• Follow Us

Locked Dorr Security

  • Home
    • Newsletter
    • Locked Dorr Security Blog
  • Cyber News
    • Latest Cyber News and Breaches
    • Latest Malware
    • Latest in Scada and Industrial Control
  • Useful Links and How To Posts
    • Staying Up to Date with Cyber
    • Virtulization
      • Set up a “Host Only” Malware Testing Environment in esxi
      • Setting up ProxMox on a Trunk with multiple Interfaces
      • Import vmdk Virtual Disk from OVF into ProxMox
      • Setting Up a SPAN and Linux Bridge for a Network Sensor
    • Remote Management
      • Gl-iNet Travel Router with Wireguard
      • Guacamole Server for Clientless RDP/VNC Access
      • SSH login with Keys: Login without a Password
      • Lab Management with Portainer with DashMachine
    • Linux
      • Managing Linux Firewalls
    • pfSense and Hosting Web Services
      • SSL Offloading with HA Proxy on pfSense
      • Using Cloudflare with Namecheap DNS & Web-hosting Services and pfSense HA Proxy
    • Protecting Network Traffic with Wireguard or VPNs
      • Protecting your network traffic with Wireguard
      • Adding HA Proxy with Wireguard to proxy Network Traffic to pfSense
    • Install Arkime for conducting PCAP Analysis
    • Install Elastiflow Server on Ubuntu 20.04.1 LTS
    • Shutdown multiple Docker Images Gracefully
    • Updating my CTFd Docker Container with local git clones Repositories
    • Useful Links and How To Posts
  • Defensive Cyber
    • Scanning Techniques with NMAP
    • Packet Analysis with Magic Shark
    • Packet Analysis with tshark
    • Packet Analysis with Data Science
  • Hacktivities
    • RouterSpace Write-up on HTB
  • Docs
  • Home
    • - Newsletter
    • - Locked Dorr Security Blog
  • Cyber News
    • - Latest Cyber News and Breaches
    • - Latest Malware
    • - Latest in Scada and Industrial Control
  • Useful Links and How To Posts
    • - Staying Up to Date with Cyber
    • - Virtulization
      • - - Set up a “Host Only” Malware Testing Environment in esxi
      • - - Setting up ProxMox on a Trunk with multiple Interfaces
      • - - Import vmdk Virtual Disk from OVF into ProxMox
      • - - Setting Up a SPAN and Linux Bridge for a Network Sensor
    • - Remote Management
      • - - Gl-iNet Travel Router with Wireguard
      • - - Guacamole Server for Clientless RDP/VNC Access
      • - - SSH login with Keys: Login without a Password
      • - - Lab Management with Portainer with DashMachine
    • - Linux
      • - - Managing Linux Firewalls
    • - pfSense and Hosting Web Services
      • - - SSL Offloading with HA Proxy on pfSense
      • - - Using Cloudflare with Namecheap DNS & Web-hosting Services and pfSense HA Proxy
    • - Protecting Network Traffic with Wireguard or VPNs
      • - - Protecting your network traffic with Wireguard
      • - - Adding HA Proxy with Wireguard to proxy Network Traffic to pfSense
    • - Install Arkime for conducting PCAP Analysis
    • - Install Elastiflow Server on Ubuntu 20.04.1 LTS
    • - Shutdown multiple Docker Images Gracefully
    • - Updating my CTFd Docker Container with local git clones Repositories
    • - Useful Links and How To Posts
  • Defensive Cyber
    • - Scanning Techniques with NMAP
    • - Packet Analysis with Magic Shark
    • - Packet Analysis with tshark
    • - Packet Analysis with Data Science
  • Hacktivities
    • - RouterSpace Write-up on HTB
  • Docs

Latest Malware

  • New Shai Hulud 3.0 malware variant raises fresh supply chain security concerns
    December 30, 2025
    A newly discovered third variant of the Shai Hulud malware is raising fresh concerns about the security of the open-source software supply chain, …
  • Chinese APT Silver Fox Targets India with ValleyRAT Tax Phishing Scam – WebProNews
    December 30, 2025
    This isn't limited to India; global reports from Malwarebytes indicate malware spreading beyond Windows to Android and macOS in 2025, signaling a …
  • How to Run an iPhone Malware Scan: Find and Remove Viruses
    December 30, 2025
    Learn how to run an iPhone malware scan, spot early warning signs, and remove potential threats … Get yourself highlights and the latest news from the …
  • New ErrTraffic service enables ClickFix attacks via fake browser glitches
    December 30, 2025
    The attacker must already control a website that accepts victim traffic, or has injected malicious code into a legitimate, compromised website, and …
  • 2 Security Experts Plead Guilty in BlackCat Ransomware Case – The Cyber Express
    December 30, 2025
    … ransomware against five companies have pleaded guilty in the BlackCat ransomware case … Shai-Hulud Returns with 'Golden Path' Malware in Latest NPM …
  • Latest Oracle EBS Victims Include Korean Air, University of Phoenix – The Cyber Express
    December 30, 2025
    The CL0P ransomware group's Oracle EBS victims continue to grow, with Korean Air and the University of Phoenix the latest to reveal data breach …
  • New Shai-Hulud 3.0 variant discovered, closing out 2025 with a malware bang – Cybernews
    December 30, 2025
    The “new and novel” strain of Shai-Hulud was detected embedded in a single npm package (@vietmoney/react-big-calendar), Aikido malware researcher …
  • Microsoft announces new security features to boost Teams defenses – TechRadar
    December 30, 2025
    Microsoft is automatically enabling security features for enterprise users · The updates include blocking malicious URLs and phishing detection · Any …
  • ESET Warns AI-driven Malware Attack and Rapidly Growing Ransomware Economy
    December 30, 2025
    ESET Warns AI-driven Malware Attack and Rapidly Growing Ransomware Economy … Latest news. New Spear-Phishing Attack Targeting Security Individuals in …
  • Researchers identify new ToneShell backdoor targeting government agencies – TechRadar
    December 30, 2025
    Chinese state-sponsored threat actors, known as Mustang Panda, have been observed targeting government organizations of various Asian countries …
  • Hackers Infiltrated Maven Central Masquerading as a Legitimate Jackson JSON Library
    December 30, 2025
    Malware hit Maven Central via typosquatted Jackson library, tricking Java developers with near-identical namespaces.
  • What is the Dark Web? | IBM
    December 30, 2025
    By keeping an eye on dark web forums and social networks, threat intelligence analysts can stay updated on the latest malware, vulnerabilities that …
  • 2025 Android Malware Surge: Albiriox and Sturnus Enable Account Takeovers
    December 30, 2025
    Threats spread via fake apps and phishing, causing financial losses and data breaches. Users are urged to update software, use antivirus, and stay …
  • These Chrome extensions read your ChatGPT and DeepSeek chats – Cybernews
    December 30, 2025
    Malicious Chrome extensions with Google's Featured badge stole ChatGPT and DeepSeek chat histories, exposing sensitive data from over 900000 …
  • MacOS developers targeted with crypto-stealing worms on Open VSX – Cybernews
    December 30, 2025
    Hackers are targeting macOS developers with the crypto-stealing GlassWorm malware by distributing malicious extensions on the Open VSX …
  • Malicious Chrome extensions with 900,000 users steal AI chats – CyberInsider
    December 30, 2025
    A new campaign compromised the privacy of over 900000 users by exfiltrating ChatGPT and DeepSeek chats via two malicious Chrome extensions.
  • Chinese Hackers Use Rootkit to Hide ToneShell Malware Activity – Cyber Security News
    December 30, 2025
    A Chinese-linked threat group tied to the HoneyMyte, also known as Mustang Panda or Bronze President, is using a new kernel rootkit to hide its …
  • To Track Down Stolen Data, Dark Web Threat Intelligence Is Key – PaymentsJournal
    December 30, 2025
    A feature of dark web threat intel platforms is the deployment of analysts who infiltrate the dark web while posing as cybercriminals.
  • Mustang Panda Uses Signed Rootkit to Deploy TONESHELL Backdoor – YouTube
    December 30, 2025
    Chinese-linked hacking group Mustang Panda has been spotted using a signed kernel-mode rootkit to deploy a new variant of the TONESHELL backdoor, …
  • 2025 exposed the risks we ignored while rushing AI | Malwarebytes
    December 30, 2025
    LATEST ARTICLES. Mobile · lots of devices · Malware in 2025 spread far beyond Windows PCs. December 29, 2025. Windows isn't the only target anymore.
Welcome to Locked Dorr Security
  • PRIVACY POLICY
  • TERMS OF USE
  • CONTACT US