Cybersecurity Blog

Secure Your Office 365 Accounts

Posted on August 21, 2018 by Matt Durrin

Business Email Compromise (BEC) has become an epidemic in recent years and is now the most common type of data breach that LMG Security encounters. This shouldn’t...

Read More

Cryptojacking Meets IoT

Posted on August 1, 2018 by Sherri Davidoff, Author of "Network Forensics"

Hackers can now break into your security cameras and use them to mine cryptocurrency. This week, LMG’s team released new research demonstrating that Internet of Things (IoT) devices...

Read More

RIP Office365 Magic Unicorn Tool

Posted on July 6, 2018 by Matt Durrin

As of this morning, Microsoft appears to have killed access to the “Activities” API, first publicized by Anonymous and used as the basis for the Office365 “Magic...

Read More

Exposing the Secret Office 365 Forensics Tool

Posted on June 27, 2018 by Sherri Davidoff, Author of "Network Forensics"

An ethical crisis in the digital forensics industry came to a head last week with the release of new details on Microsoft’s undocumented “Activities” API. A previously...

Read More