• Follow Us

Locked Dorr Security

  • Home
    • Newsletter
    • Locked Dorr Security Blog
  • Cyber News
    • Latest Cyber News and Breaches
    • Latest Malware
    • Latest in Scada and Industrial Control
  • Useful Links and How To Posts
    • Staying Up to Date with Cyber
    • Virtulization
      • Set up a “Host Only” Malware Testing Environment in esxi
      • Setting up ProxMox on a Trunk with multiple Interfaces
      • Import vmdk Virtual Disk from OVF into ProxMox
      • Setting Up a SPAN and Linux Bridge for a Network Sensor
    • Remote Management
      • Gl-iNet Travel Router with Wireguard
      • Guacamole Server for Clientless RDP/VNC Access
      • SSH login with Keys: Login without a Password
      • Lab Management with Portainer with DashMachine
    • Linux
      • Managing Linux Firewalls
    • pfSense and Hosting Web Services
      • SSL Offloading with HA Proxy on pfSense
      • Using Cloudflare with Namecheap DNS & Web-hosting Services and pfSense HA Proxy
    • Protecting Network Traffic with Wireguard or VPNs
      • Protecting your network traffic with Wireguard
      • Adding HA Proxy with Wireguard to proxy Network Traffic to pfSense
    • Install Arkime for conducting PCAP Analysis
    • Install Elastiflow Server on Ubuntu 20.04.1 LTS
    • Shutdown multiple Docker Images Gracefully
    • Updating my CTFd Docker Container with local git clones Repositories
    • Useful Links and How To Posts
  • Defensive Cyber
    • Scanning Techniques with NMAP
    • Packet Analysis with Magic Shark
    • Packet Analysis with tshark
    • Packet Analysis with Data Science
  • Hacktivities
    • RouterSpace Write-up on HTB
  • Docs
  • Home
    • - Newsletter
    • - Locked Dorr Security Blog
  • Cyber News
    • - Latest Cyber News and Breaches
    • - Latest Malware
    • - Latest in Scada and Industrial Control
  • Useful Links and How To Posts
    • - Staying Up to Date with Cyber
    • - Virtulization
      • - - Set up a “Host Only” Malware Testing Environment in esxi
      • - - Setting up ProxMox on a Trunk with multiple Interfaces
      • - - Import vmdk Virtual Disk from OVF into ProxMox
      • - - Setting Up a SPAN and Linux Bridge for a Network Sensor
    • - Remote Management
      • - - Gl-iNet Travel Router with Wireguard
      • - - Guacamole Server for Clientless RDP/VNC Access
      • - - SSH login with Keys: Login without a Password
      • - - Lab Management with Portainer with DashMachine
    • - Linux
      • - - Managing Linux Firewalls
    • - pfSense and Hosting Web Services
      • - - SSL Offloading with HA Proxy on pfSense
      • - - Using Cloudflare with Namecheap DNS & Web-hosting Services and pfSense HA Proxy
    • - Protecting Network Traffic with Wireguard or VPNs
      • - - Protecting your network traffic with Wireguard
      • - - Adding HA Proxy with Wireguard to proxy Network Traffic to pfSense
    • - Install Arkime for conducting PCAP Analysis
    • - Install Elastiflow Server on Ubuntu 20.04.1 LTS
    • - Shutdown multiple Docker Images Gracefully
    • - Updating my CTFd Docker Container with local git clones Repositories
    • - Useful Links and How To Posts
  • Defensive Cyber
    • - Scanning Techniques with NMAP
    • - Packet Analysis with Magic Shark
    • - Packet Analysis with tshark
    • - Packet Analysis with Data Science
  • Hacktivities
    • - RouterSpace Write-up on HTB
  • Docs

Latest Cyber News and Breaches

  • Let's help make your smart hospital a more secure hospital – Verizon
    October 30, 2025
    A single cybersecurity breach—caused by a ransomware attack or breach of sensitive medical data, for example—can disrupt operations, damage …
  • Cybersecurity Awareness Month Alert: Small Businesses in Texas May Be Protected
    October 30, 2025
    … cybersecurity criteria in effect at the time the breach occurred. The law recognizes that the cybersecurity program appropriate for a business …
  • The Death of the Security Checkbox: BAS Is the Power Behind Real Defense
    October 30, 2025
    … attack path. That shift … AI SecurityBreach SimulationContinuous ValidationcybersecurityIncident responseRisk managementThreat Intelligence.
  • npm hit by PhantomRaven supply chain attack – The Register
    October 30, 2025
    More packages poisoned in npm attack, but … Cybersecurity and Infrastructure Security Agency · Cybersecurity Information Sharing Act · Data Breach …
  • 'Huge breach': MPs fume over email transfer during investigation – The Sydney Morning Herald
    October 30, 2025
    … cybersecurity experts warning that this risked unlawful disclosure of … In that attack, 3.6TB of data was stolen from HWL Ebsworth, which …
  • AI-Powered Cyberattacks Now Targeting Most Organizations [Research] – Bitdefender
    October 30, 2025
    The 2025 Bitdefender Cybersecurity Assessment found that more than six-in-ten (63%) IT & cybersecurity … Attack Surface: What's Shaping Cybersecurity …
  • FCC will vote to scrap telecom cybersecurity requirements
    October 30, 2025
    … cybersecurity threats.” “We're correcting course,” he said of the plan to … Conduent says data breach originally began with 2024 intrusion.
  • Cybersecurity Awareness Month Quotes and Commentary from Industry Experts in 2025
    October 30, 2025
    “As we enter Cybersecurity Awareness Month, organizations from retailers to airports to daycares are under attack. … Breach report found that …
  • Maryland Launches Cybersecurity Disclosure Program Covering State and Local Systems
    October 30, 2025
    Maryland has implemented a cybersecurity program giving security researchers a legal pathway to report cybersecurity vulnerabilities. … breach IT …
  • Ransomware gang claims Conduent breach: what you should watch for next – Malwarebytes
    October 30, 2025
    … breach. Conduent provides … Breaches like this reinforce the need for robust cybersecurity and incident response in the public sector.
  • New "Brash" Exploit Crashes Chromium Browsers Instantly with a Single Malicious URL
    October 30, 2025
    #1 Trusted Cybersecurity News Platform. Followed by 5.20+ million … In a hypothetical attack scenario, all it would take is a click of a …
  • Microsoft Exchange Server Security Best Practices – CISA
    October 30, 2025
    CISA and the National Security Agency collaborated with international cybersecurity … attack surfaces. Organizations that implement these practices …
  • F5 cyberseucrity attack weighs on positive earnings – SDxCentral
    October 30, 2025
    Security vendor warned of near-term disruptions to sales cycles following a year-long breach by China-linked hackers. … cybersecurity attack. The …
  • EY subject of whopping 4TB data breach following cloud migration error – SDxCentral
    October 30, 2025
    EY's apparent backup breach was 4TB, the equivalent of between 500 to 1,000 full HD movies. … Generic cybersecurity image. 29 Oct 2025. Cisco, Citrix …
  • Proton launches 'Data Breach Observatory' to track personal info leaks – Engadget
    October 30, 2025
    This Baseus MagSafe power bank is just $36 · Cybersecurity. Proton … A company might not make a data breach public for fear of backlash from customers …
  • CISA updates guidance and warns security teams on WSUS exploitation
    October 30, 2025
    … Cybersecurity Division at CISA told Cybersecurity Dive. Security teams … Hackers have been doing reconnaissance activities after they breach systems …
  • St. Paul, Minnesota, fell victim to a cyberattack in July. It's still recovering. | Smart Cities Dive
    October 30, 2025
    In being the victim of a cybersecurity attack, St. Paul is not unique … attack and prevent the breach from being worse. As the city …
  • New Guidance Released on Microsoft Exchange Server Security Best Practices – CISA
    October 30, 2025
    Today, CISA, in partnership with the National Security Agency and international cybersecurity … attack surfaces. CISA recommends organizations also …
  • Your organization experiences a cybersecurity event that includes a breach of sensitive and …
    October 30, 2025
    Your organization experiences a cybersecurity event that includes a breach of sensitive and confidential data. What should happen next? Business …
  • PhantomRaven Malware Found in 126 npm Packages Stealing GitHub Tokens From Devs
    October 30, 2025
    Cybersecurity researchers have uncovered yet another active software supply chain attack campaign targeting the npm registry with over 100 …
Welcome to Locked Dorr Security
  • PRIVACY POLICY
  • TERMS OF USE
  • CONTACT US