Featured Blog
From Hotel Printers to Home Offices: Securing the Last Endpoint You Forgot
When the headlines splashed across international news about sensitive U.S. State Department documents left sitting in a hotel printer on the eve of the Trump–Putin summit, the story practically wrote itself. Eight pages of schedules, menus, and meeting locations forgotten in a tray? Embarrassing. But here’s the real problem: it’s not just the documents left […]
Breaches, Compliance, Cyberattacks, Cybersecurity, Password, Privacy, Uncategorized, Vulnerabilities
Password Cracking with Custom Wordlists
Breaches, Cyberattacks, Cybersecurity, Malware, Ransomware
PetrWrap: New Strain of Petya Ransomware Infects Systems Worldwide
Black Hat, Breaches, Cybersecurity, DEF CON, Devices, Events, Government, IoT, Vulnerabilities
Watch LMG Experts Recap Black Hat/Defcon 2017!
Black Hat, Breaches, Compliance, Cyberattacks, Cybersecurity, Network Forensics, Phishing, Privacy, Vulnerabilities
Want Good Results On Your Next Pentest? Focus on your Commendable Practices
Black Hat, Cyberattacks, Cybersecurity, Malware, Network Forensics, Vulnerabilities
Antivirus Evasion
Breaches, Cyberattacks, Cybersecurity, IT, Malware, Network Forensics