• Follow Us

Locked Dorr Security

  • Home
    • Newsletter
    • Locked Dorr Security Blog
  • Cyber News
    • Cyber News
    • Latest Cyber News and Breaches
    • Latest Malware
    • Latest in Scada and Industrial Control
  • Useful Links and How To Posts
    • Staying Up to Date with Cyber
    • Virtulization
      • Set up a “Host Only” Malware Testing Environment in esxi
      • Setting up ProxMox on a Trunk with multiple Interfaces
      • Import vmdk Virtual Disk from OVF into ProxMox
      • Setting Up a SPAN and Linux Bridge for a Network Sensor
    • Remote Management
      • Gl-iNet Travel Router with Wireguard
      • Guacamole Server for Clientless RDP/VNC Access
      • SSH login with Keys: Login without a Password
      • Lab Management with Portainer with DashMachine
    • Linux
      • Managing Linux Firewalls
    • pfSense and Hosting Web Services
      • SSL Offloading with HA Proxy on pfSense
      • Using Cloudflare with Namecheap DNS & Web-hosting Services and pfSense HA Proxy
    • Protecting Network Traffic with Wireguard or VPNs
      • Protecting your network traffic with Wireguard
      • Adding HA Proxy with Wireguard to proxy Network Traffic to pfSense
    • Install Arkime for conducting PCAP Analysis
    • Install Elastiflow Server on Ubuntu 20.04.1 LTS
    • Shutdown multiple Docker Images Gracefully
    • Updating my CTFd Docker Container with local git clones Repositories
    • Useful Links and How To Posts
  • Defensive Cyber
    • Scanning Techniques with NMAP
    • Packet Analysis with Magic Shark
    • Packet Analysis with tshark
    • Packet Analysis with Data Science
  • Hacktivities
    • RouterSpace Write-up on HTB
  • Docs
  • Home
    • - Newsletter
    • - Locked Dorr Security Blog
  • Cyber News
    • - Cyber News
    • - Latest Cyber News and Breaches
    • - Latest Malware
    • - Latest in Scada and Industrial Control
  • Useful Links and How To Posts
    • - Staying Up to Date with Cyber
    • - Virtulization
      • - - Set up a “Host Only” Malware Testing Environment in esxi
      • - - Setting up ProxMox on a Trunk with multiple Interfaces
      • - - Import vmdk Virtual Disk from OVF into ProxMox
      • - - Setting Up a SPAN and Linux Bridge for a Network Sensor
    • - Remote Management
      • - - Gl-iNet Travel Router with Wireguard
      • - - Guacamole Server for Clientless RDP/VNC Access
      • - - SSH login with Keys: Login without a Password
      • - - Lab Management with Portainer with DashMachine
    • - Linux
      • - - Managing Linux Firewalls
    • - pfSense and Hosting Web Services
      • - - SSL Offloading with HA Proxy on pfSense
      • - - Using Cloudflare with Namecheap DNS & Web-hosting Services and pfSense HA Proxy
    • - Protecting Network Traffic with Wireguard or VPNs
      • - - Protecting your network traffic with Wireguard
      • - - Adding HA Proxy with Wireguard to proxy Network Traffic to pfSense
    • - Install Arkime for conducting PCAP Analysis
    • - Install Elastiflow Server on Ubuntu 20.04.1 LTS
    • - Shutdown multiple Docker Images Gracefully
    • - Updating my CTFd Docker Container with local git clones Repositories
    • - Useful Links and How To Posts
  • Defensive Cyber
    • - Scanning Techniques with NMAP
    • - Packet Analysis with Magic Shark
    • - Packet Analysis with tshark
    • - Packet Analysis with Data Science
  • Hacktivities
    • - RouterSpace Write-up on HTB
  • Docs

Latest Cyber News and Breaches

  • Guardz Raises $56M to Transform Cybersecurity for SMBs with its AI-Native, Unified …
    June 9, 2025
    Guardz is at the forefront of this effort, enabling MSPs to protect their clients more effectively across all attack vectors and scale their …
  • Drug and Alcohol Treatment Services Facing Multiple Class Action Data Breach Lawsuits
    June 9, 2025
    … attack … Breach Statistics · Healthcare Cybersecurity Statistics · State of HIPAA …
  • SentinelOne rebuffs China-linked attack — and discovers global intrusions
    June 9, 2025
    The attempt to breach the South Asian government agency came in … “Cybersecurity companies are high-value targets for threat actors due …
  • Think Your IdP or CASB Covers Shadow IT? These 5 Risks Prove Otherwise
    June 9, 2025
    Example: In the 2023 Okta customer support breach, hackers exploited a … Cybersecurity Webinars. AI Is Fast — So Are the Threats. Learn How …
  • Government and public sector – KPMG International
    June 9, 2025
    … cybersecurity, CISOs can help protect the critical assets and data that underpin public institutions. Key cybersecurity considerations for CISOs …
  • Companies Delay Impact Reports With DEI, ESG Under Attack – Insurance Journal
    June 9, 2025
    Companies Delay Impact Reports With DEI, ESG Under Attack. June 9 … Cloud computing and cybersecurity company Akamai said its data-center …
  • Joseph M. Saunders, CEO at RunSafe Security – CPO Magazine
    June 9, 2025
    … cybersecurity specialists with deep knowledge of how attackers operate. … Data Breach U.S. Regulations Cyber Attack EU GDPR. See all results.
  • New PathWiper Malware Strikes Ukraine's Critical Infrastructure – Hackread
    June 9, 2025
    A newly identified malware named PathWiper was recently used in a cyberattack targeting essential services in Ukraine. Cybersecurity experts at …
  • SentinelOne rebuffs China-linked attack — and discovers global intrusions – Yahoo Finance
    June 9, 2025
    Cybersecurity Dive, an Industry Dive publication · Cybersecurity Dive · Industry Dive … The attempt to breach the South Asian government agency …
  • Roles Here? Roles There? Roles Anywhere: Exploring the Security of AWS IAM Roles Anywhere
    June 9, 2025
    Breach Readiness Review … Figure 5 shows a high-level illustration of the attackers' steps. Diagram illustrating a cybersecurity attack where a …
  • OT sector convenes for Critical Effect DC; Senate panel to vote on NCD nominee Cairncross
    June 9, 2025
    The ICS Village joins forces with the Institute for Security and Technology to launch a revamped conference focused on cybersecurity … Data-Breach …
  • Did Elon Musk's Starlink Create a Secret Backdoor at the White House? Here's What Happened
    June 9, 2025
    In April, a whistleblower from the National Labor Relations Board accused the DOGE unit of facilitating a “significant cybersecurity breach,” …
  • Expanding on ADHICS v2.0: A Closer Look at Healthcare Cybersecurity in the UAE
    June 9, 2025
    Explore ADHICS v2.0 and how it strengthens UAE healthcare cybersecurity … A ransomware attack can delay treatment and surgeries, reroute ambulances, …
  • Beware for Developers: 16 React Native Packages with Millions of Downloads … – GBHackers
    June 9, 2025
    Cybersecurity researchers have uncovered a large-scale attack targeting … Aman Mishra is a Security and privacy Reporter covering various data breach, …
  • The devastating impact of cyberattacks on industrial companies – IT-Online
    June 9, 2025
    The research underscores that the financial impact of an OT cybersecurity breach is both complex and multifaceted. Organisations must consider a …
  • Exclusive: Guardz locks up $56M Series B for cybersecurity – Axios
    June 9, 2025
    Now they are selling attack-as-a-service so other people can use these … The bottom line: Securing SMBs remains a blind spot in cybersecurity — one …
  • Understanding the evolving malware and ransomware threat landscape
    June 9, 2025
    Cybersecurity professionals must stay informed, proactive, and adaptive. … Rethinking Identity Risk: A Strategic Approach to Attack Path Management …
  • New Supply Chain Malware Attack Exposes Critical Gaps in Cybersecurity – DigiAlert
    June 9, 2025
    New Supply Chain Malware Attack Exposes Critical Gaps in Cybersecurity … One of our clients in the logistics industry recently suffered a breach …
  • AI Attacks Vs Africa's Critical infrastructure: We Are Not Ready | CIO Africa
    June 9, 2025
    It doesn't help that the continent's cybersecurity challenges are so multivariate and multifaceted. … attack and suffering debilitating losses.
  • Are technologists a threat to doing business securely? – The Register
    June 9, 2025
    … cybersecurity investments. We'll dig into how organizations sideline … Technology won't stop a sophisticated phishing attack if employees are …
Welcome to Locked Dorr Security
  • PRIVACY POLICY
  • TERMS OF USE
  • CONTACT US