<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"><channel><description>LMG Security is a top cybersecurity firm providing penetration testing, advisory services, training, &amp; more. Our experts speak at conferences like Black Hat and RSA, and have been featured in The Wall Street Journal, The New York Times, &amp; many other pubs.</description><link>https://bsky.app/profile/lmgsecurity.bsky.social</link><title>@lmgsecurity.bsky.social - LMG Security</title><item><link>https://bsky.app/profile/lmgsecurity.bsky.social/post/3mbc6nm4t3r2b</link><description>A #penetrationtest doesn’t reduce risk if the findings never get fixed. In #breach investigations, we routinely see the same vulnerabilities attackers exploited sitting in old #pentest reports that were marked “accepted” or forgotten. Watch for more: https://www.youtube.com/watch?v=8Iscx--Spjk </description><pubDate>31 Dec 2025 15:30 +0000</pubDate><guid isPermaLink="false">at://did:plc:f2x7d52vxa3juswdsefsa3bc/app.bsky.feed.post/3mbc6nm4t3r2b</guid></item><item><link>https://bsky.app/profile/lmgsecurity.bsky.social/post/3mb7l3xxt5k2u</link><description>Fake employees and contractors are forcing orgs to rethink #vendorvetting, hiring security, &amp; identity controls.&#xA;&#xA;In today&#39;s #CybersideChats episode, we unpack Amazon’s recent incident in which a North Korean IT worker was detected through behavioral anomalies &amp; what to do now.&#xA;&#xA;youtu.be/WE8p9I3uUuA</description><pubDate>30 Dec 2025 14:35 +0000</pubDate><guid isPermaLink="false">at://did:plc:f2x7d52vxa3juswdsefsa3bc/app.bsky.feed.post/3mb7l3xxt5k2u</guid></item><item><link>https://bsky.app/profile/lmgsecurity.bsky.social/post/3mb57oed2fa22</link><description>Most organizations treat #cloud outages as a rare inconvenience, but #hyperscalers have become #criticalinfrastructure. Watch our video for why cloud monoculture is dangerous and what a realistic diversification and failover strategy should look like. https://www.youtube.com/watch?v=PoK8MWGhzWA </description><pubDate>29 Dec 2025 16:05 +0000</pubDate><guid isPermaLink="false">at://did:plc:f2x7d52vxa3juswdsefsa3bc/app.bsky.feed.post/3mb57oed2fa22</guid></item><item><link>https://bsky.app/profile/lmgsecurity.bsky.social/post/3mb536pumtk2e</link><description>Russian state-sponsored hackers linked to the #GRU have been targeting Western critical infrastructure for years, not with flashy zero-days, but by abusing misconfigured network edge devices to harvest credentials and persist inside victim systems. &#xA;&#xA;https://aws.amazon.com/blogs/security/amazon-threat-intelligence-identifies-russian-cyber-threat-group-targeting-western-critical-infrastructure/ &#xA;&#xA;#Cybersecurity</description><pubDate>29 Dec 2025 14:44 +0000</pubDate><guid isPermaLink="false">at://did:plc:f2x7d52vxa3juswdsefsa3bc/app.bsky.feed.post/3mb536pumtk2e</guid></item><item><link>https://bsky.app/profile/lmgsecurity.bsky.social/post/3maqkbhd7gi2a</link><description>In 2026, audit where trust triggers action, not just where users log in. Our blog shares a practical look at why #identity must become a shared, continuous process — not a one-time check. Read it here: https://www.lmgsecurity.com/ai-broke-trust-why-identity-has-to-step-up-in-2026/ #cybersecurity</description><pubDate>24 Dec 2025 15:10 +0000</pubDate><guid isPermaLink="false">at://did:plc:f2x7d52vxa3juswdsefsa3bc/app.bsky.feed.post/3maqkbhd7gi2a</guid></item><item><link>https://bsky.app/profile/lmgsecurity.bsky.social/post/3manw2zdljs2s</link><description>Many orgs still check identity once at login. Today on #CybersideChats, learn how #AI driven impersonation has made that model unsafe, and why #authentication has to extend into calls, chats, approvals, &amp; support workflows&#xA;&#xA;Video: youtu.be/J0UJSV6wYlI &#xA;&#xA;Podcast: https://www.chatcyberside.com/e/when-ai-steals-trust-deepfakes-phishing-and-the-new-identity-crisis/</description><pubDate>23 Dec 2025 14:03 +0000</pubDate><guid isPermaLink="false">at://did:plc:f2x7d52vxa3juswdsefsa3bc/app.bsky.feed.post/3manw2zdljs2s</guid></item><item><link>https://bsky.app/profile/lmgsecurity.bsky.social/post/3malkc5tudc2c</link><description>The #holidays are in full swing, and the attackers (and #evilAI tools) have been busy. In this 2-minute video, we show what happened when our team asked #WormGPT, a dark-web #AI with no guardrails, to generate a #holiday scam. https://www.youtube.com/watch?v=YCS75iScU-E &#xA;&#xA;#Cybersecurity #Infosec #Phishing</description><pubDate>22 Dec 2025 15:27 +0000</pubDate><guid isPermaLink="false">at://did:plc:f2x7d52vxa3juswdsefsa3bc/app.bsky.feed.post/3malkc5tudc2c</guid></item><item><link>https://bsky.app/profile/lmgsecurity.bsky.social/post/3mae4tjku422g</link><description>Collaboration tools like Teams, Slack, and Zoom have become prime targets for attackers—and Microsoft’s latest roadmap reflects that shift. If your #security strategy hasn’t caught up with how people actually communicate, this #CybersideChats is worth a listen: https://www.chatcyberside.com/e/collaboration-under-siege-microsoft-s-teams-security-overhaul/</description><pubDate>19 Dec 2025 16:37 +0000</pubDate><guid isPermaLink="false">at://did:plc:f2x7d52vxa3juswdsefsa3bc/app.bsky.feed.post/3mae4tjku422g</guid></item><item><link>https://bsky.app/profile/lmgsecurity.bsky.social/post/3mabfjeac3r2r</link><description>Microsoft’s 2026 #security features highlight a shift many organizations are already experiencing: #collaboration platforms and #identity workflows are now prime attack paths.  MOre on our blog: https://www.lmgsecurity.com/5-new-ish-microsoft-security-features-what-they-reveal-about-todays-threats/ </description><pubDate>18 Dec 2025 14:35 +0000</pubDate><guid isPermaLink="false">at://did:plc:f2x7d52vxa3juswdsefsa3bc/app.bsky.feed.post/3mabfjeac3r2r</guid></item><item><link>https://bsky.app/profile/lmgsecurity.bsky.social/post/3ma6zepplsc2r</link><description>A single #cloud outage can disrupt every core system you depend on, which is why #digitalresilience has to extend beyond traditional #businesscontinuity planning. In this quick video, we outline 5 steps every #CISO should prioritize: https://www.youtube.com/watch?v=-fgyWb1dq_g &#xA;#CloudSecurity #RiskManagement</description><pubDate>17 Dec 2025 15:52 +0000</pubDate><guid isPermaLink="false">at://did:plc:f2x7d52vxa3juswdsefsa3bc/app.bsky.feed.post/3ma6zepplsc2r</guid></item><item><link>https://bsky.app/profile/lmgsecurity.bsky.social/post/3ma4boi566c2h</link><description>What do Microsoft’s 2026 #security features tell us about how attackers are breaching #collaboration platforms? On this week’s #CybersideChats, Sherri &amp; Matt break down the updates &amp; why they matter.&#xA;&#xA;Video: https://www.youtube.com/watch?v=60bYlgCI7zw &#xA;&#xA;Podcast: https://www.chatcyberside.com/e/collaboration-under-siege-microsoft-s-teams-security-overhaul/</description><pubDate>16 Dec 2025 13:43 +0000</pubDate><guid isPermaLink="false">at://did:plc:f2x7d52vxa3juswdsefsa3bc/app.bsky.feed.post/3ma4boi566c2h</guid></item><item><link>https://bsky.app/profile/lmgsecurity.bsky.social/post/3m7zw3j43xp2d</link><description>Start 2026 with one upgrade that pays off immediately: tighten #identityverification. Join Sherri &amp; Matt live on 12/17 as they break down how #AI driven impersonation is changing the rules: https://www.lmgsecurity.com/event/cyberside-chats-live-ai-broke-trust-identity-has-to-step-up-in-2026/ </description><pubDate>15 Dec 2025 15:10 +0000</pubDate><guid isPermaLink="false">at://did:plc:f2x7d52vxa3juswdsefsa3bc/app.bsky.feed.post/3m7zw3j43xp2d</guid></item><item><link>https://bsky.app/profile/lmgsecurity.bsky.social/post/3m7psat6xs72t</link><description>Think #browserextensions are harmless? Think again. A multi-year campaign turned popular, trusted browser add-ons into #spyware featuring #remotecodeexecution, session hijacking, and more. Read the blog here: https://www.lmgsecurity.com/4-3-million-reasons-to-rethink-browser-extension-security/</description><pubDate>11 Dec 2025 14:35 +0000</pubDate><guid isPermaLink="false">at://did:plc:f2x7d52vxa3juswdsefsa3bc/app.bsky.feed.post/3m7psat6xs72t</guid></item><item><link>https://bsky.app/profile/lmgsecurity.bsky.social/post/3m7no3dxh6q2g</link><description>#AI can spoof your people, processes, and communications. In the next #CybersideChats: Live, Sherri &amp; Matt break down the #identity upgrades every org needs for 2026. Register to join us on 12/17: https://www.lmgsecurity.com/event/cyberside-chats-live-ai-broke-trust-identity-has-to-step-up-in-2026/</description><pubDate>10 Dec 2025 18:15 +0000</pubDate><guid isPermaLink="false">at://did:plc:f2x7d52vxa3juswdsefsa3bc/app.bsky.feed.post/3m7no3dxh6q2g</guid></item><item><link>https://bsky.app/profile/lmgsecurity.bsky.social/post/3m7kwqqlkxk2g</link><description>More than 4.3 million users were affected before anyone realized ShadyPanda’s extensions had turned into surveillance tools. Listen to today&#39;s #CybersideChats for more: https://www.chatcyberside.com/e/shady-panda-s-browser-backdoor-%E2%80%94-43m-chrome-edge-users-compromised/ &#xA;&#xA;Or watch the video: youtu.be/x9AaE94KanM   &#xA;&#xA;#Security #SessionHijacking #Cybersecurity</description><pubDate>09 Dec 2025 16:12 +0000</pubDate><guid isPermaLink="false">at://did:plc:f2x7d52vxa3juswdsefsa3bc/app.bsky.feed.post/3m7kwqqlkxk2g</guid></item><item><link>https://bsky.app/profile/lmgsecurity.bsky.social/post/3m7id5qvsp22t</link><description>Spot the #scam! In Sherri Davidoff’s recent NBC Montana and Clearwater Credit Union interview, she &amp; Kyle Rholl explain how #AI driven #voicecloning is being used to impersonate friends and family—and why reacting under pressure is what scammers count on. Full story: https://nbcmontana.com/news/spot-the-scam/spot-the-scam-with-clearwater-credit-union-cyber-security-scams</description><pubDate>08 Dec 2025 15:16 +0000</pubDate><guid isPermaLink="false">at://did:plc:f2x7d52vxa3juswdsefsa3bc/app.bsky.feed.post/3m7id5qvsp22t</guid></item><item><link>https://bsky.app/profile/lmgsecurity.bsky.social/post/3m7asxexhos2u</link><description>When #insider incidents can hit even the most #security focused companies, it forces every organization to reconsider how much “trust” is built into their workflows. More on our blog: https://www.lmgsecurity.com/betrayed-from-within-the-modern-insider-attack/ or podcast: https://www.chatcyberside.com/e/when-security-fails-crowdstrike-insider-leaks-and-the-threat-within/  #insiderthreat #cybersecurity</description><pubDate>05 Dec 2025 15:37 +0000</pubDate><guid isPermaLink="false">at://did:plc:f2x7d52vxa3juswdsefsa3bc/app.bsky.feed.post/3m7asxexhos2u</guid></item><item><link>https://bsky.app/profile/lmgsecurity.bsky.social/post/3m76ahk3aqe2f</link><description>Insider threats are rising fast. LMG analyzes the latest cases — CrowdStrike, DigitalMint, Tesla &amp; more — and what organizations can do now to reduce #risk. &#xA;&#xA;Read: https://www.lmgsecurity.com/betrayed-from-within-the-modern-insider-attack/ &#xA;&#xA;#InsiderThreat #DataProtection #CompanyCulture</description><pubDate>04 Dec 2025 15:01 +0000</pubDate><guid isPermaLink="false">at://did:plc:f2x7d52vxa3juswdsefsa3bc/app.bsky.feed.post/3m76ahk3aqe2f</guid></item><item><link>https://bsky.app/profile/lmgsecurity.bsky.social/post/3m73saclmpk2j</link><description>Recovery times are improving, and the rise of truly immutable #backups is a major reason why. Watch as we break down what “immutable” actually means, why it matters for #ransomware resilience, and how proactive planning accelerates recovery. https://www.youtube.com/watch?v=XgdPWZ5OKB0 #DataRecovery #BCDR</description><pubDate>03 Dec 2025 15:41 +0000</pubDate><guid isPermaLink="false">at://did:plc:f2x7d52vxa3juswdsefsa3bc/app.bsky.feed.post/3m73saclmpk2j</guid></item><item><link>https://bsky.app/profile/lmgsecurity.bsky.social/post/3m6zai77vkk2q</link><description>Insider threats aren’t theoretical anymore—they’re happening inside orgs just like yours. &#xA;&#xA;This week on #CybersideChats, we break down insider cases from #CrowdStrike, #DigitalMint, &amp; others, and share strategies to reduce your org&#39;s risk. youtu.be/s7QW_BkkAvM &#xA;&#xA;#InsiderThreats #Cybersecurity</description><pubDate>02 Dec 2025 15:18 +0000</pubDate><guid isPermaLink="false">at://did:plc:f2x7d52vxa3juswdsefsa3bc/app.bsky.feed.post/3m6zai77vkk2q</guid></item><item><link>https://bsky.app/profile/lmgsecurity.bsky.social/post/3m6pizzmylk2n</link><description>75% percent of #manufacturers are carrying critical OT #vulnerabilities, often buried inside proprietary equipment and aging software that keeps production moving but limits security options. Sherri Davidoff and Matt Durrin share more in this quick video: https://www.youtube.com/watch?v=cETaSkOb5kw&#xA;</description><pubDate>28 Nov 2025 18:25 +0000</pubDate><guid isPermaLink="false">at://did:plc:f2x7d52vxa3juswdsefsa3bc/app.bsky.feed.post/3m6pizzmylk2n</guid></item><item><link>https://bsky.app/profile/lmgsecurity.bsky.social/post/3m6myc7eyow25</link><description>This Thanksgiving, we’re feeling grateful for the clients, partners, and colleagues who make our work meaningful all year long. &#xA;&#xA;Thank you for the conversations, the collaboration, and the chance to tackle big challenges together. Wishing everyone a happy and restful holiday. </description><pubDate>27 Nov 2025 18:20 +0000</pubDate><guid isPermaLink="false">at://did:plc:f2x7d52vxa3juswdsefsa3bc/app.bsky.feed.post/3m6myc7eyow25</guid></item><item><link>https://bsky.app/profile/lmgsecurity.bsky.social/post/3m6kac2kumk2p</link><description>Chinese-made #IoT devices are turning up with hidden radios, undocumented modems, and opaque update channels—and organizations need faster ways to assess the risk. More on our blog: https://www.lmgsecurity.com/made-in-china-hacked-everywhere-what-organizations-need-to-know-now/  #SupplyChainSecurity</description><pubDate>26 Nov 2025 16:05 +0000</pubDate><guid isPermaLink="false">at://did:plc:f2x7d52vxa3juswdsefsa3bc/app.bsky.feed.post/3m6kac2kumk2p</guid></item><item><link>https://bsky.app/profile/lmgsecurity.bsky.social/post/3m6homlzwys2k</link><description>A single “smart” device can quietly tunnel out of your network. Today on #CybersideChats: real-world scenarios where hidden radios, #cloud paths, and offshore update servers slipped in through routine #hardware purchases.&#xA;&#xA;Listen: https://www.chatcyberside.com/e/chinas-hidden-backdoors-buses-cranes-and-critical-infrastructure/ &#xA;&#xA;Watch: youtu.be/WYq6YTqanA4</description><pubDate>25 Nov 2025 15:43 +0000</pubDate><guid isPermaLink="false">at://did:plc:f2x7d52vxa3juswdsefsa3bc/app.bsky.feed.post/3m6homlzwys2k</guid></item><item><link>https://bsky.app/profile/lmgsecurity.bsky.social/post/3m6f5oeejek2y</link><description>#MFA alone isn’t enough if attackers can exploit fatigue prompts or weak fallback options. In this 1-minute video, we break down the most common gaps. https://www.youtube.com/watch?v=x290l-EAo8Q &#xA;&#xA;#Cybersecurity #MultifactorAuthentication #2FA #Authentication #AccessControl #Credentials #SecurityBestPractices</description><pubDate>24 Nov 2025 15:35 +0000</pubDate><guid isPermaLink="false">at://did:plc:f2x7d52vxa3juswdsefsa3bc/app.bsky.feed.post/3m6f5oeejek2y</guid></item><item><link>https://bsky.app/profile/lmgsecurity.bsky.social/post/3m65snbgzas2c</link><description>#Holiday season scams now hit businesses as hard as consumers. This checklist highlights practical steps #security teams can take now—from enforcing strong #MFA to tuning #botdetection rules &amp; more: https://www.lmgsecurity.com/resources/holiday-fraud-defense-checklist/ &#xA;&#xA;#Cybersecurity #FraudPrevention #DNSFiltering #BYOD #Phishing</description><pubDate>21 Nov 2025 17:29 +0000</pubDate><guid isPermaLink="false">at://did:plc:f2x7d52vxa3juswdsefsa3bc/app.bsky.feed.post/3m65snbgzas2c</guid></item><item><link>https://bsky.app/profile/lmgsecurity.bsky.social/post/3m5ysbncrqj2d</link><description>Attackers are now using #maliciousAI to launch #holidayscams at scale. We just published a breakdown of this year’s AI-driven holiday #fraud surge—plus an actionable checklist: https://www.lmgsecurity.com/holiday-hackers-how-ai-is-supercharging-seasonal-fraud-and-what-your-organization-must-do-now/ </description><pubDate>19 Nov 2025 17:39 +0000</pubDate><guid isPermaLink="false">at://did:plc:f2x7d52vxa3juswdsefsa3bc/app.bsky.feed.post/3m5ysbncrqj2d</guid></item><item><link>https://bsky.app/profile/lmgsecurity.bsky.social/post/3m5vtk62nv22b</link><description>#AI driven #fraud is hitting holiday shoppers at machine speed. Today on #CybersideChats, Sherri &amp; Matt discuss how #phishing kits, prebuilt configs, and bot-driven takeovers enable #CredentialAbuse.  &#xA;&#xA;Podcast: https://www.chatcyberside.com/e/holiday-hack-alert-ai-bots-phishing-and-the-gift-card-scam-surge/ &#xA;&#xA;Video: youtu.be/TpMD5v5JUNc&#xA;&#xA;#Cybersecurity</description><pubDate>18 Nov 2025 13:23 +0000</pubDate><guid isPermaLink="false">at://did:plc:f2x7d52vxa3juswdsefsa3bc/app.bsky.feed.post/3m5vtk62nv22b</guid></item><item><link>https://bsky.app/profile/lmgsecurity.bsky.social/post/3m5tljpoqgk2w</link><description>When #security assessments leak, the fallout can eclipse the incident. In our latest #CybersideChats on the #Louvre heist, we dig into how exposed #audit findings fueled scrutiny. Listen to hear how a seven-minute #robbery turned into a reputational firestorm: https://www.chatcyberside.com/e/louvre-heist-exposed-how-weak-tech-old-passwords-invited-the-theft/</description><pubDate>17 Nov 2025 15:55 +0000</pubDate><guid isPermaLink="false">at://did:plc:f2x7d52vxa3juswdsefsa3bc/app.bsky.feed.post/3m5tljpoqgk2w</guid></item><item><link>https://bsky.app/profile/lmgsecurity.bsky.social/post/3m5lubbkjif2p</link><description>Your #network may be locked down—but what about the circuitry inside your devices? Join us on November 19th for Cyberside Chats: Live! on how #hardware choices and opaque sourcing can introduce #risk + steps to spot red flags. https://www.lmgsecurity.com/event/cyberside-chats-live-november-2025/</description><pubDate>14 Nov 2025 14:10 +0000</pubDate><guid isPermaLink="false">at://did:plc:f2x7d52vxa3juswdsefsa3bc/app.bsky.feed.post/3m5lubbkjif2p</guid></item></channel></rss>