• Follow Us

Locked Dorr Security

  • Home
    • Newsletter
    • Locked Dorr Security Blog
  • Cyber News
    • Latest Cyber News and Breaches
    • Latest Malware
    • Latest in Scada and Industrial Control
  • Useful Links and How To Posts
    • Staying Up to Date with Cyber
    • Virtulization
      • Set up a “Host Only” Malware Testing Environment in esxi
      • Setting up ProxMox on a Trunk with multiple Interfaces
      • Import vmdk Virtual Disk from OVF into ProxMox
      • Setting Up a SPAN and Linux Bridge for a Network Sensor
    • Remote Management
      • Gl-iNet Travel Router with Wireguard
      • Guacamole Server for Clientless RDP/VNC Access
      • SSH login with Keys: Login without a Password
      • Lab Management with Portainer with DashMachine
    • Linux
      • Managing Linux Firewalls
    • pfSense and Hosting Web Services
      • SSL Offloading with HA Proxy on pfSense
      • Using Cloudflare with Namecheap DNS & Web-hosting Services and pfSense HA Proxy
    • Protecting Network Traffic with Wireguard or VPNs
      • Protecting your network traffic with Wireguard
      • Adding HA Proxy with Wireguard to proxy Network Traffic to pfSense
    • Install Arkime for conducting PCAP Analysis
    • Install Elastiflow Server on Ubuntu 20.04.1 LTS
    • Shutdown multiple Docker Images Gracefully
    • Updating my CTFd Docker Container with local git clones Repositories
    • Useful Links and How To Posts
  • Defensive Cyber
    • Scanning Techniques with NMAP
    • Packet Analysis with Magic Shark
    • Packet Analysis with tshark
    • Packet Analysis with Data Science
  • Hacktivities
    • RouterSpace Write-up on HTB
  • Docs
  • Home
    • - Newsletter
    • - Locked Dorr Security Blog
  • Cyber News
    • - Latest Cyber News and Breaches
    • - Latest Malware
    • - Latest in Scada and Industrial Control
  • Useful Links and How To Posts
    • - Staying Up to Date with Cyber
    • - Virtulization
      • - - Set up a “Host Only” Malware Testing Environment in esxi
      • - - Setting up ProxMox on a Trunk with multiple Interfaces
      • - - Import vmdk Virtual Disk from OVF into ProxMox
      • - - Setting Up a SPAN and Linux Bridge for a Network Sensor
    • - Remote Management
      • - - Gl-iNet Travel Router with Wireguard
      • - - Guacamole Server for Clientless RDP/VNC Access
      • - - SSH login with Keys: Login without a Password
      • - - Lab Management with Portainer with DashMachine
    • - Linux
      • - - Managing Linux Firewalls
    • - pfSense and Hosting Web Services
      • - - SSL Offloading with HA Proxy on pfSense
      • - - Using Cloudflare with Namecheap DNS & Web-hosting Services and pfSense HA Proxy
    • - Protecting Network Traffic with Wireguard or VPNs
      • - - Protecting your network traffic with Wireguard
      • - - Adding HA Proxy with Wireguard to proxy Network Traffic to pfSense
    • - Install Arkime for conducting PCAP Analysis
    • - Install Elastiflow Server on Ubuntu 20.04.1 LTS
    • - Shutdown multiple Docker Images Gracefully
    • - Updating my CTFd Docker Container with local git clones Repositories
    • - Useful Links and How To Posts
  • Defensive Cyber
    • - Scanning Techniques with NMAP
    • - Packet Analysis with Magic Shark
    • - Packet Analysis with tshark
    • - Packet Analysis with Data Science
  • Hacktivities
    • - RouterSpace Write-up on HTB
  • Docs

Latest Cyber News and Breaches

  • What will happen if a Facebook account is hacked? (( Cybersecurity breach. ))
    July 21, 2025
    (( Cybersecurity breach. )) If your Facebook account is hacked , 1ー(833)ー398ー5988 unauthorized users may access your personal …
  • Can Ancient Greece Teach America How to Defend Against Cyberattacks
    July 21, 2025
    In the contemporary world, cybersecurity cannot be handled by one country or entity alone. … Co-Op issues apology to data breach of Cyber Attack …
  • Cybersecurity experts are alarmed by a recent breach on Micr… – moomoo Community
    July 21, 2025
    Cybersecurity experts are alarmed by a recent breach on Microsoft's SharePoint, fearing it could boost ransomware activities.
  • Knowledge Center – Pro4Six
    July 21, 2025
    Disney Cybersecurity Breach Exposes Sensitive Data After AI Tool Download … What should my company do to prepare for a cyber attack? A well …
  • CoinDCX Breach Exposes Deep-Rooted Cybersecurity Flaws – Dexalot
    July 21, 2025
    CoinDCX Breach Exposes Deep-Rooted Cybersecurity Flaws. CoinDCX faces a $44.2 million hack, exposing critical vulnerabilities in crypto exchange …
  • Cybersecurity Insurance
    July 21, 2025
    Cybersecurity Insurance shields your business from the financial shock of cyber-crime, whether it's a ransomware demand, a data-breach lawsuit, …
  • Microsoft alerts businesses, governments to server software attack – Deccan Herald
    July 21, 2025
    Cybersecurity Update: Microsoft warns of active SharePoint server … attack that targeted US and international agencies and businesses.
  • Were Ingram Micro Internal Communications Leaked by Anonymous Hackers After the …
    July 21, 2025
    In July 2025, a serious cybersecurity breach hit Ingram Micro — one of … attack's spread. Here's what followed: Internal systems, ordering …
  • Microsoft alerts businesses, governments to server software attack | Reuters
    July 21, 2025
    … attack that targeted U.S. and international agencies and businesses. The hack is known as a "zero day" attack because it … Cybersecurity.
  • Retail Cybersecurity Challenges And Solutions
    July 20, 2025
    … cybersecurity for retailers. Case Study: How a Retailer Recovered from a Cybersecurity Breach. Fortifying Your Retail Business Moving Forward. For …
  • CoinDCX Suffers Major Security Breach – OneSafe Blog
    July 20, 2025
    The Breach: A Dangerous Lesson … In a decisive move, CoinDCX initiated a security overhaul, collaborating with cybersecurity experts to track down the …
  • Global hacking attack on Microsoft product hits US, state agencies, researchers say
    July 20, 2025
    Microsoft has suggested users make modifications to SharePoint server programs or unplug them from the internet to stanch the breach. … Cybersecurity …
  • Quantum computing: three key cybersecurity risks – B2B Cyber Security
    July 20, 2025
    … cybersecurity risks today as encrypted … Attack Attacks APT Attack attacks Backup Barracuda Bitdefender BSI CheckPoint Cloud Cyber ​​attack …
  • Business context still missing in most cyber risk programmes – SecurityBrief Australia
    July 20, 2025
    Cybersecurity can no longer operate in isolation, yet many organisations continue to spread resources thinly across their attack surface without …
  • Cybersecurity Policy – Page 29 – The Washington Post
    July 20, 2025
    The Cybersecurity 202: Could less publicizing of ransomware fixes have prevented the Colonial Pipeline attack? Some cybersecurity pros think so.
  • Cybersecurity News Everyday on X: "A ransomware attack on https://t.co/LrZs8fDxta in Portugal by …
    July 20, 2025
    Cybersecurity News Everyday · @TweetThreatNews. A ransomware attack on http://pt.elis.com in Portugal by devman demands $4 million, highlighting …
  • Microsoft Server Software Vulnerability Leads to Global Cyberattack – AInvest
    July 20, 2025
    This attack has affected numerous entities, highlighting the growing threat of cyberespionage and the need for enhanced cybersecurity measures. The …
  • Microsoft SharePoint servers under attack via zero-day vulnerability with no patch (CVE-2025-53770)
    July 20, 2025
    Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open source projects, breaking news – subscribe here! … breach can …
  • Global hack on Microsoft product hits U.S., state agencies, researchers say
    July 20, 2025
    Hackers exploited a major security flaw in widely used Microsoft server software to launch a global attack … cybersecurity embarrassment for Microsoft …
  • Exclusive: Sysdig's Shantanu Gattani warns AI is supercharging cloud security threats
    July 20, 2025
    SecurityBrief Australia – Technology news for CISOs & cybersecurity decision-makers … The rise of LLM-powered attack tools, ephemeral infrastructure, …
Welcome to Locked Dorr Security
  • PRIVACY POLICY
  • TERMS OF USE
  • CONTACT US