Cybersecurity Blog


Recent Posts

Can Antivirus Software Be Used Against You?

Posted on October 10, 2017 by Sherri Davidoff, Author of "Network Forensics"

Antivirus software permeates our networks, from mission-critical servers to the CEO’s workstation. Ironically, the very software designed to protect our organizations can be used against us.  ...

Read More

Subnetting != Segmentation

Posted on August 29, 2017 by Dan Featherman

Here at LMG Security, we do a lot of pentesting. I have performed penetration tests on organizations of all sizes, including Fortune 500 companies.   “Black box”...

Read More

Password Cracking with Custom Wordlists

Posted on August 22, 2017 by Craig Nagy

Caption(s): Enigma Machine Source(s): Wikimedia Commons: https://commons.wikimedia.org/wiki/Enigma_machine   Security researchers have been compiling wordlists for years. They have added hundreds of thousands of words and even some...

Read More

DEFCON and BlackHat Speaker Workshops

Posted on August 7, 2017 by AJ Brown

  DEFCON was a treat as usual with many interesting talks and events. DEFCON, for those that don’t know, is the world’s longest running and largest underground...

Read More

Black Hat – Network Forensics Highlights

Posted on August 2, 2017 by Sherri Davidoff, Author of "Network Forensics"

Ah, summer– when hackers migrate to Las Vegas to renew friendships, obtain bleeding-edge training, and release their latest exploits and security research. Every year, LMG flies south...

Read More

Cyber Slap Contest – Win a Drone!

Posted on July 27, 2017 by Sherri Davidoff, Author of "Network Forensics"

Tweet the BEST pic of the Cyber Slap Bracelets at DEFCON/BlackHat and win an F181 RC Quadcopter Drone w/ HD Camera! @LMGsecurity #cyberslap

Read More

Cyber Slap Bracelets are Here!

Posted on July 27, 2017 by Sherri Davidoff, Author of "Network Forensics"

Check out LMG's sweet new Cybersecurity Slap bracelets: the TCP/IP protocol chart (red/yellow), Emacs/Vi reference (green), Command Line "Rosetta Stone" (orange), and Cybersecurity Cheat Sheet (pink). We're giving out a limited number at Black Hat and DEFCON. Want one? Just ask an LMG team member!

Read More