestorm — and how to keep your own reports from becoming headlines — listen to the full podcast here: chatcyberside.com/e/louvre-hei

#Cybersecurity #InformationSecurity #ReputationalRisk #SecurityAudits #DataProtection #ThirdPartyRisk #IncidentResponse #CyberRisk

2025-11-14

Your network may be locked down — but what about the circuitry inside the devices you trust?

Join Sherri Davidoff and Matt Durrin next Wednesday, November 19th for a Cyberside Chats: Live! that explores how subtle hardware design choices and opaque sourcing can introduce risk long before a device ever reaches your environment. You’ll also learn the steps your team can take to spot the red flags.

Register here: lmgsecurity.com/event/cybersid

#Cybersecurity #SupplyChainSecurity #ThirdPartyRiskManagement #HardwareSecurity #FirmwareRisk #EnterpriseSecurity #CyberRisk #Podcast

2025-11-12

Last week, LMG Security had the pleasure of speaking with the Las Vegas ISSA chapter!

Our Director of Training and Research Matt Durrin led a thought-provoking session on “Deep Fakes & AI: The New Frontier of Cybercrime.” He explored how rapidly evolving AI tools are transforming social engineering, fraud, and digital trust.

Thank you to the ISSA Las Vegas community for the warm welcome and insightful discussion.

#Cybersecurity #AI #DeepFakes #SocialEngineering #FraudPrevention #Cybercrime #SecurityAwareness #InformationSecurity

2025-11-11

When the Louvre was robbed in just seven minutes, most people blamed the thieves. But leaked audit reports told another story — one of weak passwords, ignored warnings, and outdated systems.

In this episode of Cyberside Chats, Sherri Davidoff and Matt Durrin reveal how the same security blind spots behind the heist also threaten hospitals, banks, and critical infrastructure today and what practical steps you can take to avoid becoming the next headline.

Listen now and learn how to lock down your organization.

Podcast: chatcyberside.com/e/louvre-hei

Video: youtu.be/3ErXdXv_bN8

#Cybersecurity #PhysicalSecurity #Security #Authentication #PasswordSecurity #PenetrationTesting #RiskManagement #Louvre #Infosec

2025-11-07

CISA’s Automated Indicator Sharing (AIS) program once delivered real-time, machine-readable threat intelligence across sectors to help organizations detect and respond faster.

But with participation disrupted, collective defense is at risk. In this video, we explain how AIS worked, why it mattered, and what your organization can do to stay protected in a post-AIS environment.

Watch now to learn how to adapt your threat intelligence strategy: youtube.com/watch?v=qFPCLWb9ezs

#Cybersecurity #ThreatIntelligence #CISA #InfoSharing #IncidentResponse #ThreatDetection #CollectiveDefense #CyberResilience

2025-11-06

A great penetration test doesn’t just find vulnerabilities—it shows how attackers could exploit them and exposes the human and procedural gaps behind technical issues. Organizations that test regularly build stronger coordination, improve processes, and prevent repeat mistakes.

That’s why penetration testing has earned its place as LMG Security’s Top Cybersecurity Control of Q4 2025. Read our blog to learn more: lmgsecurity.com/top-control-of

How does your team turn penetration test results into lasting improvements?

#Cybersecurity #PenetrationTesting #RiskManagement

2025-11-05

What can a jewel heist teach us about cybersecurity?

When Hank Green sat down with Sherri Davidoff to analyze the Louvre theft, the conversation revealed striking parallels between physical and digital breaches. From "unpatched" vulnerabilities (digital and physical) to leaked audits, attackers thrive when everyday operations create blind spots. Every system—whether it’s a museum or a network—has tradeoffs that criminals are eager to exploit.

Watch the full conversation here: youtu.be/NIGbQ9NHFEg?si=fdff_1

#Cybersecurity #RiskManagement #SecurityStrategy #IncidentResponse #ThreatAnalysis #InformationSecurity #DataProtection #SecurityAwareness

LMG Security boosted:
2025-11-05

I can't say I was expecting to see a high school friend interviewed in a #HankGreen video about the Louvre Heist!

youtu.be/NIGbQ9NHFEg?t=156

And it looks like the security company #SherriDavidoff founded is on Mastodon at @LMGsecurity!

2025-11-04

Attackers are turning Google results into malware delivery systems, using fake software installers and sponsored ads to plant backdoors inside organizations. In this episode of Cyberside Chats, Sherri Davidoff and Matt Durrin unpack the latest SEO poisoning and malvertising research and share actionable defenses.

From ad blocking to safer browsing habits, learn how to protect your team from the poisoned web. Listen to the podcast: chatcyberside.com/e/search-res

Watch the video: youtu.be/xKKA1ikoZ-4

#SEOpoisoning #Malvertising #Cybersecurity #Software #Advertising #Phishing #PoisonedWeb

2025-10-31

What happens when you mix a high-stakes cybersecurity tabletop with top-shelf whiskey? You get an unforgettable night.

LMG Security teamed up with our partners at Constangy for an exclusive AI Fraud Tabletop and Whiskey Tasting at the Multnomah Whiskey Library. Guests put their skills to the test in a live, AI-driven fraud scenario while enjoying a curated whiskey flight.

A huge thank-you to everyone who joined us for sharp insights, great company, and an incredible evening!

#Cybersecurity #infosec #AIFraud #IncidentResponse #AIsecurity #tabletopexercise #AI

2025-10-30

Hackers don’t need to phish your inbox anymore — they just need you to search.

Attackers are poisoning Google results and buying ads to spread malware and steal credentials. In our latest blog, we break down how fake Microsoft Teams installers, cloned payroll portals, and AI-generated phishing campaigns are reshaping modern social engineering — and how your organization can fight back.

Read more: lmgsecurity.com/poisoned-searc

#Cybersecurity #Phishing #AI #CISO #ITSecurity #AIsecurity #Malvertising

2025-10-29

We had a great time exhibiting at BSides Portland and connecting with the local security community last week.

LMG’s Matt Durrin took the stage to present “Hackers + AI: Faster, Smarter, More Dangerous,” a live demo showing how criminals are using tools like WormGPT to uncover vulnerabilities, generate exploits, and weaponize zero-days faster than ever.

Thank you to the BSides Portland organizers and attendees for another fantastic event.

#Cybersecurity #AI #Infosec #BSides #AI #AISecurity #WormGPT #BSidesPDX

Client Info

Server: https://mastodon.social
Version: 2025.07
Repository: https://github.com/cyevgeniy/lmst