Featured Blog
            
            Poisoned Search: How Hackers Turn Google Results into Backdoors
If you searched “Download Microsoft Teams” in late September, you might have seen a very convincing ad at the top of your results. It looked legitimate—Microsoft logo, professional text, the works. But clicking that ad could have installed a remote access Trojan on your system. That’s what researchers at Blackpoint Cyber’s Security Operations Center (SOC) […]
                            Black Hat, Breaches, Compliance, Cyberattacks, Cybersecurity, Network Forensics, Phishing, Privacy, Vulnerabilities
                    Want Good Results On Your Next Pentest? Focus on your Commendable Practices
                            Black Hat, Cyberattacks, Cybersecurity, Malware, Network Forensics, Vulnerabilities
                    Antivirus Evasion
                            Breaches, Cyberattacks, Cybersecurity, IT, Malware, Network Forensics
                    LMG wants to help you Achieve NOTHING!
                            Cyberattacks, Cybersecurity, Malware, Uncategorized
                    Industroyer: The Resurgence of Industrial Controls Malware
                            Compliance, Cybersecurity, Partnerships