Featured Blog
When “Basic” Attacks Cause Massive Damage: What the Stryker Attack Really Shows
A reported 200,000 devices impacted. Manufacturing disruption. Shipping disruption. A major medical technology company struggling to operate. That is what made the Stryker attack worth paying attention to. Not because it introduced some dazzling new exploit chain, but because it appears to have followed a pattern security leaders should already recognize: privileged access, centralized administration, and too much […]
Cyberattacks, IT, Vulnerabilities
Top 3 Ways to Protect Yourself Following Spectre and Meltdown Revelations
Compliance, Cybersecurity, IoT, IT, Password, Vulnerabilities
Top 5 Ways IT Managers Can Thwart Hackers
Breaches, Cyberattacks, Cybersecurity, IT, Malware, Password, Privacy
Can Antivirus Software Be Used Against You?
Breaches, Compliance, Cyberattacks, Cybersecurity, Password, Privacy, Uncategorized, Vulnerabilities
Password Cracking with Custom Wordlists
Breaches, Cyberattacks, Cybersecurity, Malware, Ransomware
PetrWrap: New Strain of Petya Ransomware Infects Systems Worldwide
Black Hat, Breaches, Cybersecurity, DEF CON, Devices, Events, Government, IoT, Vulnerabilities
Watch LMG Experts Recap Black Hat/Defcon 2017!
Black Hat, Breaches, Compliance, Cyberattacks, Cybersecurity, Network Forensics, Phishing, Privacy, Vulnerabilities