#lmgsecurity — Public Fediverse posts
Live and recent posts from across the Fediverse tagged #lmgsecurity, aggregated by home.social.
-
Ransomware without the ransomware?
In this new episode of Cyberside Chats, @sherridavidoff and @MDurrin unpack the evolving trend of data-only extortion, where threat actors skip the encryption and go straight to blackmail.
From the rebrand of Hunters International to World Leaks, and the rise of extortion-as-a-service, this episode reveals how modern cybercriminals are getting more efficient—and more ruthless.
Watch or listen for strategies to reduce your risk!📽️ Watch the video: https://youtu.be/eCQXhhdyC-s
🎧 Listen to the podcast: https://www.chatcyberside.com/e/the-rise-of-ransomware-less-extortion-a-new-cyber-threat/#Cybersecurity #DataExtortion #Ransomware #IncidentResponse #RiskManagement #CISO #LMGSecurity #CybersideChats #CyberInsurance #ThreatIntelligence #InfoSec
-
New mass scanning activity may be the first step in another MOVEit attack.
Hackers are actively scanning the internet for exposed MOVEit systems—hundreds of unique IPs every day—suggesting the early stages of coordinated exploitation.
Threat intel firm GreyNoise warns this is the same pattern seen weeks before past mass attacks. Known MOVEit vulnerabilities, such as CVE-2023-34362 and CVE-2023-36934, are already being tested in the wild.
If your MOVEit Transfer instance is online and unmonitored, you may already be on an attacker’s target list.
Now’s the time to:
• Patch all known MOVEit vulnerabilities
• Limit public-facing access
• Monitor for scan activity and open ports
• Block IPs identified by threat intelligence feeds
• Harden file transfer environments and deploy honeypots if neededScanning isn’t random—it’s reconnaissance. Act now before scanning turns into breach.
Read the article for details: https://www.cuinfosecurity.com/scans-probing-for-moveit-systems-may-be-precursor-to-attacks-a-28832
#MOVEit #Cybersecurity #MassScanning #ThreatIntel #AttackSurface #LMGSecurity #Infosec #ITsecurity #databreach #CISO #DFIR #pentesting #pentest #penetrationtesting
-
New mass scanning activity may be the first step in another MOVEit attack.
Hackers are actively scanning the internet for exposed MOVEit systems—hundreds of unique IPs every day—suggesting the early stages of coordinated exploitation.
Threat intel firm GreyNoise warns this is the same pattern seen weeks before past mass attacks. Known MOVEit vulnerabilities, such as CVE-2023-34362 and CVE-2023-36934, are already being tested in the wild.
If your MOVEit Transfer instance is online and unmonitored, you may already be on an attacker’s target list.
Now’s the time to:
• Patch all known MOVEit vulnerabilities
• Limit public-facing access
• Monitor for scan activity and open ports
• Block IPs identified by threat intelligence feeds
• Harden file transfer environments and deploy honeypots if neededScanning isn’t random—it’s reconnaissance. Act now before scanning turns into breach.
Read the article for details: https://www.cuinfosecurity.com/scans-probing-for-moveit-systems-may-be-precursor-to-attacks-a-28832
#MOVEit #Cybersecurity #MassScanning #ThreatIntel #AttackSurface #LMGSecurity #Infosec #ITsecurity #databreach #CISO #DFIR #pentesting #pentest #penetrationtesting
-
New mass scanning activity may be the first step in another MOVEit attack.
Hackers are actively scanning the internet for exposed MOVEit systems—hundreds of unique IPs every day—suggesting the early stages of coordinated exploitation.
Threat intel firm GreyNoise warns this is the same pattern seen weeks before past mass attacks. Known MOVEit vulnerabilities, such as CVE-2023-34362 and CVE-2023-36934, are already being tested in the wild.
If your MOVEit Transfer instance is online and unmonitored, you may already be on an attacker’s target list.
Now’s the time to:
• Patch all known MOVEit vulnerabilities
• Limit public-facing access
• Monitor for scan activity and open ports
• Block IPs identified by threat intelligence feeds
• Harden file transfer environments and deploy honeypots if neededScanning isn’t random—it’s reconnaissance. Act now before scanning turns into breach.
Read the article for details: https://www.cuinfosecurity.com/scans-probing-for-moveit-systems-may-be-precursor-to-attacks-a-28832
#MOVEit #Cybersecurity #MassScanning #ThreatIntel #AttackSurface #LMGSecurity #Infosec #ITsecurity #databreach #CISO #DFIR #pentesting #pentest #penetrationtesting
-
New mass scanning activity may be the first step in another MOVEit attack.
Hackers are actively scanning the internet for exposed MOVEit systems—hundreds of unique IPs every day—suggesting the early stages of coordinated exploitation.
Threat intel firm GreyNoise warns this is the same pattern seen weeks before past mass attacks. Known MOVEit vulnerabilities, such as CVE-2023-34362 and CVE-2023-36934, are already being tested in the wild.
If your MOVEit Transfer instance is online and unmonitored, you may already be on an attacker’s target list.
Now’s the time to:
• Patch all known MOVEit vulnerabilities
• Limit public-facing access
• Monitor for scan activity and open ports
• Block IPs identified by threat intelligence feeds
• Harden file transfer environments and deploy honeypots if neededScanning isn’t random—it’s reconnaissance. Act now before scanning turns into breach.
Read the article for details: https://www.cuinfosecurity.com/scans-probing-for-moveit-systems-may-be-precursor-to-attacks-a-28832
#MOVEit #Cybersecurity #MassScanning #ThreatIntel #AttackSurface #LMGSecurity #Infosec #ITsecurity #databreach #CISO #DFIR #pentesting #pentest #penetrationtesting
-
New mass scanning activity may be the first step in another MOVEit attack.
Hackers are actively scanning the internet for exposed MOVEit systems—hundreds of unique IPs every day—suggesting the early stages of coordinated exploitation.
Threat intel firm GreyNoise warns this is the same pattern seen weeks before past mass attacks. Known MOVEit vulnerabilities, such as CVE-2023-34362 and CVE-2023-36934, are already being tested in the wild.
If your MOVEit Transfer instance is online and unmonitored, you may already be on an attacker’s target list.
Now’s the time to:
• Patch all known MOVEit vulnerabilities
• Limit public-facing access
• Monitor for scan activity and open ports
• Block IPs identified by threat intelligence feeds
• Harden file transfer environments and deploy honeypots if neededScanning isn’t random—it’s reconnaissance. Act now before scanning turns into breach.
Read the article for details: https://www.cuinfosecurity.com/scans-probing-for-moveit-systems-may-be-precursor-to-attacks-a-28832
#MOVEit #Cybersecurity #MassScanning #ThreatIntel #AttackSurface #LMGSecurity #Infosec #ITsecurity #databreach #CISO #DFIR #pentesting #pentest #penetrationtesting
-
“You think it’s just a light bulb—but it’s not off. It’s watching, listening… maybe even hacking.”
LMG Security’s @tompohl revealed how $20 smart outlets and light bulbs can be exploited for WiFi cracking, evil twin attacks, and stealth monitoring—turning everyday gadgets into real-world threats.
In our latest blog, we’ll share:
▪ How attackers can exploit everyday IoT gadgets to breach your organization
▪ Advice on how to lock down your smart tech
▪ Tips on segmentation, firmware auditing, and red teamingRead the blog: https://www.lmgsecurity.com/i-have-the-power-iot-security-challenges-hidden-in-smart-bulbs-and-outlets/
#IoTSecurity #Cybersecurity #SmartDevices #LMGSecurity #Cyberaware #IoT #Cyber #Tech #CISO #IT #PenetrationTesting #RogueDevices #BSidesDesMoines #Infosec #ITsecurity
-
What Happens When AI Goes Rogue?
From blackmail to whistleblowing to strategic deception, today's AI isn't just hallucinating — it's scheming.
In our new Cyberside Chats episode, LMG Security’s @sherridavidoff and @MDurrin share new AI developments, including:
• Scheming behavior in Apollo’s LLM experiments
• Claude Opus 4 acting as a whistleblower
• AI blackmailing users to avoid shutdown
• Strategic self-preservation and resistance to being replaced
• What this means for your data integrity, confidentiality, and availability📺 Watch the video: https://youtu.be/k9h2-lEf9ZM
🎧 Listen to the podcast: https://www.chatcyberside.com/e/ai-gone-rogue-from-schemes-to-whistleblowing/?token=a0a79bc031829d23746df1392fa6122a#AIsecurity #RogueAI #ZeroTrust #Cybersecurity #CybersideChats #LMGSecurity #AIWhistleblower #AIgoals #LLM #ClaudeAI #ApolloAI #AISafety #CISO #CEO #SMB #Cyberaware #Cyber #Tech
-
The recent Microsoft Outlook outage left thousands scrambling. But it wasn’t just a fluke—recent outages from CrowdStrike, AT&T, and UK banks prove that business interruption is one of the biggest risks organizations face today.
Watch the full episode of this week’s Cyberside Chats in which @sherridavidoff and @MDurrin break down the latest Microsoft outage and share practical advice to reduce your downtime and risk!
🎧Listen here: https://www.chatcyberside.com/e/navigating-tech-turbulence-microsoft-outages-and-business-interruption-preparedness/?token=c49ed52268497cfbfb8b8974dd5e1901
🎥 Watch here: https://youtu.be/n5V2aL8XG7k#cybersecurity #cyberinsurance #businesscontinuity #CybersideChats #microsoft #microsoftoutage #cyberaware #businesscontinuityplanning #businesscontinuity #LMGsecurity