• Follow Us

Locked Dorr Security

  • Home
    • Newsletter
    • Locked Dorr Security Blog
  • Cyber News
    • Cyber News
    • Latest Cyber News and Breaches
    • Latest Malware
    • Latest in Scada and Industrial Control
  • Useful Links and How To Posts
    • Staying Up to Date with Cyber
    • Virtulization
      • Set up a “Host Only” Malware Testing Environment in esxi
      • Setting up ProxMox on a Trunk with multiple Interfaces
      • Import vmdk Virtual Disk from OVF into ProxMox
      • Setting Up a SPAN and Linux Bridge for a Network Sensor
    • Remote Management
      • Gl-iNet Travel Router with Wireguard
      • Guacamole Server for Clientless RDP/VNC Access
      • SSH login with Keys: Login without a Password
      • Lab Management with Portainer with DashMachine
    • Linux
      • Managing Linux Firewalls
    • pfSense and Hosting Web Services
      • SSL Offloading with HA Proxy on pfSense
      • Using Cloudflare with Namecheap DNS & Web-hosting Services and pfSense HA Proxy
    • Protecting Network Traffic with Wireguard or VPNs
      • Protecting your network traffic with Wireguard
      • Adding HA Proxy with Wireguard to proxy Network Traffic to pfSense
    • Install Arkime for conducting PCAP Analysis
    • Install Elastiflow Server on Ubuntu 20.04.1 LTS
    • Shutdown multiple Docker Images Gracefully
    • Updating my CTFd Docker Container with local git clones Repositories
    • Useful Links and How To Posts
  • Defensive Cyber
    • Scanning Techniques with NMAP
    • Packet Analysis with Magic Shark
    • Packet Analysis with tshark
    • Packet Analysis with Data Science
  • Hacktivities
    • RouterSpace Write-up on HTB
  • Docs
  • Home
    • - Newsletter
    • - Locked Dorr Security Blog
  • Cyber News
    • - Cyber News
    • - Latest Cyber News and Breaches
    • - Latest Malware
    • - Latest in Scada and Industrial Control
  • Useful Links and How To Posts
    • - Staying Up to Date with Cyber
    • - Virtulization
      • - - Set up a “Host Only” Malware Testing Environment in esxi
      • - - Setting up ProxMox on a Trunk with multiple Interfaces
      • - - Import vmdk Virtual Disk from OVF into ProxMox
      • - - Setting Up a SPAN and Linux Bridge for a Network Sensor
    • - Remote Management
      • - - Gl-iNet Travel Router with Wireguard
      • - - Guacamole Server for Clientless RDP/VNC Access
      • - - SSH login with Keys: Login without a Password
      • - - Lab Management with Portainer with DashMachine
    • - Linux
      • - - Managing Linux Firewalls
    • - pfSense and Hosting Web Services
      • - - SSL Offloading with HA Proxy on pfSense
      • - - Using Cloudflare with Namecheap DNS & Web-hosting Services and pfSense HA Proxy
    • - Protecting Network Traffic with Wireguard or VPNs
      • - - Protecting your network traffic with Wireguard
      • - - Adding HA Proxy with Wireguard to proxy Network Traffic to pfSense
    • - Install Arkime for conducting PCAP Analysis
    • - Install Elastiflow Server on Ubuntu 20.04.1 LTS
    • - Shutdown multiple Docker Images Gracefully
    • - Updating my CTFd Docker Container with local git clones Repositories
    • - Useful Links and How To Posts
  • Defensive Cyber
    • - Scanning Techniques with NMAP
    • - Packet Analysis with Magic Shark
    • - Packet Analysis with tshark
    • - Packet Analysis with Data Science
  • Hacktivities
    • - RouterSpace Write-up on HTB
  • Docs

Latest Malware

  • New Nitrogen Ransomware Targets Financial Firms in the US, UK and Canada – Hackread
    May 20, 2025
    Nitrogen ransomware strain has emerged as a major threat to organizations worldwide, with a particular focus on the financial sector.
  • Windows 10 emergency updates fix BitLocker recovery issues – Bleeping Computer
    May 20, 2025
    How to remove a … Sergiu is a news reporter who has covered the latest cybersecurity and technology developments for over a decade.
  • Seqrite Exposes Advanced Fake "NextGen mParivahan" Malware Targeting Android Users in India
    May 20, 2025
    Seqrite, the enterprise security arm of Quick Heal Technologies Limited, a global provider of cybersecurity solutions, has uncovered a dangerous …
  • Go-Based Malware Deploys XMRig Miner on Linux Hosts via Redis Configuration Abuse
    May 20, 2025
    A new cryptojacking campaign dubbed RedisRaider is hijacking publicly exposed Redis servers by injecting cron jobs using legitimate configuration …
  • 2025 Thales Data Threat Report Reveals Nearly 70% of Organizations Identify AI's Fast …
    May 20, 2025
    60% identified future decryption of today's data and future encryption compromise as major concerns among quantum computing security threats. MEUDON, …
  • Google adds AI to Chrome to catch scam websites before you fall for them – MSN
    May 20, 2025
    Google is adding stronger protections to its Chrome browser. Chrome's Enhanced Protection mode now gives users instant warnings about suspicious …
  • New Phishing Attack Mimic as Zoom Meeting Invites to Steal Login Details
    May 20, 2025
    Phishing campaign mimics Zoom invites to trick corporate users with urgent fake emails, using social engineering to spread malicious links.
  • Why Are Small Machine Shops the New Target for Ransomware? – American Machinist
    May 20, 2025
    Many manufacturers embrace digitalization and its benefits but may not be aware of the measures they should take to keep vital information safe.
  • Running a Small Business in the New Era of Work – Video – ZDNET
    May 20, 2025
    Best malware removal software of 2025 · Best remote access software of … Latest. Are you prepared for the future of AI, automation, and jobs …
  • Cyber criminals turn to Australian SMEs as ransomware threat escalates – iTnews
    May 20, 2025
    Ransomware attacks are on the rise in Australia, but dollar amounts lost are down, according to the latest Acronis Cyberthreats Report. The shift …
  • Security Warning Issued for 1.8 Billion iPhone Users Over AirPlay Flaws – Channel News
    May 20, 2025
    Home > Latest News > Security Warning Issued for 1.8 Billion iPhone Users Over AirPlay Flaws … malware, and stealing data, without any user …
  • New Hannibal Stealer Uses Stealth and Obfuscation to Evade Detection – GBHackers
    May 19, 2025
    A newly identified piece of malware, dubbed the "Hannibal Stealer," has emerged as a significant cybersecurity threat due to its advanced stealth …
  • Unearthing the DNS Roots of the Latest Lotus Blossom Attack – CircleID
    May 19, 2025
    Cisco Talos recently uncovered multiple Lotus Blossom cyber espionage campaigns targeting government, manufacturing, telecommunications, …
  • This new Defendnot trojan can get Windows to disable its own antivirus software
    May 19, 2025
    The Microsoft Defender Antivirus, aka Windows Defender, logo on the display of a laptop. (Image credit: monticello/Shutterstock). A researcher …
  • Remove Hilipinge.com ads (fake) – Tutorial – 2-Spyware
    May 19, 2025
    To safeguard your system, it's essential to perform a thorough scan using reputable anti-malware tools such as Malwarebytes or SpyHunter 5Combo …
  • Microsoft confirms new "Advanced" Settings for Windows 11 – Bleeping Computer
    May 19, 2025
    At the Build 2025 developer conference, Microsoft announced a new 'Advanced Settings' feature to help users and developers personalize the OS …
  • Nvidia's latest coup: All of Taiwan on its software – ZDNET
    May 19, 2025
    Best malware removal software of 2025 · Best remote access software of … Nvidia's latest coup: All of Taiwan on its software. Nvidia has …
  • Skitnet Malware Employs Stealth Techniques to Execute Payload and Maintain Persistence …
    May 19, 2025
    A new and highly sophisticated multi-stage malware, known as Skitnet (or Bossnet), has been uncovered, showcasing advanced stealth techniques.
  • Bitcoin stealer malware found in official printer drivers – TradingView
    May 19, 2025
    The antivirus flagged the drive as containing a worm and a trojan virus named Foxif. Cybersecurity firm confirms crypto-stealing malware. When …
  • Bitcoin stealer malware found in official printer drivers – TradingView
    May 19, 2025
    Chinese printer manufacturer Procolored distributed Bitcoin-stealing malware alongside its official drivers, according to local media reports.
Welcome to Locked Dorr Security
  • PRIVACY POLICY
  • TERMS OF USE
  • CONTACT US