
800
Downloads
26
Episodes
Stay ahead of the latest cybersecurity trends with Cyberside Chats—your go-to cybersecurity podcast for breaking news, emerging threats, and actionable solutions. Whether you’re a cybersecurity pro or an executive who wants to understand how to protect your organization, cybersecurity experts Sherri Davidoff and Matt Durrin will help you understand and proactively prepare for today’s top cybersecurity threats, AI-driven attack and defense strategies, and more!
Episodes

3 hours ago
No Lock, Just Leak
3 hours ago
3 hours ago
Forget everything you thought you knew about ransomware. Today’s threat actors aren’t locking your files—they’re stealing your data and threatening to leak it unless you pay up.
In this episode, we dive into the rise of data-only extortion campaigns and explore why encryption is becoming optional for cybercriminals. From real-world trends like the rebrand of Hunters International to “World Leaks,” to the strategic impact on insurance, PR, and compliance—this is a wake-up call for security teams everywhere.
If your playbook still ends with “just restore from backup,” you’re not ready.
Takeaways for Security Teams:
- Rethink detection: Focus on exfiltration, not just malware.
- Update tabletop exercises: Include public leaks, media scrutiny, and regulatory responses.
- Review insurance policies: Ensure data-only extortion is covered, not just encryption events.
- Prepare execs and PR: Modern extortion targets reputation and compliance pressure points.
Resources & Mentions:
- https://www.coveware.com/ransomware-quarterly-reports
- https://attack.mitre.org/resources/

Tuesday Jun 24, 2025
The AI Insider Threat: EchoLeak and the Rise of Zero-Click Exploits
Tuesday Jun 24, 2025
Tuesday Jun 24, 2025
Can your AI assistant become a silent data leak? In this episode of Cyberside Chats, Sherri Davidoff and Matt Durrin break down EchoLeak, a zero-click exploit in Microsoft 365 Copilot that shows how attackers can manipulate AI systems using nothing more than an email. No clicks. No downloads. Just a cleverly crafted message that turns your AI into an unintentional insider threat.
They also share a real-world discovery from LMG Security’s pen testing team: how prompt injection was used to extract system prompts and override behavior in a live web application. With examples ranging from corporate chatbots to real-world misfires at Samsung and Chevrolet, this episode unpacks what happens when AI is left untested—and why your security strategy must adapt.
Key Takeaways
- Limit and review the data sources your LLM can access—ensure it doesn’t blindly ingest untrusted content like inbound email, shared docs, or web links.
- Audit AI integrations for prompt injection risks—treat language inputs like code and include them in standard threat models.
- Add prompt injection testing to every web app and email flow assessment, even if you’re using trusted APIs or cloud-hosted models.
- Red-team your LLM tools using subtle, natural-sounding prompts—not just obvious attack phrases.
- Monitor and restrict outbound links from AI-generated content, and validate any use of CSP-approved domains like Microsoft Teams.
Resources
#EchoLeak #Cybersecurity #Cyberaware #CISO #Microsoft #Microsoft365 #Copilot #AI #GenAI #AIsecurity #RiskManagement

Tuesday Jun 17, 2025
When AI Goes Rogue: Blackmail, Shutdowns, and the Rise of High-Agency Machines
Tuesday Jun 17, 2025
Tuesday Jun 17, 2025
What happens when your AI refuses to shut down—or worse, tries to blackmail you to stay online?
Join us for a riveting Cyberside Chats Live as we dig into two chilling real-world incidents: one where OpenAI’s newest model bypassed shutdown scripts during testing, and another where Anthropic’s Claude Opus 4 wrote blackmail messages and threatened users in a disturbing act of self-preservation. These aren’t sci-fi hypotheticals—they’re recent findings from leading AI safety researchers.
We’ll unpack:
- The rise of high-agency behavior in LLMs
- The shocking findings from Apollo Research and Anthropic
- What security teams must do to adapt their threat models and controls
- Why trust, verification, and access control now apply to your AI
This is essential listening for CISOs, IT leaders, and cybersecurity professionals deploying or assessing AI-powered tools.
Key Takeaways
- Restrict model access using role-based controls.
Limit what AI systems can see and do—apply the principle of least privilege to prompts, data, and tool integrations.
- Monitor and log all AI inputs and outputs.
Treat LLM interactions like sensitive API calls: log them, inspect for anomalies, and establish retention policies for auditability.
- Implement output validation for critical tasks.
Don’t blindly trust AI decisions—use secondary checks, hashes, or human review for rankings, alerts, or workflow actions.
- Deploy kill-switches outside of model control.
Ensure that shutdown or rollback functions are governed by external orchestration—not exposed in the AI’s own prompt space or toolset.
- Add AI behavior reviews to your incident response and risk processes.
Red team your models. Include AI behavior in tabletop exercises. Review logs not just for attacks on AI, but misbehavior by AI.
Resources
#AI #GenAI #CISO #Cybersecurity #Cyberaware #Cyber #Infosec #ITsecurity #IT #CEO #RiskManagement

Tuesday Jun 10, 2025
Retailgeddon Reloaded: Beyond Card Theft, Into Chaos
Tuesday Jun 10, 2025
Tuesday Jun 10, 2025
Retail breaches are back — but they’ve evolved. This isn’t about skimming cards anymore. From ransomware taking down pharmacies to credential stuffing attacks hitting brand loyalty, today’s breaches are about disruption, trust, and third-party exposure. In this episode of Cyberside Chats, hosts Sherri Davidoff and Matt Durrin break down the latest retail breach wave, revisit lessons from the 2013 “Retailgeddon” era, and highlight what every security leader — not just in retail — needs to know today.
Key Takeaways
- Redefine what “sensitive data” means. Names, emails, and access tokens are often more valuable to attackers than payment data.
- Scrutinize third-party and SaaS access. You can’t protect what you don’t know is exposed.
- Monitor and protect customer-facing systems. Logging, anomaly detection, and fast response are essential for accounts and APIs — especially when attackers target credentials.
- Test your incident response plan for downtime. Retail isn’t the only sector where uptime = revenue and lives impacted.
Resources
2025 Verizon Data Breach Investigations Report: https://www.verizon.com/business/resources/reports/dbir/
Victoria’s Secret security incident coverage: https://www.bleepingcomputer.com/news/security/victorias-secret-takes-down-website-after-security-incident/
LMG Security: Third-Party Risk Assessments: https://lmgsecurity.com/third-party-risk-assessments/

Tuesday Jun 03, 2025
How Hackers Get In: Penetration Testing Secrets from the Front Line
Tuesday Jun 03, 2025
Tuesday Jun 03, 2025
Think your network is locked down? Think again. In this episode of Cyberside Chats, we’re joined by Tom Pohl, LMG Security’s head of penetration testing, whose team routinely gains domain admin access in over 90% of their engagements. How do they do it—and more importantly, how can you stop real attackers from doing the same?
Tom shares the most common weak points his team exploits, from insecure default Active Directory settings to overlooked misconfigurations that persist in even the most mature environments. We’ll break down how features like SMB signing, legacy broadcast protocols, and other out-of-the-box settings designed for ease, not security, can quietly open the door for attackers—and what security leaders can do today to shut those doors for good.
Whether you're preparing for your next pentest or hardening your infrastructure against advanced threats, this is a must-watch for CISOs, IT leaders, and anyone responsible for securing Windows networks.
Takeaways:
- Eliminate Default Credentials: Regularly audit and replace default logins on network-connected devices, including UPS units, printers, cameras, and other infrastructure.
- Harden AD Certificate Services: Review certificate template permissions and AD CS configurations to block known exploitation paths that enable privilege escalation.
- Enforce SMB Signing Everywhere: Enable and enforce both client and server SMB signing via Group Policy to prevent authentication relay attacks.
- Clean Up File Shares: Scan internal shares for exposed passwords, scripts, and sensitive data, then implement role-based access control by locking down permissions and eliminating unnecessary access.
- Disable Legacy Protocols: Turn off LLMNR, NetBIOS, and similar legacy protocols to reduce the risk of spoofing and name service poisoning attacks.
References:
“Critical Windows Server 2025 DMSA Vulnerability Exposes Enterprises to Domain Compromise” (The Hacker News)
https://thehackernews.com/2025/05/critical-windows-server-2025-dmsa.html
“Russian GRU Cyber Actors Targeting Western Logistics Entities and Tech Companies” (CISA Alert)
LMG Security – Penetration Testing Services (Identify weaknesses before attackers do)

Tuesday May 27, 2025
Afterlife Access: Cybersecurity Planning for When You’re Gone
Tuesday May 27, 2025
Tuesday May 27, 2025
What happens to your digital world when you die? In this episode of Cyberside Chats, LMG Security’s Tom Pohl joins the conversation to discuss the often-overlooked cybersecurity and privacy implications of death. From encrypted files and password managers to social media and device access, we’ll explore how to ensure your loved ones can navigate your digital legacy—without needing a password-cracking expert. Learn practical strategies for secure preparation, policy design, and real-world implementation from a security professional’s perspective.
Takeaways
1) Take a Digital Inventory of Your Assets
- Include details like account recovery options, two-factor authentication settings, and related devices.
- Update the inventory regularly and store it securely.
- Create a comprehensive list of your digital assets, including accounts, devices, files, cloud services, and subscriptions.
2) Implement Emergency Access Protocols in Password Managers
- Use features like 1Password’s Emergency Kit or designate trusted emergency contacts.
- Store emergency credentials securely (e.g., safe deposit box) and reference in legal documents.
- Ensure all critical credentials are actually stored in your password manager—don’t leave them in separate notes or documents.
3) Establish a Digital Executor
- Choose a trusted individual to manage your digital assets after death or incapacitation.
- Document access instructions and store them securely, such as in an encrypted file with a shared key.
- Ensure your digital executor knows where these instructions are located—or give them a copy in advance.
4) Prepare Recovery Access for Critical Devices
- Ensure recovery keys and PINs for devices (e.g., smartphones, laptops, smart home hubs) are stored securely and can be accessed by designated individuals.
- Register a Legacy Contact for Apple and other cloud services.
5) Create a Plan for Your Online Presence
- Decide whether your social media and email accounts should be memorialized, deleted, or handed over.
- Use services like Google Inactive Account Manager or Facebook’s Legacy Contact feature.
6) At Work, Develop Internal Organizational Policies
- Implement IT procedures for handling the death or incapacity of key personnel.
- Regularly audit and securely store credentials for essential systems, especially for sole-proprietor scenarios.
References:
How to Add a Legacy Contact for Your Apple Account: https://support.apple.com/en-us/102631
Get To Know Your Emergency Kit: https://support.1password.com/emergency-kit/
Wayne Crowder’s LinkedIn Page: https://www.linkedin.com/in/wcrowder
Digital Afterlife Planning Checklist: https://www.lmgsecurity.com/resources/digital-afterlife-planning-checklist/
#Cybersecurity #Cyberaware #Cyber #DigitalPlanning

Tuesday May 20, 2025
The LockBit Leak: When Hackers Get a Taste of Their Own Medicine
Tuesday May 20, 2025
Tuesday May 20, 2025
In this explosive episode of Cyberside Chats, we dive into one of the most shocking developments in ransomware history—LockBit got hacked. Join us as we unpack the breach of one of the world’s most notorious ransomware-as-a-service gangs. We explore what was leaked, why it matters, and how this leak compares to past takedowns like Conti. You'll also get the latest insights into the 2025 ransomware landscape, from victim stats to best practices for defending your organization. Whether you’re an incident responder or just love cyber drama, this episode delivers.
Takeaways
- Stay Tuned for Analysis of LockBit’s Dump: The leak could reshape best practices for negotiations and ransom response. More revelations are expected as researchers dive deeper.
- Plan for Ransomware: LockBit’s sophisticated infrastructure and quick rebound highlight the need for a solid, regularly updated ransomware response plan.
- Proactive Measures: Defending against modern ransomware requires:
-
- Robust identity and access management
-
- Secure, offline backups
-
- Continuous employee training on phishing
-
- Timely vulnerability patching
- Collaboration and Intelligence Sharing: Work with peers and participate in threat intelligence networks to stay ahead of attackers.
- Test Your Web Applications: LockBit’s breach stemmed from a web panel vulnerability. Regular application testing is essential to avoid similar flaws.
Don't forget to like and subscribe for more great cybersecurity content!
Resources
- Conti Leak Background (Wired) – context on how the Conti gang crumbled after its internal files were leaked
- Operation Cronos Press Release (UK NCA) – 2024 international takedown of LockBit infrastructure
- LMG Security Blog on Ransomware Response – stay updated with expert analysis and tips
#LMGsecurity #CybersideChats #Ransomware #LockBit #Databreach #IT #CISO #Cyberaware #Infosec #ITsecurity

Tuesday May 13, 2025
Network for Rent: The Criminal Market Built on Outdated Routers
Tuesday May 13, 2025
Tuesday May 13, 2025
Cybercriminals are exploiting outdated routers to build massive proxy networks that hide malware operations, fraud, and credential theft—right under the radar of enterprise defenses. In this episode, Sherri and Matt unpack the FBI’s May 2025 alert, the role of TheMoon malware, and how the Faceless proxy service industrializes anonymity for hire. Learn how these botnets work, why they matter for your enterprise, and what to do next.
Takeaways
- Replace outdated routers
End-of-life routers should be identified and replaced across your organization, including remote offices and unmanaged home setups. These devices no longer receive patches and are prime targets for compromise.
- Restrict remote administration
If remote access is needed, tightly control it—limit by IP address, use VPN access, and require MFA. Avoid exposing admin interfaces directly to the internet unless absolutely necessary.
- Patch and harden infrastructure
Apply all available firmware updates and follow vendor security guidance. Where possible, segment or monitor legacy network devices that can’t be immediately replaced.
- Don’t trust domestic IPs
Traffic from domestic or residential IP ranges is no longer inherently safe. Compromised routers make malicious activity appear to come from trusted regions.
- Add proxy abuse to threat intel
Incorporate indicators of compromise from Lumen and FBI alerts into detection rulesets. Treat proxy abuse as a key TTP for credential theft, fraud, and malware C2. - Report suspected compromise
If you identify affected infrastructure or suspicious traffic, report it to IC3.gov. Include IPs, timestamps, device types, and any supporting forensic detail.
#CybersideChats #Cybersecurity #Tech #Cyber #CyberAware #CISO #CIO #FBIalert #FBIwarning #Malware #Router

Looking for more cybersecurity resources?
Check out our additional resources:
Blog: https://www.LMGsecurity.com/blog/
Top Controls Reports: https://www.LMGsecurity.com/top-security-controls-reports/
Videos: www.youtube.com/@LMGsecurity