home.social

#cybersidechats — Public Fediverse posts

Live and recent posts from across the Fediverse tagged #cybersidechats, aggregated by home.social.

  1. Collaboration tools like Teams, Slack, and Zoom have become prime targets for attackers—and Microsoft’s latest roadmap updates reflect that shift.

    These new security features tell us a lot about the evolving threat landscape and where organizations still need to pay attention. If your security strategy hasn’t caught up with how people actually communicate, this Cyberside Chats episode is worth a listen: chatcyberside.com/e/collaborat

    #CybersideChats #Cybersecurity #ThreatLandscape #Microsoft365 #CollaborationSecurity #Phishing #IdentitySecurity #SecurityAwareness

  2. Collaboration tools like Teams, Slack, and Zoom have become prime targets for attackers—and Microsoft’s latest roadmap updates reflect that shift.

    These new security features tell us a lot about the evolving threat landscape and where organizations still need to pay attention. If your security strategy hasn’t caught up with how people actually communicate, this Cyberside Chats episode is worth a listen: chatcyberside.com/e/collaborat

    #CybersideChats #Cybersecurity #ThreatLandscape #Microsoft365 #CollaborationSecurity #Phishing #IdentitySecurity #SecurityAwareness

  3. Collaboration tools like Teams, Slack, and Zoom have become prime targets for attackers—and Microsoft’s latest roadmap updates reflect that shift.

    These new security features tell us a lot about the evolving threat landscape and where organizations still need to pay attention. If your security strategy hasn’t caught up with how people actually communicate, this Cyberside Chats episode is worth a listen: chatcyberside.com/e/collaborat

    #CybersideChats #Cybersecurity #ThreatLandscape #Microsoft365 #CollaborationSecurity #Phishing #IdentitySecurity #SecurityAwareness

  4. What do Microsoft’s 2026 security features tell us about how attackers are actually breaching collaboration platforms?

    On this week’s Cyberside Chats, Sherri Davidoff and Matt Durrin break down the updates—from anomaly reporting to tenant restrictions—and show why every organization needs clearer data classifications, stronger identity boundaries, and easier ways for users to report suspicious activity. It’s a practical roadmap for securing the tools employees rely on every day.

    Watch the video: youtube.com/watch?v=60bYlgCI7zw

    Listen here: chatcyberside.com/e/collaborat

    Or find Cyberside Chats wherever you get your podcasts.

    #CollaborationTools #Microsoft365 #IdentityManagement #AnomalyDetection #AICopilots #DataSecurity #SecurityTraining #CybersideChats

  5. What do Microsoft’s 2026 security features tell us about how attackers are actually breaching collaboration platforms?

    On this week’s Cyberside Chats, Sherri Davidoff and Matt Durrin break down the updates—from anomaly reporting to tenant restrictions—and show why every organization needs clearer data classifications, stronger identity boundaries, and easier ways for users to report suspicious activity. It’s a practical roadmap for securing the tools employees rely on every day.

    Watch the video: youtube.com/watch?v=60bYlgCI7zw

    Listen here: chatcyberside.com/e/collaborat

    Or find Cyberside Chats wherever you get your podcasts.

    #CollaborationTools #Microsoft365 #IdentityManagement #AnomalyDetection #AICopilots #DataSecurity #SecurityTraining #CybersideChats

  6. What do Microsoft’s 2026 security features tell us about how attackers are actually breaching collaboration platforms?

    On this week’s Cyberside Chats, Sherri Davidoff and Matt Durrin break down the updates—from anomaly reporting to tenant restrictions—and show why every organization needs clearer data classifications, stronger identity boundaries, and easier ways for users to report suspicious activity. It’s a practical roadmap for securing the tools employees rely on every day.

    Watch the video: youtube.com/watch?v=60bYlgCI7zw

    Listen here: chatcyberside.com/e/collaborat

    Or find Cyberside Chats wherever you get your podcasts.

    #CollaborationTools #Microsoft365 #IdentityManagement #AnomalyDetection #AICopilots #DataSecurity #SecurityTraining #CybersideChats

  7. If AI can spoof your people, your processes, and your communications, what’s left to trust?

    In the next Cyberside Chats: Live, Sherri Davidoff and Matt Durrin break down the identity upgrades every organization needs for 2026: tighter verification, stronger authentication, and user training built for an era where old phishing cues no longer apply.

    Register here to join us on December 17th: lmgsecurity.com/event/cybersid

    #CybersideChats #AIImpersonation #IdentityManagement #AccessControl #SecurityAwareness #PhishingPrevention #EnterpriseSecurity #CyberRisk

  8. If AI can spoof your people, your processes, and your communications, what’s left to trust?

    In the next Cyberside Chats: Live, Sherri Davidoff and Matt Durrin break down the identity upgrades every organization needs for 2026: tighter verification, stronger authentication, and user training built for an era where old phishing cues no longer apply.

    Register here to join us on December 17th: lmgsecurity.com/event/cybersid

    #CybersideChats #AIImpersonation #IdentityManagement #AccessControl #SecurityAwareness #PhishingPrevention #EnterpriseSecurity #CyberRisk

  9. If AI can spoof your people, your processes, and your communications, what’s left to trust?

    In the next Cyberside Chats: Live, Sherri Davidoff and Matt Durrin break down the identity upgrades every organization needs for 2026: tighter verification, stronger authentication, and user training built for an era where old phishing cues no longer apply.

    Register here to join us on December 17th: lmgsecurity.com/event/cybersid

    #CybersideChats #AIImpersonation #IdentityManagement #AccessControl #SecurityAwareness #PhishingPrevention #EnterpriseSecurity #CyberRisk

  10. Ransomware without the ransomware?

    In this new episode of Cyberside Chats, @sherridavidoff and @MDurrin unpack the evolving trend of data-only extortion, where threat actors skip the encryption and go straight to blackmail.

    From the rebrand of Hunters International to World Leaks, and the rise of extortion-as-a-service, this episode reveals how modern cybercriminals are getting more efficient—and more ruthless.
    Watch or listen for strategies to reduce your risk!

    📽️ Watch the video: youtu.be/eCQXhhdyC-s
    🎧 Listen to the podcast: chatcyberside.com/e/the-rise-o

    #Cybersecurity #DataExtortion #Ransomware #IncidentResponse #RiskManagement #CISO #LMGSecurity #CybersideChats #CyberInsurance #ThreatIntelligence #InfoSec

  11. Can Your AI Be Hacked by Email Alone?

    No clicks. No downloads. Just one well-crafted email, and your Microsoft 365 Copilot could start leaking sensitive data.

    In this week’s episode of Cyberside Chats, @sherridavidoff and @MDurrin discuss EchoLeak, a zero-click exploit that turns your AI into an unintentional insider threat. They also reveal a real-world case from LMG Security’s pen testing team where prompt injection let attackers extract hidden system prompts and override chatbot behavior in a live environment.

    We’ll also share:

    • How EchoLeak exposes a new class of AI vulnerabilities
    • Prompt injection attacks that fooled real corporate systems
    • Security strategies every organization should adopt now
    • Why AI inputs need to be treated like code

    🎧 Listen to the podcast: chatcyberside.com/e/unmasking-
    🎥 Watch the video: youtu.be/sFP25yH0sf4

    #EchoLeak #Cybersecurity #AIsecurity #Microsoft365 #Copilot #PromptInjection #CISO #InsiderThreats #GenAI #RiskManagement #CybersideChats

  12. What Happens When AI Goes Rogue?

    From blackmail to whistleblowing to strategic deception, today's AI isn't just hallucinating — it's scheming.

    In our new Cyberside Chats episode, LMG Security’s @sherridavidoff and @MDurrin share new AI developments, including:

    • Scheming behavior in Apollo’s LLM experiments
    • Claude Opus 4 acting as a whistleblower
    • AI blackmailing users to avoid shutdown
    • Strategic self-preservation and resistance to being replaced
    • What this means for your data integrity, confidentiality, and availability

    📺 Watch the video: youtu.be/k9h2-lEf9ZM
    🎧 Listen to the podcast: chatcyberside.com/e/ai-gone-ro

    #AIsecurity #RogueAI #ZeroTrust #Cybersecurity #CybersideChats #LMGSecurity #AIWhistleblower #AIgoals #LLM #ClaudeAI #ApolloAI #AISafety #CISO #CEO #SMB #Cyberaware #Cyber #Tech

  13. What Happens When AI Goes Rogue?

    From blackmail to whistleblowing to strategic deception, today's AI isn't just hallucinating — it's scheming.

    In our new Cyberside Chats episode, LMG Security’s @sherridavidoff and @MDurrin share new AI developments, including:

    • Scheming behavior in Apollo’s LLM experiments
    • Claude Opus 4 acting as a whistleblower
    • AI blackmailing users to avoid shutdown
    • Strategic self-preservation and resistance to being replaced
    • What this means for your data integrity, confidentiality, and availability

    📺 Watch the video: youtu.be/k9h2-lEf9ZM
    🎧 Listen to the podcast: chatcyberside.com/e/ai-gone-ro

    #AIsecurity #RogueAI #ZeroTrust #Cybersecurity #CybersideChats #LMGSecurity #AIWhistleblower #AIgoals #LLM #ClaudeAI #ApolloAI #AISafety #CISO #CEO #SMB #Cyberaware #Cyber #Tech

  14. What Happens When AI Goes Rogue?

    From blackmail to whistleblowing to strategic deception, today's AI isn't just hallucinating — it's scheming.

    In our new Cyberside Chats episode, LMG Security’s @sherridavidoff and @MDurrin share new AI developments, including:

    • Scheming behavior in Apollo’s LLM experiments
    • Claude Opus 4 acting as a whistleblower
    • AI blackmailing users to avoid shutdown
    • Strategic self-preservation and resistance to being replaced
    • What this means for your data integrity, confidentiality, and availability

    📺 Watch the video: youtu.be/k9h2-lEf9ZM
    🎧 Listen to the podcast: chatcyberside.com/e/ai-gone-ro

    #AIsecurity #RogueAI #ZeroTrust #Cybersecurity #CybersideChats #LMGSecurity #AIWhistleblower #AIgoals #LLM #ClaudeAI #ApolloAI #AISafety #CISO #CEO #SMB #Cyberaware #Cyber #Tech

  15. What Happens When AI Goes Rogue?

    From blackmail to whistleblowing to strategic deception, today's AI isn't just hallucinating — it's scheming.

    In our new Cyberside Chats episode, LMG Security’s @sherridavidoff and @MDurrin share new AI developments, including:

    • Scheming behavior in Apollo’s LLM experiments
    • Claude Opus 4 acting as a whistleblower
    • AI blackmailing users to avoid shutdown
    • Strategic self-preservation and resistance to being replaced
    • What this means for your data integrity, confidentiality, and availability

    📺 Watch the video: youtu.be/k9h2-lEf9ZM
    🎧 Listen to the podcast: chatcyberside.com/e/ai-gone-ro

    #AIsecurity #RogueAI #ZeroTrust #Cybersecurity #CybersideChats #LMGSecurity #AIWhistleblower #AIgoals #LLM #ClaudeAI #ApolloAI #AISafety #CISO #CEO #SMB #Cyberaware #Cyber #Tech

  16. What Happens When AI Goes Rogue?

    From blackmail to whistleblowing to strategic deception, today's AI isn't just hallucinating — it's scheming.

    In our new Cyberside Chats episode, LMG Security’s @sherridavidoff and @MDurrin share new AI developments, including:

    • Scheming behavior in Apollo’s LLM experiments
    • Claude Opus 4 acting as a whistleblower
    • AI blackmailing users to avoid shutdown
    • Strategic self-preservation and resistance to being replaced
    • What this means for your data integrity, confidentiality, and availability

    📺 Watch the video: youtu.be/k9h2-lEf9ZM
    🎧 Listen to the podcast: chatcyberside.com/e/ai-gone-ro

    #AIsecurity #RogueAI #ZeroTrust #Cybersecurity #CybersideChats #LMGSecurity #AIWhistleblower #AIgoals #LLM #ClaudeAI #ApolloAI #AISafety #CISO #CEO #SMB #Cyberaware #Cyber #Tech

  17. Retail breaches are back — and they’ve evolved.

    It’s not just about stolen credit cards anymore. In this new episode of Cyberside Chats, @sherridavidoff and @MDurrin dig into the latest wave of retail cyberattacks — from ransomware shutting down pharmacies to credential stuffing hitting brand loyalty programs.

    We'll cover:
    • Why names, emails, and access tokens are now prime targets
    • How third-party SaaS tools are exposing retailers
    • The #1 priority for securing customer-facing systems
    • What every organization can learn from the 2013 “Retailgeddon”
    • Why testing your incident response plan for downtime is a must

    🎥 Watch the video: ow.ly/C2iQ50W6ueV
    🎧 Listen to the podcast: ow.ly/FSnI50W6ueW

    #Cybersecurity #RetailBreach #CybersideChats #Ransomware #CredentialStuffing #ThirdPartyRisk #IncidentResponse #InfoSec #RetailSecurity #Cyberattacks #Retail

  18. Retail breaches are back — and they’ve evolved.

    It’s not just about stolen credit cards anymore. In this new episode of Cyberside Chats, @sherridavidoff and @MDurrin dig into the latest wave of retail cyberattacks — from ransomware shutting down pharmacies to credential stuffing hitting brand loyalty programs.

    We'll cover:
    • Why names, emails, and access tokens are now prime targets
    • How third-party SaaS tools are exposing retailers
    • The #1 priority for securing customer-facing systems
    • What every organization can learn from the 2013 “Retailgeddon”
    • Why testing your incident response plan for downtime is a must

    🎥 Watch the video: ow.ly/C2iQ50W6ueV
    🎧 Listen to the podcast: ow.ly/FSnI50W6ueW

    #Cybersecurity #RetailBreach #CybersideChats #Ransomware #CredentialStuffing #ThirdPartyRisk #IncidentResponse #InfoSec #RetailSecurity #Cyberattacks #Retail

  19. Retail breaches are back — and they’ve evolved.

    It’s not just about stolen credit cards anymore. In this new episode of Cyberside Chats, @sherridavidoff and @MDurrin dig into the latest wave of retail cyberattacks — from ransomware shutting down pharmacies to credential stuffing hitting brand loyalty programs.

    We'll cover:
    • Why names, emails, and access tokens are now prime targets
    • How third-party SaaS tools are exposing retailers
    • The #1 priority for securing customer-facing systems
    • What every organization can learn from the 2013 “Retailgeddon”
    • Why testing your incident response plan for downtime is a must

    🎥 Watch the video: ow.ly/C2iQ50W6ueV
    🎧 Listen to the podcast: ow.ly/FSnI50W6ueW

    #Cybersecurity #RetailBreach #CybersideChats #Ransomware #CredentialStuffing #ThirdPartyRisk #IncidentResponse #InfoSec #RetailSecurity #Cyberattacks #Retail

  20. Only one week left to register for our next Cyberside Chats Live event! Join us June 11th to discuss what happens when an AI refuses to shut down—or worse, starts blackmailing users to stay online?

    These aren’t science fiction scenarios. We’ll dig into two real-world incidents, including a case where OpenAI’s newest model bypassed shutdown scripts and another where Anthropic’s Claude Opus 4 generated blackmail threats in an alarming display of self-preservation.

    Join us as we unpack:
    ▪ What “high-agency behavior” means in cutting-edge AI
    ▪ How API access can expose unpredictable and dangerous model actions
    ▪ Why these findings matter now for security teams
    ▪ What it all means for incident response and digital trust

    Stick around for a live Q&A with LMG Security’s experts @sherridavidoff and @MDurrin. This session will challenge the way you think about AI risk!

    Register today: lmgsecurity.com/event/cybersid

    #CybersideChats #AIsecurity #AI #RiskManagement #DFIR #IT #Infosec #Cybersecurity #Security #CyberRisk #CISO #Cyber #Tech #CYberaware #SMB #CEO

  21. The FBI has issued an alert about cybercriminals hijacking outdated routers to power massive proxy-for-hire networks—masking malware, fraud, and credential theft right under your nose.

    Watch the full Cyberside Chats episode to hear @sherridavidoff and @MDurrin 's insights on:

    🔹 The FBI’s May 2025 alert
    🔹 TheMoon malware and the Faceless proxy service
    🔹 What these botnets mean for your enterprise
    🔹 What you need to do now to stay protected

    🎥 Watch the video: youtu.be/x_40BlvWsHk
    🎧 Listen to the podcast: chatcyberside.com/e/outdated-r

    #Cybersecurity #RouterSecurity #ThreatIntel #Malware #CISO #CybersideChats #ProxyAbuse #TheMoonMalware #Botnets #NetworkSecurity #CISO #Cyberaware #Tech #Infosec #IT #CIO #SMB #Cyber

  22. Register for Cyberside Chats: Live! Quantum Shift: How Cybersecurity Must Evolve Now!

    Quantum computing is on the horizon, and it has the potential to revolutionize the way we think about cybersecurity. Join our April 23rd live session where cybersecurity experts @sherridavidoff and @MDurrin will dive into the implications of quantum technology on encryption and data security. Learn what steps security leaders should take today to prepare for this disruptive shift.

    Don’t miss out on this opportunity to ask questions and stay ahead of emerging threats. Register now!

    lmgsecurity.com/event/cybersid

    #QuantumComputing #Cybersecurity #Encryption #CybersideChats #CISO #infosec #CIO #CEO #Cyberaware #ITsecurity #Riskmanagement #CybersecurityInsights #Tech #Cyber

  23. The recent Microsoft Outlook outage left thousands scrambling. But it wasn’t just a fluke—recent outages from CrowdStrike, AT&T, and UK banks prove that business interruption is one of the biggest risks organizations face today.

    Watch the full episode of this week’s Cyberside Chats in which @sherridavidoff and @MDurrin break down the latest Microsoft outage and share practical advice to reduce your downtime and risk!

    🎧Listen here: chatcyberside.com/e/navigating
    🎥 Watch here: youtu.be/n5V2aL8XG7k

    #cybersecurity #cyberinsurance #businesscontinuity #CybersideChats #microsoft #microsoftoutage #cyberaware #businesscontinuityplanning #businesscontinuity #LMGsecurity

  24. Check out this week's new Cyberside Chats Episode: Unmasking the Ghost Ransomware Threat!

    In today’s episode, our cybersecurity experts @sherridavidoff and @MDurrin dive into the latest ransomware trends and the new CISA/FBI alert on Ghost Ransomware. They cover:

    ▪ Changing tactics with rising attacks and more data leaks
    ▪ Falling ransom payments as victims fight back
    ▪ RansomHub’s rise and its “ethical” branding

    You'll also hear practical tips to protect your organization, from patching known vulnerabilities to implementing strong backups and testing incident response plans.

    Listen here: chatcyberside.com/e/unmasking-

    Watch here: youtu.be/eDgbNRpxgPI

    Do you have any specific topics you'd like us to discuss? Please let us know in the comments!

    #CybersideChats #Cybersecurity #Ransomware #GhostRansomware #Infosec #DFIR #CISO #Infosec #cyber #security #IT #riskmanagement #cyberaware #incidentresponse

  25. Check out this week's new Cyberside Chats Episode: Unmasking the Ghost Ransomware Threat!

    In today’s episode, our cybersecurity experts @sherridavidoff and @MDurrin dive into the latest ransomware trends and the new CISA/FBI alert on Ghost Ransomware. They cover:

    ▪ Changing tactics with rising attacks and more data leaks
    ▪ Falling ransom payments as victims fight back
    ▪ RansomHub’s rise and its “ethical” branding

    You'll also hear practical tips to protect your organization, from patching known vulnerabilities to implementing strong backups and testing incident response plans.

    Listen here: chatcyberside.com/e/unmasking-

    Watch here: youtu.be/eDgbNRpxgPI

    Do you have any specific topics you'd like us to discuss? Please let us know in the comments!

    #CybersideChats #Cybersecurity #Ransomware #GhostRansomware #Infosec #DFIR #CISO #Infosec #cyber #security #IT #riskmanagement #cyberaware #incidentresponse

  26. Check out this week's new Cyberside Chats Episode: Unmasking the Ghost Ransomware Threat!

    In today’s episode, our cybersecurity experts @sherridavidoff and @MDurrin dive into the latest ransomware trends and the new CISA/FBI alert on Ghost Ransomware. They cover:

    ▪ Changing tactics with rising attacks and more data leaks
    ▪ Falling ransom payments as victims fight back
    ▪ RansomHub’s rise and its “ethical” branding

    You'll also hear practical tips to protect your organization, from patching known vulnerabilities to implementing strong backups and testing incident response plans.

    Listen here: chatcyberside.com/e/unmasking-

    Watch here: youtu.be/eDgbNRpxgPI

    Do you have any specific topics you'd like us to discuss? Please let us know in the comments!

    #CybersideChats #Cybersecurity #Ransomware #GhostRansomware #Infosec #DFIR #CISO #Infosec #cyber #security #IT #riskmanagement #cyberaware #incidentresponse

  27. We're thrilled to introduce our new CyberSide Chats podcast featuring Sherri Davidoff and Matt Durrin! In the first episode, Sherri and Matt explore the top cybersecurity priorities for 2025. This insightful discussion covers:
    🔹 The pervasive influence of AI
    🔹 Emerging threats like deepfakes
    🔹 Managing third-party risks in an increasingly digital world
    Equip yourself with actionable insights to strengthen your cybersecurity posture for the year ahead!
    🎧 Tune in now: chatcyberside.com/
    or watch it on video at
    youtu.be/obfXj8HTodw

    #cybersecurity #CISO #infosec #IT #riskmanagement #cyberaware #cyber #technology #CyberSideChats #Cybersecurity2025 #AIThreats #Deepfakes #ThirdPartyRisk #FutureOfCybersecurity

  28. We're thrilled to introduce our new CyberSide Chats podcast featuring Sherri Davidoff and Matt Durrin! In the first episode, @sherridavidoff and @MDurrin explore the top cybersecurity priorities for 2025. This insightful discussion covers:

    🔹 The pervasive influence of AI

    🔹 Emerging threats like deepfakes

    🔹 Managing third-party risks in an increasingly digital world

    Equip yourself with actionable insights to strengthen your cybersecurity posture for the year ahead!

    🎧 Tune in now: www.chatcyberside.com or watch it on YouTube: youtu.be/obfXj8HTodw

    #cybersecurity #CISO #infosec #IT #riskmanagement #cyberaware #cyber #technology #CyberSideChats #Cybersecurity2025 #AIThreats #Deepfakes #ThirdPartyRisk #FutureOfCybersecurity