Channel Avatar

LMG Security @UC2z45UUa5jSEmamAyhZrUTQ@youtube.com

1.4K subscribers - no pronouns :c

LMG Security is an internationally recognized leader in cybe


02:03
How QR Code Phishing Attacks Work
07:23
Three AI Deepfake Attacks and How to Avoid Them
02:06
Generative AI is Predicted to Cause Billions in Fraud Losses--Watch Real Deepfake Video Examples
01:55
Why You Can No Longer Trust Digital SSL Certificates
05:59
Thwarting the XZUtilities Backdoor Software Supply Chain Attack
06:41
Open Source Software Cybersecurity Threats & How to Reduce Your Risk
09:35
Case Study: Software Supply Chain Breach Tactics & Prevention Advice
03:53
WormGPT Easily Finds Software Vulnerabilities
58:35
AI-Powered Scams and Fraud
03:45
Is Your Third-Party Software Vulnerable?
03:24
Case Study: 2024 National Public Data Breach
07:18
Case Study: The 2024 CrowdStrike Update Failure
52:58
Securing Your Software Supply Chain: Modern Threats and Solutions for 2024
07:05
AWS Shadow Resource Attacks & S3 Bucket Namesquatting
03:00
Cloud Configuration Attack Trends
05:31
AI Cybersecurity Risks from Microsoft Copilot
08:48
Common Cybersecurity Threats from AI: What You Need to Know
57:31
2024 Hacking Trends & Updates from Black Hat & DEFCON
20:42
Pentest Pro Tips with Tom: F5 Big-IP Post Exploitation Techniques
04:45
The Difference Between Penetration Testing and Vulnerability Scanning
01:01:21
How the Dark Web Works 2024
06:04
How to Run an Effective Vulnerability Management Program
05:22
Why You Need Continuous External Vulnerability Scanning
03:20
How You and Attackers Can Use Shodan to Understand Your Network's Attack Surface
04:29
Quick Tips for Better Attack Surface Management
47:16
Navigating the Storm: Effective Incident Response in the Modern Cyber Landscape
01:00:42
The Human Firewall: Cybersecurity Staffing and Training
01:33
Black Hat 2024 360° Ransomware Response Bootcamp Training Class Teaser - Taught by LMG Security
03:25
2024 Change Healthcare Breach Case Study
08:05
2024 Ransomware Attack Trends
55:56
Ransomware Reshaped: Evolving Your Defenses
12:39
What is WormGPT? The Evil AI for Cybercriminals.
56:56
Demystifying Cryptography and Cryptocurrency
58:08
Securing Your Attack Surface
15:44
Business Email Compromise Case Study
01:44
Demo of the ConnectWise ScreenConnect Vulnerability
01:03:15
Top Cybersecurity Threats of 2024
10:22
How Voice Cloning is Used in Social Engineering and MFA Bypass Attacks
04:18
How Criminals Bypass Multi-Factor Authentication (MFA)
06:44
How Passwordless Authentication Solutions Work
05:52
Case Study: 23andMe Users Hacked
00:53
Tom's Pentest Hack of the Week #10: Watch the Flipper Zero in a Physical Penetration Test
03:34
Tom's Pentest Hack of the Week #8: Using Default Credentials for UPS Battery Backup
58:02
Forget Your Password: Voice Cloning, MFA Attacks, and Our Passwordless Future
02:32
Tom's Pentest Hack of the Week #9: Unrestricted Custom Active Directory Templates
04:00
Common Types of Business Email Compromise Attacks & What It Costs Organizations
01:38
What Should You Do When You Get An Email From A Colleague's Hacked Account?
01:26
What is a Cloud Configuration Assessment?
52:31
Weaponar: How Hackers Go From Zero to Takeover
03:26
Pentest Pro Tips with Tom #7: Why it's Important to Sanitize Your Data Input
03:14
What are Todays Strongest Authentication Options?
13:26
Case Study: Social Engineering Attack Costs MGM Resorts Over $100 Million
02:47
Pentest Pro Tips with Tom #6: Misconfiguration Allows Certificate Security Gap
02:05
How to Protect Yourself When a Cloud Provider Gets Hacked
03:21
Pentest Pro Tips with Tom #5: The Dangers of Storing Too Much Data in Your Web Apps
03:11
Pentest Pro Tips with Tom #4: Using Printer Access to Circumvent an Internal Firewall
58:39
Cybersecurity Scams and Fraud
05:27
Pentest Pro Tips with Tom #:3 Unrestricted File Share Access Can Lead to Compromise
03:43
The Difference Between Public and Private Key Encryption
02:29
How is Cloud Data Protected?