• No Lock, Just Leak
  • No Lock, Just Leak
  • How Hidden File Shares Exposed Domain Admin Credentials
  • The Risks of Outdated Active Directory Certificate Services Configurations
  • The AI Insider Threat: EchoLeak and the Rise of Zero-Click Exploits
  • The AI Insider Threat: EchoLeak and the Rise of Zero-Click Exploits
  • Can Geofencing Stop Cyberattacks?
  • Simple Router Security Tips That Block Hackers
  • When AI Goes Rogue: Blackmail, Shutdowns, and the Rise of High-Agency Machines
  • When AI Goes Rogue: Blackmail, Shutdowns, and the Rise of High-Agency Machines
  • Retailgeddon Reloaded: Beyond Card Theft, Into Chaos
  • Retailgeddon Reloaded: Beyond Card Theft, Into Chaos
  • How Hackers Get In: Penetration Testing Secrets from the Front Line
  • How Hackers Get In: Penetration Testing Secrets from the Front Lines
  • How Attackers Target Your Company’s AI Tools
  • Data and Asset Management Tips
  • Afterlife Access: Cybersecurity Planning for When You’re Gone
  • Afterlife Access: Cybersecurity Planning for When You’re Gone
  • The Importance of a CISO or vCISO for Qualified Cybersecurity Leadership
  • The LockBit Leak: When Hackers Get a Taste of Their Own Medicine
  • The LockBit Leak: When Hackers Get a Taste of Their Own Medicine
  • Attackers are Targeting File Transfer Software
  • 2025 Ransomware Trends
  • Network for Rent: The Criminal Market Built on Outdated Routers
  • Network for Rent: The Criminal Market Built on Outdated Routers
  • Hacker AI: Smarter Attacks, Faster Exploits, Higher Stakes
  • Hacker AI: Smarter Attacks, Faster Exploits, Higher Stakes
  • Malvertising Attacks: How Google Ad Spoofed Account Attacks Work
  • Quantum Shift: How Cybersecurity Must Evolve Now
  • Quantum Shift: How Cybersecurity Must Evolve Now
  • Red Alert: CISA’s Budget Cuts and the Fallout for Defenders
  • Red Alert: CISA’s Budget Cuts and the Fallout for Defenders
  • Black Hat 2025 360° Ransomware Response Bootcamp Training Class Teaser – Taught by LMG Security
  • 23andMe: Breaches, Bankruptcy, and Security
  • 23andMe: Breaches, Bankruptcy, and Security
  • “Unmasking Shadow IT: Navigating Unauthorized Communication Tools Like Signal”
  • Shadow Channels: The Risks of Unauthorized Communication Platforms Like Signal
  • Encryption Backdoors: Security Savior or Cyber Risk?
  • The Encryption Battle: Security Savior or Cyber Risk?
  • Deepfakes & Voice Phishing: The New Frontier of Cybercrime
  • Deepfakes & Voice Phishing: The New Frontier of Cybercrime
  • Microsoft 365 Credential Theft Attacks
  • Cyberside Chats: Wiretapped: How Hackers Infiltrated Global Telecom Networks
  • Wiretapped: How Hackers Infiltrated Global Telecom Networks
  • New MFA Bypass Attacks
  • Email Bombing & IT Helpdesk Spoofing Attacks & How to Stop Them
  • When Microsoft Goes Down: Cyber Risk & Resilience
  • When Microsoft Goes Down: Cyber Risk & Resilience
  • Abandoned S3 Buckets – A Goldmine for Hackers
  • Abandoned S3 Buckets – A Goldmine for Hackers
  • Ransomware Watch: Ghost, RansomHub, and the Latest Trends
  • Ransomware Watch: Ghost, RansomHub, and the Latest Trends
  • The Fast-Paced Threat Landscape of 2025
  • The Fast-Paced Threat Landscape of 2025
  • The OPM Security Debacle: Rogue Servers, Data Risks & What’s Next
  • The OPM Security Debacle: Rogue Servers, Data Risks & What’s Next
  • How to Adapt to AI Cybersecurity Risks
  • DeepSeek or Deep Risk? The AI Power Play With China
  • DeepSeek or Deep Risk? The AI Power Play With China
  • Top Cyber Threats of 2025
  • Top 2025 Third Party Risk Management Risks & Opportunities
  • Cyberside Chats: The Silk Road, a Pardon, and the Future of Cybercrime
  • The Silk Road, a Pardon, and the Future of Cybercrime
  • 2025 Cybersecurity Priorities: The Top 3 Moves to Make
  • Can Microsoft Copilot Be Trusted Not to Send Your Company Information Back to Microsoft?
  • Cyberside Chats: When the FBI Becomes Your IT Department
  • When the FBI Becomes Your IT Department
  • Cyberside Chats Episode 2: Cyber Trust or Bust? The New FTC Cyber Trust Mark
  • Cyber Trust or Bust? The New FTC Cyber Trust Mark
  • How Corporate Deepfake Cyberattacks Work
  • 2025 Cybersecurity Priorities: The Top 3 Moves to Make
  • WormGPT Creates Realistic Phishing Campaigns and Websites: See Real Examples!
  • Case Study: A Real-World SMISHING Attack in Action
  • Case Study: How to Protect Yourself from AI Enhanced Phishing & Business Email Compromise Attacks
  • How QR Code Phishing Attacks Work
  • Why You Can No Longer Trust Digital SSL Certificates
  • Generative AI is Predicted to Cause Billions in Cybersecurity Fraud Losses
  • Three AI Deepfake Attacks and How to Avoid Them
  • Thwarting the XZUtilities Backdoor Software Supply Chain Attack
  • Open Source Software Cybersecurity Threats & How to Reduce Your Risk
  • Case Study: Software Supply Chain Breach Tactics & Prevention Advice
  • WormGPT Easily Finds Software Vulnerabilities
  • AI-Powered Scams and Fraud
  • Is Your Third-Party Software Vulnerable?
  • Securing Your Software Supply Chain: Modern Threats and Solutions for 2024
  • Case Study: The 2024 CrowdStrike Update Failure
  • Case Study: 2024 National Public Data Breach
  • AWS Shadow Resource Attacks & S3 Bucket Namesquatting
  • Cloud Configuration Attack Trends
  • AI Cybersecurity Risks from Microsoft Copilot
  • Common Cybersecurity Threats from AI: What You Need to Know
  • 2024 Hacking Trends & Updates from Black Hat & DEFCON
  • Pentest Pro Tips with Tom: F5 Big-IP Post Exploitation Techniques
  • How the Dark Web Works 2024
  • The Difference Between Penetration Testing and Vulnerability Scanning
  • How to Run an Effective Vulnerability Management Program
  • Quick Tips for Better Attack Surface Management
  • How You and Attackers Can Use Shodan to Understand Your Network’s Attack Surface
  • Why You Need Continuous External Vulnerability Scanning
  • Navigating the Storm: Effective Incident Response in the Modern Cyber Landscape
  • The Human Firewall: Cybersecurity Staffing and Training
  • Black Hat 2024 360° Ransomware Response Bootcamp Training Class Teaser – Taught by LMG Security
  • 2024 Change Healthcare Breach Case Study
  • 2024 Ransomware Attack Trends
  • Ransomware Reshaped: Evolving Your Defenses
  • What is WormGPT? The Evil AI for Cybercriminals.
  • Demystifying Cryptography and Cryptocurrency
  • Business Email Compromise Case Study
  • Securing Your Attack Surface
  • Demo of the ConnectWise ScreenConnect Vulnerability
  • Top Cybersecurity Threats of 2024
  • How Passwordless Authentication Solutions Work
  • How Criminals Bypass Multi-Factor Authentication (MFA)
  • How Voice Cloning is Used in Social Engineering and MFA Bypass Attacks
  • Case Study: 23andMe Users Hacked
  • Tom’s Pentest Hack of the Week #10: Watch the Flipper Zero in a Physical Penetration Test
  • Tom’s Pentest Hack of the Week #8: Using Default Credentials for UPS Battery Backup
  • Forget Your Password: Voice Cloning, MFA Attacks, and Our Passwordless Future
  • Tom’s Pentest Hack of the Week #9: Unrestricted Custom Active Directory Templates
  • Common Types of Business Email Compromise Attacks & What It Costs Organizations
  • What is a Cloud Configuration Assessment?
  • What Should You Do When You Get An Email From A Colleague’s Hacked Account?
  • Weaponar: How Hackers Go From Zero to Takeover
  • Pentest Pro Tips with Tom #7: Why it’s Important to Sanitize Your Data Input
  • Case Study: Social Engineering Attack Costs MGM Resorts Over $100 Million
  • What are Todays Strongest Authentication Options?
  • Pentest Pro Tips with Tom #6: Misconfiguration Allows Certificate Security Gap
  • How to Protect Yourself When a Cloud Provider Gets Hacked
  • Pentest Pro Tips with Tom #5: The Dangers of Storing Too Much Data in Your Web Apps
  • Cybersecurity Scams and Fraud
  • Pentest Pro Tips with Tom #4: Using Printer Access to Circumvent an Internal Firewall
  • How is Cloud Data Protected?
  • The Difference Between Public and Private Key Encryption
  • Pentest Pro Tips with Tom #:3 Unrestricted File Share Access Can Lead to Compromise
  • Case Study: Web App Pentest Uncovers Software DevOps
  • Cloud and Web App Security
  • Pentest Pro Tips with Tom #2: Leveraging Broadcast Protocols
  • Pentest Pro Tips with Tom #1: Hacking a Default Password
  • Summer Hacking Update 2023
  • How the Dark Web Works 2023
  • 2023 Incident Response Trends and Response Checklist
  • 2023 Attack Trend: Cyberattacks Target Virtualization Hosts & Hubs
  • Tips for Adding Cyber Insurance in Your Incident Response Plan
  • Why You Need Out-of-band Communications During a Cyber Incident
  • 2023 MOVEit Transfer Zero Day Attack Case Study
  • New Trends in Cyber Incident Response
  • Mobile Device Security Checklist
  • Case Study: Mobile Phone Phishing Attacks in a Hybrid Workforce
  • Is Juice Jacking Really a Threat?
  • Phones: Mobile Devices & BYOD Security
  • Why You Should Conduct Annual Penetration Tests
  • How to Assess Your Cybersecurity Risk
  • Black Hat 2023 Ransomware Response Bootcamp Promo Video – Taught by LMG Security
  • Is ChatGPT a Cybersecurity and Business IP Risk?
  • Why Your Organization Needs a Cybersecurity Inventory &Asset Management List
  • Q2 2023 Cybersecurity Regulations Update
  • Tech Briefing: New FTC Safeguards Rules Requires Strategic Cybersecurity Leadership
  • How MFA Bypass Attacks Work
  • What is Identity and Access Management?
  • How Criminals Use API Abuse for Persistent Access
  • Why Your Organization Needs Annual Penetration Testing
  • Ransomware Trends and Statistics
  • Weaponar: How I Met Your Printer
  • Why Web Application Penetration Testing Should Be Part of Your Cybersecurity Program
  • Uncovering Hidden Risks: How Vendors Create Supply Chain Security Risks for Your Organization
  • Ransomware Tactics and Trends
  • Top Cybersecurity Threats of 2023
  • How Hackers Take Control of Your Computer
  • How Hackers Go From Zero to Takeover
  • IHG Data Breach Case Study: How the Holiday Inn got Hacked
  • What are Cybersecurity Tabletop Exercises and Why Do They Deliver a Strong ROI?
  • Beyond Passwords: Multi-Factor Authentication, Biometrics and More
  • How Much Should I Spend On Cybersecurity?
  • Case Study: The 2022 Uber Breach – An MFA Fatigue Attack
  • Planning Your Cybersecurity Budget for 2023
  • Summer Hacking Update 2022
  • Ransomware Trends for 2022
  • 2021 Cybercrime Statistics
  • How to Use Proactive Monitoring and Logging for Early Cybersecurity Threat Detection
  • Video Case Study: Phishing Attack Nets $160K
  • What is Endpoint Detection & Response (EDR)?
  • New Trends in Cyber Incident Response and Forensics
  • Video Case Study: Cybersecurity Monitoring Could Prevent a Ransomware Attack
  • How to Set Up Duo Multi-Factor Authentication (MFA)
  • How to Set Up Google Multi-Factor Authentication (MFA)
  • How to Set Up Microsoft Multi-Factor Authentication (MFA)
  • The ABC’s of Cybersecurity – A Checklist of Building Blocks for a Strong Security Program
  • How Encryption in Transit and End-to-End Encryption Work
  • How to Run an Effective Cybersecurity Program
  • How the Dark Web Works 2022
  • Understanding Encryption at Rest
  • Ransomware Response 1-Day Online Class
  • Cybersecurity Attacks on Technology Suppliers
  • Black Hat USA 2022 Ransomware Response Boot Camp by LMG Security
  • Exposure Extortion: Ransomware’s Equally Evil Cousin
  • How Cryptocurrency Works
  • Bank Service Provider Notification Responsibilities Start 4/1/22 – Get the Details.
  • Preventing Mass Exploit Abuse & Zero Day Vulnerabilities
  • How Encryption Works
  • Understanding & Preventing Cross Cloud Attacks
  • New 36 Hour Cybersecurity Incident Reporting Regulation for Banks & Bank Service Providers
  • The Cybercrime Crackdown & How It Affects You
  • Cybersecurity Alert: Wiper Malware Amid Russia-Ukraine Conflict
  • Cybersecurity Alert: The Log4J & vCenter Vulnerability + Watch the Exploit in Action!
  • Top Cybersecurity Threats Of 2022
  • How Information Stealing Malware Works
  • How Cyber Extortion Works
  • Supply Chain Security Tips
  • How to Pronounce Log4j
  • How Hackers Steal Payment Cards
  • Software Patch Management Tips
  • Cyber Alert: Microsoft Exchange Vulnerabilities
  • What is a Cybersecurity Risk Assessment?
  • AWS Security Logging Tips
  • How to Prevent Email Hacking & What To Do if Your Email is Compromised
  • Email Hacking & Financial Fraud
  • Beyond Passwords: Two Factor Authentication, Biometrics and More
  • 2022 Cybersecurity Budget Planning Advice
  • How Do We Educate Our Board and Leadership on Cybersecurity?
  • Incident Response Monitoring & Logging Tips
  • Know Your Default Log Retention Time for Office 365, AWS, and More
  • Why Every Organization Should Be Cybersecurity Threat Hunting
  • Summer Hacking Update with Highlights from Black Hat USA, DEFCON & More
  • The Cheapest Way to Reduce Your Cybersecurity Risk
  • Case Study: Using Flow Records, Logs & Upload Connections to Understand a Cyberattack
  • Case Study: Hacked Cloud Email & Files
  • How Much Should You Be Spending on Cybersecurity?
  • Microsoft Office 365 Data Loss Prevention Security Cheat Sheet
  • What is Phishing Training?
  • Cyber Insurance Costs Rising Due to Ransomware Attacks
  • Proactive Monitoring and Logging – On-Demand Cybersecurity Webinar
  • The Kaseya Ransomware Attack – Breaking Breaches by LMG Security
  • Hackers are Undeterred as Ransomware is Officially Labeled Terrorism – LMG Security
  • What is Cybersecurity Threat Hunting?
  • Black Hat USA 2021 Ransomware Response Bootcamp – LMG Security
  • New Trends in Cyber Incident Response and Forensics – LMG Security
  • Colonial Pipeline Attack Update: Ransom Recovery, Hackers’ Court & the Regulatory Outlook
  • What is Business Email Compromise? LMG Security Cybersecurity Break
  • How to Optimize Your Cybersecurity Program
  • How Malware Steals Your Data – LMG Security On-Demand Webinar
  • Can Hackers Sell Access to Your Computer? – LMG Security Cybersecurity Break
  • What is Phishing? – LMG Security Cybersecurity Break
  • The Accellion-Related Breaches Uncovered – LMG Security Breaking Breaches
  • Ransomware Response Tips – LMG Security Cybersecurity Break
  • How The Dark Web Works – LMG Security
  • Microsoft Exchange Server Hack – LMG Security Breaking Breaches
  • The SolarWinds Hack – A Recap & Key Takeaways
  • How Encryption & Cryptography Work
  • Top Cybersecurity Threats of 2021
  • How Hackers Steal Payment Cards
  • Inside the November FBI Ransomware Alert – See Real Images of Ryuk Ransomware in Action!
  • Beyond Passwords – Two Factor Authentication, Biometrics and More
  • Breaking Breaches – Twitter’s New Hacked Data Policy
  • Eating the Cybersecurity Elephant: How to Tackle Seemingly Insurmountable Challenges & Conquer Them
  • Breaking Breaches – Uber Data Breach
  • Thwarting Insider Attacks: the Tesla Cyber Extortion Attempt – LMG Security
  • Cybersecurity Budget Planning for 2021
  • Summer 2020 Hacking Trends On-Demand Webinar – LMG Security
  • Takeaways from the Blackbaud Breach – LMG Security’s Breaking Breaches
  • LMG Security – Explaining the Recent High-Profile Twitter Hack
  • Top Takeaways from the Verizon Data Breach Investigations Report
  • Top Takeaways from the Verizon Data Breach Investigations Report
  • Why You Need Cybersecurity Cross Training
  • Cloud Cybersecurity Threats
  • Remote Worker Cybersecurity Webinar by LMG Security
  • The Top Cybersecurity Threats of 2020
  • Kibana – How to Set a Date/Time Range (example #2)
  • Kibana – How to Filter (example #2)
  • Kibana – How to Use Indices
  • Kibana – How to Create a Pie Chart Using the Visualize Tab
  • Kibana – How to Set a Date/Time Range (example #1)
  • Kibana – How to Create a Data Table Using the Visualize Tab
  • Kibana – How to Filter (example #1)
  • Kibana – How to Access Data Using the Discover Tab
  • LMG Security’s Cyberside Chats: Dark Web Takedowns May 2019
  • LMG Security’s Cyberside Chats: Ransomware Negotiation Tips
  • Hacking the Cocktails Vote: ACHIEVE NOTHING Cybersecurity Podcast
  • Anthem’s Record $16M Data Breach Settlement – Achieve NOTHING™ Cybersecurity Podcast
  • Achieve NOTHING™ Cybersecurity Podcast: GDPR and the British Airways Data Breach
  • Sad Camera Cry
  • Achieve NOTHING™ Cybersecurity Podcast: The Equifax Breach: Part Two – Protect Yourself
  • Achieve NOTHING™ Cybersecurity Podcast: The Equifax Data Breach: Part One
  • Achieve NOTHING™ Cybersecurity Podcast: Ransomware and the Law
  • Achieve NOTHING™ Cybersecurity Podcast: Black Hat & Defcon Recap
  • Achieve NOTHING™ Cybersecurity Podcast: Ransomware Response
  • Achieve NOTHING™ Cybersecurity Podcast: Ransomware Executive Plan
  • KeePass Auto-Type with Office 365 Account
  • LastPass Password Manager with Office 365 Account
  • KeePass Adding Password Entry
  • Installing LastPass on Chrome
  • Generating a Password With MacPass
  • Setting Up 2-Factor Authentication With Office 365
  • Setting Up 2-Factor Authentication with Google/Gmail
  • “Jigsaw” Ransomware Encrypts Desktop, Cloud & Network Files
  • Montana Cyber Triathlon 2014 – Winning Team Finds the Coin
  • Blackhole Exploit Kit Phishing Attack
  • Man-in-the-Browser Attack on Bank of America’s Web Site (LMG Security)
  • Bank of America Web Site from a Non-Infected PC (LMG Security)
CONTACT US