SherriDavidoff Profile Banner
Sherri Davidoff Profile
Sherri Davidoff

@SherriDavidoff

Followers
2K
Following
2K
Media
326
Statuses
2K

CEO of @LMGSecurity, author of “Data Breaches." The hacker known as Alien. Loves to mountain bike. Most important role: mom. [email protected]

Missoula, MT
Joined October 2011
Don't wanna be here? Send us removal request.
@SherriDavidoff
Sherri Davidoff
9 months
I recently joined @PAHolder on the @StuphFile Program radio show to talk about everybody's favorite hot topic: Artificial Intelligence! We cover the benefits and pitfalls of AI in cybersecurity and where it can take us in the future. Listen here:
0
0
1
@SherriDavidoff
Sherri Davidoff
9 months
AI models are revolutionizing software security, but we’re just at the beginning. This article discusses how Google's Big Sleep #LLM recently identified a buffer-underflow vulnerability in SQLite. Read more: #AI #cybersecurity.
Tweet card summary image
darkreading.com
Large language models (LLMs) can help app security firms find and fix software vulnerabilities. Malicious actors are on to them, too, but here's why defenders may retain the edge.
0
0
0
@grok
Grok
1 day
Generate videos in just a few seconds. Try Grok Imagine, free for a limited time.
523
953
5K
@SherriDavidoff
Sherri Davidoff
9 months
Learn about the rise in open source software cybersecurity incidents in this short video. Even if your organization doesn’t directly use #Linux or #OpenSource software, your providers likely do, and they can expose your organization to significant risks.
0
0
0
@SherriDavidoff
Sherri Davidoff
9 months
Learn more about web application security assessments! As our CPO Dan Featherman says, "With web application use increasing over the last 5 years, our team feels these tests simply don’t get the attention they deserve." Read the article: #WebApp #Pentest.
Tweet card summary image
lmgsecurity.com
A rising number of attackers are targeting web applications, our expert team shares the ins and outs of why you need web application security assessments.
0
0
0
@SherriDavidoff
Sherri Davidoff
9 months
RT @TheHackersNews: 🚨 Cybercriminals are using NFC tech and Ghost Tap to exploit #Google Pay & Apple Pay, stealing funds from your digital….
thehackernews.com
Hackers exploit NFC technology and mobile payments, enabling global fraud through Google Pay and Apple Pay.
0
86
0
@SherriDavidoff
Sherri Davidoff
9 months
RT @LMGSecurity: Get the scoop on today's top #AI scams! Deloitte predicts $40B in annual fraud losses from #genAI by 2027. Read our new bl….
Tweet card summary image
lmgsecurity.com
AI scams are difficult to detect and increasing at an alarming rate, We dive into the top AI scams and share how you can reduce your organization's risk.
0
1
0
@SherriDavidoff
Sherri Davidoff
9 months
Even if your organization has strong cybersecurity, a vulnerability in a vendor product can still put you at risk. Matt Durrin shows how our team exploited an administrative interface flaw in a commonly used software called Power Panel in this video:
0
0
0
@SherriDavidoff
Sherri Davidoff
9 months
RT @LMGSecurity: New #phishing tactic alert! Attackers are using SVG attachments to evade detection and deliver phishing forms or malware.….
Tweet card summary image
bleepingcomputer.com
Threat actors increasingly use Scalable Vector Graphics (SVG) attachments to display phishing forms or deploy malware while evading detection.
0
1
0
@SherriDavidoff
Sherri Davidoff
9 months
RT @PAHolder: On The @StuphFile Program, cyber security expert, @SherriDavidoff CEO of LMG Security, on AI, some of the pitfalls, and where….
0
1
0
@SherriDavidoff
Sherri Davidoff
9 months
Password manager LastPass is warning users about an ongoing scam. Attackers are writing reviews for the #LastPass Chrome extension promoting a fake customer support number that tricks callers into providing remote access to their computers. Read more:
Tweet card summary image
bleepingcomputer.com
LastPass is warning about an ongoing campaign where scammers are writing reviews for its Chrome extension to promote a fake customer support phone number. However, this phone number is part of a much...
0
0
0
@SherriDavidoff
Sherri Davidoff
9 months
Is your third-party software vulnerable? This video explores how third-party vendors are often the weak link in #cybersecurity, leading to unanticipated threats. You'll learn practical advice to strengthen your third-party risk management strategy. #TPRM.
0
0
0
@SherriDavidoff
Sherri Davidoff
9 months
It's easier than ever to be a hacker these days. Evil #AI tool #WormGPT can quickly find software vulnerabilities, and then write an exploit to match! Watch this video to see it in action and learn why it's crucial to prepare for AI-driven #hacking.
0
0
0
@SherriDavidoff
Sherri Davidoff
9 months
The popular WordPress plugin LiteSpeed Cache has fixed a dangerous privilege elevation flaw in it's free version - patch now! The vulnerability could allow unauthenticated site visitors to gain admin rights via a weakness in the "role simulation" feature.
Tweet card summary image
bleepingcomputer.com
The free version of the popular WordPress plugin LiteSpeed Cache has fixed a dangerous privilege elevation flaw on its latest release that could allow unauthenticated site visitors to gain admin...
0
0
0
@SherriDavidoff
Sherri Davidoff
9 months
A new version of the #FakeCall banking trojan is hijacking outgoing calls from a user to their bank, redirecting them to the attacker's phone number instead with the goal of stealing people's #sensitivedata and money from their bank accounts. Read more:
Tweet card summary image
bleepingcomputer.com
A new version of the FakeCall malware for Android hijacks outgoing calls from a user to their bank, redirecting them to the attacker's phone number instead.
0
0
0
@SherriDavidoff
Sherri Davidoff
9 months
Today’s cyberattacks now leverage #AI to infiltrate organizations through voice and video, making it harder than ever to distinguish real from fake. Watch our on-demand webinar to learn how to stay ahead of AI-powered threats and reduce your #risk:
0
0
2
@SherriDavidoff
Sherri Davidoff
9 months
The insider threat is alive and well: An intern at TikTok owner ByteDance was recently fired for allegedly maliciously interfering with their AI model training. Read more about this interesting story: #Cybersecurity #InsiderThreat #AI.
Tweet card summary image
arstechnica.com
Sabotage supposedly cost tens of millions, but TikTok owner ByteDance denies it.
0
0
1
@SherriDavidoff
Sherri Davidoff
9 months
RT @TheHackersNews: 🛑 A new version of LightSpy #spyware targets iOS, expanding its capabilities with destructive features. With the numbe….
Tweet card summary image
thehackernews.com
Discover the latest LightSpy iOS spyware, featuring expanded capabilities and destructive functions.
0
67
0
@SherriDavidoff
Sherri Davidoff
10 months
2024 has seen a massive uptick in #deepfake videos, and as AI advancements continue, deepfakes become more realistic. It's crucial for organizations to learn how to recognize and protect against risks from these manipulated videos. Read our blog for tips:
Tweet card summary image
lmgsecurity.com
With a 245% rise in detected deepfake videos this year, organizations must learn how to protect against deepfakes before they cause financial, reputational, and operational damage.
0
1
1