• Follow Us

Locked Dorr Security

  • Home
    • Newsletter
    • Locked Dorr Security Blog
  • Cyber News
    • Latest Cyber News and Breaches
    • Latest Malware
    • Latest in Scada and Industrial Control
  • Useful Links and How To Posts
    • Staying Up to Date with Cyber
    • Virtulization
      • Set up a “Host Only” Malware Testing Environment in esxi
      • Setting up ProxMox on a Trunk with multiple Interfaces
      • Import vmdk Virtual Disk from OVF into ProxMox
      • Setting Up a SPAN and Linux Bridge for a Network Sensor
    • Remote Management
      • Gl-iNet Travel Router with Wireguard
      • Guacamole Server for Clientless RDP/VNC Access
      • SSH login with Keys: Login without a Password
      • Lab Management with Portainer with DashMachine
    • Linux
      • Managing Linux Firewalls
    • pfSense and Hosting Web Services
      • SSL Offloading with HA Proxy on pfSense
      • Using Cloudflare with Namecheap DNS & Web-hosting Services and pfSense HA Proxy
    • Protecting Network Traffic with Wireguard or VPNs
      • Protecting your network traffic with Wireguard
      • Adding HA Proxy with Wireguard to proxy Network Traffic to pfSense
    • Install Arkime for conducting PCAP Analysis
    • Install Elastiflow Server on Ubuntu 20.04.1 LTS
    • Shutdown multiple Docker Images Gracefully
    • Updating my CTFd Docker Container with local git clones Repositories
    • Useful Links and How To Posts
  • Defensive Cyber
    • Scanning Techniques with NMAP
    • Packet Analysis with Magic Shark
    • Packet Analysis with tshark
    • Packet Analysis with Data Science
  • Hacktivities
    • RouterSpace Write-up on HTB
  • Docs
  • Home
    • - Newsletter
    • - Locked Dorr Security Blog
  • Cyber News
    • - Latest Cyber News and Breaches
    • - Latest Malware
    • - Latest in Scada and Industrial Control
  • Useful Links and How To Posts
    • - Staying Up to Date with Cyber
    • - Virtulization
      • - - Set up a “Host Only” Malware Testing Environment in esxi
      • - - Setting up ProxMox on a Trunk with multiple Interfaces
      • - - Import vmdk Virtual Disk from OVF into ProxMox
      • - - Setting Up a SPAN and Linux Bridge for a Network Sensor
    • - Remote Management
      • - - Gl-iNet Travel Router with Wireguard
      • - - Guacamole Server for Clientless RDP/VNC Access
      • - - SSH login with Keys: Login without a Password
      • - - Lab Management with Portainer with DashMachine
    • - Linux
      • - - Managing Linux Firewalls
    • - pfSense and Hosting Web Services
      • - - SSL Offloading with HA Proxy on pfSense
      • - - Using Cloudflare with Namecheap DNS & Web-hosting Services and pfSense HA Proxy
    • - Protecting Network Traffic with Wireguard or VPNs
      • - - Protecting your network traffic with Wireguard
      • - - Adding HA Proxy with Wireguard to proxy Network Traffic to pfSense
    • - Install Arkime for conducting PCAP Analysis
    • - Install Elastiflow Server on Ubuntu 20.04.1 LTS
    • - Shutdown multiple Docker Images Gracefully
    • - Updating my CTFd Docker Container with local git clones Repositories
    • - Useful Links and How To Posts
  • Defensive Cyber
    • - Scanning Techniques with NMAP
    • - Packet Analysis with Magic Shark
    • - Packet Analysis with tshark
    • - Packet Analysis with Data Science
  • Hacktivities
    • - RouterSpace Write-up on HTB
  • Docs

Latest Malware

  • 7 new movies and shows to stream this week (July 22 – July 29) – CyberGuy
    July 22, 2025
    Are you a big documentary fan? New docu-series like Shiny Happy People: A Teenage Holy War and WWE: Unreal will be available for streaming this …
  • United Kingdom To Ban Public Sector Ransomware Payments – LinkedIn
    July 22, 2025
    The United Kingdom's government is planning to prohibit public sector and critical infrastructure organizations from paying ransoms following …
  • Akamai Identifies Coyote Malware Variant Capable of Compromising Microsoft UIA Framework
    July 22, 2025
    Akamai researchers disclosed they have discovered a variant of Coyote malware that extracts specific banking and cryptocurrency exchanges.
  • New ClickFake Interview Attack Using ClickFix Technique to Deliver GolangGhost Malware
    July 22, 2025
    Lazarus resurfaces with "ClickFake Interview", using waventic[.]com to spread GolangGhost malware via fake webcam drivers across platforms.
  • CISA and FBI warn of escalating Interlock ransomware attacks – Bleeping Computer
    July 22, 2025
    CISA and the FBI warned on Tuesday of increased Interlock ransomware activity targeting businesses and critical infrastructure organizations in …
  • Malwarebytes Expands ThreatDown Portfolio with Email Security – WGNO
    July 22, 2025
    SANTA CLARA, Calif., July 22, 2025 /PRNewswire/ — Malwarebytes, a global leader in real-time cyber protection, today announced the expansion of its …
  • Linux users are about to face another major Microsoft Secure Boot issue | TechRadar
    July 22, 2025
    Cybersecurity ensures data protection on internet. Data encryption, firewall, encrypted network, VPN A new malware is infecting Gigabyte …
  • Kentucky is latest state to sue Temu over fake sales – SecuringIndustry.com
    July 22, 2025
    Kentucky Attorney General Russell Coleman has filed a lawsuit against Temu, the Chinese online shopping platform, for unlawful data collection, …
  • New DCHSpy Android Malware Targets WhatsApp, Call Logs, Audio, and Photos
    July 22, 2025
    These samples emerged approximately one week following the onset of the Israel-Iran conflict, highlighting the rapid adaptation of malware tooling in …
  • Ransomware Group Uses AI Chatbot to Intensify Pressure on Victims
    July 22, 2025
    A threat actor claiming to have launched a new ransomware-as-a-service (RaaS) venture is leveraging AI chatbots in its negotiation panel to …
  • ToolShell Zero-Day Attacks on SharePoint: First Wave Linked to China, Hit High-Value Targets
    July 22, 2025
    More details emerged on the ToolShell zero-day attacks targeting SharePoint servers, but confusion remains over the vulnerabilities.
  • Credential Theft and Remote Access Surge as AllaKore, PureRAT, and Hijack Loader Proliferate
    July 22, 2025
    … malware, and download additional DLL payloads. In recent months, cyber attacks have employed malicious Inno Setup installers that serve as a …
  • Cryptojacking Resurfaces As Monero Miner Malware Hits 3,500+ Sites: Report – Decrypt
    July 22, 2025
    At least 3,500 websites are running a hidden Monero mining script delivered through a malicious injection chain. Attackers reused access from past …
  • New DCHSpy Android Malware Steals WhatsApp data, call logs, Record Audio and Take Photos
    July 22, 2025
    This malicious tool represents a significant evolution in mobile surveillance capabilities, targeting sensitive communications data and leveraging …
  • Back to Business: Lumma Stealer Returns with Stealthier Methods | Trend Micro (AU)
    July 22, 2025
    Lumma Stealer has re-emerged shortly after its takedown. This time, the cybergroup behind this malware appears to be intent on employing more …
  • Weak Password Let Ransomware Gang Destroy 158-Year-Old Company
    July 22, 2025
    One password is believed to have been all it took for a ransomware gang to destroy a 158-year-old company and put 700 people out of work. KNP …
  • New GLOBAL GROUP ransomware targets all major operating systems
    July 22, 2025
    Cross-platform ransomware GLOBAL GROUP spreads through a revived malware codebase.
  • New DCHSpy Android Malware Steals WhatsApp Data, Calls, Audio, and Photos
    July 22, 2025
    Home Android New DCHSpy Android Malware … The latest DCHSpy samples have adopted aggressive social engineering tactics, distributing malicious …
  • Monero Mining Malware Targets Thousands of Websites – Binance
    July 22, 2025
    According to BlockBeats, cybersecurity researchers from c/side have identified a resurgence of malicious Monero (XMR) mining software affecting …
  • UK Sanctions Russian Hackers Tied to Assassination Attempts – SecurityWeek
    July 22, 2025
    Along with the sanctions, the UK also attributed a new malware family to APT28. Dubbed Authentic Antics (PDF), the malware was “specifically …
Welcome to Locked Dorr Security
  • PRIVACY POLICY
  • TERMS OF USE
  • CONTACT US