• Follow Us

Locked Dorr Security

  • Home
    • Newsletter
    • Locked Dorr Security Blog
  • Cyber News
    • Latest Cyber News and Breaches
    • Latest Malware
    • Latest in Scada and Industrial Control
  • Useful Links and How To Posts
    • Staying Up to Date with Cyber
    • Virtulization
      • Set up a “Host Only” Malware Testing Environment in esxi
      • Setting up ProxMox on a Trunk with multiple Interfaces
      • Import vmdk Virtual Disk from OVF into ProxMox
      • Setting Up a SPAN and Linux Bridge for a Network Sensor
    • Remote Management
      • Gl-iNet Travel Router with Wireguard
      • Guacamole Server for Clientless RDP/VNC Access
      • SSH login with Keys: Login without a Password
      • Lab Management with Portainer with DashMachine
    • Linux
      • Managing Linux Firewalls
    • pfSense and Hosting Web Services
      • SSL Offloading with HA Proxy on pfSense
      • Using Cloudflare with Namecheap DNS & Web-hosting Services and pfSense HA Proxy
    • Protecting Network Traffic with Wireguard or VPNs
      • Protecting your network traffic with Wireguard
      • Adding HA Proxy with Wireguard to proxy Network Traffic to pfSense
    • Install Arkime for conducting PCAP Analysis
    • Install Elastiflow Server on Ubuntu 20.04.1 LTS
    • Shutdown multiple Docker Images Gracefully
    • Updating my CTFd Docker Container with local git clones Repositories
    • Useful Links and How To Posts
  • Defensive Cyber
    • Scanning Techniques with NMAP
    • Packet Analysis with Magic Shark
    • Packet Analysis with tshark
    • Packet Analysis with Data Science
  • Hacktivities
    • RouterSpace Write-up on HTB
  • Docs
  • Home
    • - Newsletter
    • - Locked Dorr Security Blog
  • Cyber News
    • - Latest Cyber News and Breaches
    • - Latest Malware
    • - Latest in Scada and Industrial Control
  • Useful Links and How To Posts
    • - Staying Up to Date with Cyber
    • - Virtulization
      • - - Set up a “Host Only” Malware Testing Environment in esxi
      • - - Setting up ProxMox on a Trunk with multiple Interfaces
      • - - Import vmdk Virtual Disk from OVF into ProxMox
      • - - Setting Up a SPAN and Linux Bridge for a Network Sensor
    • - Remote Management
      • - - Gl-iNet Travel Router with Wireguard
      • - - Guacamole Server for Clientless RDP/VNC Access
      • - - SSH login with Keys: Login without a Password
      • - - Lab Management with Portainer with DashMachine
    • - Linux
      • - - Managing Linux Firewalls
    • - pfSense and Hosting Web Services
      • - - SSL Offloading with HA Proxy on pfSense
      • - - Using Cloudflare with Namecheap DNS & Web-hosting Services and pfSense HA Proxy
    • - Protecting Network Traffic with Wireguard or VPNs
      • - - Protecting your network traffic with Wireguard
      • - - Adding HA Proxy with Wireguard to proxy Network Traffic to pfSense
    • - Install Arkime for conducting PCAP Analysis
    • - Install Elastiflow Server on Ubuntu 20.04.1 LTS
    • - Shutdown multiple Docker Images Gracefully
    • - Updating my CTFd Docker Container with local git clones Repositories
    • - Useful Links and How To Posts
  • Defensive Cyber
    • - Scanning Techniques with NMAP
    • - Packet Analysis with Magic Shark
    • - Packet Analysis with tshark
    • - Packet Analysis with Data Science
  • Hacktivities
    • - RouterSpace Write-up on HTB
  • Docs

Latest Cyber News and Breaches

  • DATA BREACH ALERT: Edelson Lechtzin LLP is Investigating Claims on Behalf of The …
    July 25, 2025
    Around April 3, 2025, NASCAR became aware of a cybersecurity breach where an unauthorized individual accessed its network. They quickly initiated …
  • Microsoft (MSFT) Probes Breach of Cybersecurity Alert System – GuruFocus
    July 25, 2025
    Microsoft (MSFT) Probes Breach of Cybersecurity Alert System · According to projections by 50 seasoned analysts, the one-year price target for …
  • Tea, an app for women to safely talk about men they date, has been breached, user IDs exposed
    July 25, 2025
    … breach only affects users who signed up before February 2024. “Tea has engaged third-party cybersecurity experts and are working around the clock …
  • New York Unveils 'Nation-Leading' Water Sector Cyber Rules – GovInfoSecurity
    July 25, 2025
    … breach at the largest regulated water and wastewater … cybersecurity programs (see: US EPA Nixes Cybersecurity Assessments of Water Systems).
  • Finance Sector Cybersecurity: The Cost of Human Error & Lost Customer Trust | NINJIO
    July 25, 2025
    According to IBM, the average finance sector data breach costs the victim $6.08 million. … Evolve Bank & Trust suffered a social engineering attack …
  • NASCAR confirms data breach after March cyberattack – The Record
    July 25, 2025
    Law enforcement was notified and a cybersecurity firm was hired to look into the attack. “The investigation determined that the unauthorized actor …
  • Cybersecurity: Compliance Is the New Competitive Edge – Mexico Business News
    July 25, 2025
    Empirical breach statistics confirm that no industry vertical is impervious to attack. … Cybersecurity Framework (CSF) 2.0 organizes cybersecurity …
  • Tea App User Data Exposed in a Breach of 72K Images – Business Insider
    July 25, 2025
    Tea said it is working with "third-party cybersecurity experts" after the breach and does not believe "current or additional user data was affected.".
  • Are too many cybersecurity tools creating gaps in your attack surface? – YouTube
    July 25, 2025
    Are too many cybersecurity tools creating gaps in your attack surface? No views · 7 hours ago …more. TechNative. 332. Subscribe.
  • NASCAR confirms data breach after ransomware group claims to steal 1 TB of data
    July 25, 2025
    … cybersecurity incident. The organization acted quickly by securing … The severity of the breach is heightened by the method of attack. The …
  • Global ransomware attacks drop 43% but threats evolve quickly – SecurityBrief New Zealand
    July 25, 2025
    The UK Government's recent Industrial Strategy has highlighted the importance of cybersecurity in protecting vital national interests. … attack …
  • Tea app suffers breach, exposing thousands of user images – Engadget
    July 25, 2025
    … breach. 404 Media reports that a … "We have engaged third-party cybersecurity experts and are working around the clock to secure our systems.
  • Tea App Breach Exposes 72,000 Selfies, ID Photos and Other User Images – CNET
    July 25, 2025
    … breach. The company confirmed Friday that it has "identified … Cybersecurity. Best Password Manager · Best Antivirus · Best Identity Theft …
  • AI emerges as a cybersecurity teammate – BetaNews
    July 25, 2025
    On its own artificial intelligence isn't a solution to cybersecurity issues, but new data from Hack The Box, a platform for building attack-ready …
  • Buy 3 Cybersecurity Stocks to Strengthen Portfolio Security in 2H25 – Yahoo Finance
    July 25, 2025
    … attack surfaces, necessitating the development of advanced security solutions. We recommend three cybersecurity stocks for the rest of 2025 to …
  • Can Security Culture Be Taught? AWS Says Yes – Dark Reading
    July 25, 2025
    Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. … Attack …
  • Google took a month to shut down Catwatchful, a phone spyware operation hosted on its servers
    July 25, 2025
    cybercrime, cybersecurity, data breach, data exposure, Exclusive, Security. Zack Whittaker. Security Editor. Zack Whittaker is the …
  • ISMG Editors: China-Linked SharePoint Exploits Raise Alarm – GovInfoSecurity
    July 25, 2025
    An experienced broadcast journalist, Delaney conducts interviews with senior cybersecurity leaders around the world. Previously, she was editor-in- …
  • Clear Insurance Management Urges Retailers to Improve Cybersecurity Policies Following …
    July 25, 2025
    Clear Insurance Management Urges Retailers to Improve Cybersecurity Policies Following M&S Attack. … The M&S breach occurred through a third …
  • A Court Ruling on Bug Bounties Just Made the Internet Less Safe – Infosecurity Magazine
    July 25, 2025
    This decision is deeply out of step with modern cybersecurity practices and puts organizations, CISOs and national security at greater risk. … breach …
Welcome to Locked Dorr Security
  • PRIVACY POLICY
  • TERMS OF USE
  • CONTACT US