• Follow Us

Locked Dorr Security

  • Home
    • Newsletter
    • Locked Dorr Security Blog
  • Cyber News
    • Latest Cyber News and Breaches
    • Latest Malware
    • Latest in Scada and Industrial Control
  • Useful Links and How To Posts
    • Staying Up to Date with Cyber
    • Virtulization
      • Set up a “Host Only” Malware Testing Environment in esxi
      • Setting up ProxMox on a Trunk with multiple Interfaces
      • Import vmdk Virtual Disk from OVF into ProxMox
      • Setting Up a SPAN and Linux Bridge for a Network Sensor
    • Remote Management
      • Gl-iNet Travel Router with Wireguard
      • Guacamole Server for Clientless RDP/VNC Access
      • SSH login with Keys: Login without a Password
      • Lab Management with Portainer with DashMachine
    • Linux
      • Managing Linux Firewalls
    • pfSense and Hosting Web Services
      • SSL Offloading with HA Proxy on pfSense
      • Using Cloudflare with Namecheap DNS & Web-hosting Services and pfSense HA Proxy
    • Protecting Network Traffic with Wireguard or VPNs
      • Protecting your network traffic with Wireguard
      • Adding HA Proxy with Wireguard to proxy Network Traffic to pfSense
    • Install Arkime for conducting PCAP Analysis
    • Install Elastiflow Server on Ubuntu 20.04.1 LTS
    • Shutdown multiple Docker Images Gracefully
    • Updating my CTFd Docker Container with local git clones Repositories
    • Useful Links and How To Posts
  • Defensive Cyber
    • Scanning Techniques with NMAP
    • Packet Analysis with Magic Shark
    • Packet Analysis with tshark
    • Packet Analysis with Data Science
  • Hacktivities
    • RouterSpace Write-up on HTB
  • Docs
  • Home
    • - Newsletter
    • - Locked Dorr Security Blog
  • Cyber News
    • - Latest Cyber News and Breaches
    • - Latest Malware
    • - Latest in Scada and Industrial Control
  • Useful Links and How To Posts
    • - Staying Up to Date with Cyber
    • - Virtulization
      • - - Set up a “Host Only” Malware Testing Environment in esxi
      • - - Setting up ProxMox on a Trunk with multiple Interfaces
      • - - Import vmdk Virtual Disk from OVF into ProxMox
      • - - Setting Up a SPAN and Linux Bridge for a Network Sensor
    • - Remote Management
      • - - Gl-iNet Travel Router with Wireguard
      • - - Guacamole Server for Clientless RDP/VNC Access
      • - - SSH login with Keys: Login without a Password
      • - - Lab Management with Portainer with DashMachine
    • - Linux
      • - - Managing Linux Firewalls
    • - pfSense and Hosting Web Services
      • - - SSL Offloading with HA Proxy on pfSense
      • - - Using Cloudflare with Namecheap DNS & Web-hosting Services and pfSense HA Proxy
    • - Protecting Network Traffic with Wireguard or VPNs
      • - - Protecting your network traffic with Wireguard
      • - - Adding HA Proxy with Wireguard to proxy Network Traffic to pfSense
    • - Install Arkime for conducting PCAP Analysis
    • - Install Elastiflow Server on Ubuntu 20.04.1 LTS
    • - Shutdown multiple Docker Images Gracefully
    • - Updating my CTFd Docker Container with local git clones Repositories
    • - Useful Links and How To Posts
  • Defensive Cyber
    • - Scanning Techniques with NMAP
    • - Packet Analysis with Magic Shark
    • - Packet Analysis with tshark
    • - Packet Analysis with Data Science
  • Hacktivities
    • - RouterSpace Write-up on HTB
  • Docs

Latest Cyber News and Breaches

  • US, allies sanction Russian bulletproof hosting firm – Cybersecurity Dive
    November 20, 2025
    The Cybersecurity and Infrastructure Security Agency also … Conduent says data breach originally began with 2024 intrusion. By David …
  • Palo Alto Networks to Acquire Chronosphere, Next-Gen Observability Leader, for the AI Era
    November 20, 2025
    … Attack? x close icon to close mobile navigation. Palo Alto Networks … cybersecurity leader, today announced it has entered into a definitive …
  • WhatsApp Vulnerability Exposes Phone Numbers of 3.5 Billion Users – Cyber Press
    November 20, 2025
    … Breach · Vulnerability · Cyber Press · Home · Cyber Attack · Threats · Cyber AI · Data Breach · Vulnerability … cybersecurity reporter at Cyber Press …
  • The weakest link in cybersecurity – GovInsider
    November 20, 2025
    In reality, behind nearly every breach lies something far simpler, a human decision. … Even the most vigilant person can fall for a phishing attack …
  • Tag: cybersecurity breach – BIISO FM
    November 20, 2025
    Tag: cybersecurity breach · Somalia's government says its electronic visa system has been hacked, exposing personal data belonging to thousands of …
  • How the classic anime 'Ghost in the Shell' predicted the future of cybersecurity 30 years ago
    November 19, 2025
    “As a result, we were finally able to create a special anti-puppeteer attack barrier,” the official says in the manga. … DoorDash confirms data breach …
  • PowerSchool Data Breach 2025: What Schools Must Know – edCircuit
    November 19, 2025
    The PowerSchool data breach 2025 has become one of the most significant cybersecurity … A single attack on a major SIS vendor can compromise …
  • Commissioner Gomez Slams Vote on Cybersecurity Rollback
    November 19, 2025
    … breach, which U.S. officials described as the worst telecommunications hack in the nation's history. “Ten months into this Administration, this …
  • AI Attack Surface: How Agents Raise the Cyber Stakes – Dark Reading
    November 19, 2025
    … attack types … Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends.
  • DoorDash has confirmed that a recent data breach allowed an unauthorized third party … – Facebook
    November 19, 2025
    … attack was identified by an internal team on Oct. 25, after which the … Equifax says a giant cybersecurity breach compromised the personal …
  • Obscure MCP API in Comet Browser Breaches User Trust, Enabling Full Device Control via …
    November 19, 2025
    … breach of user trust and transparency. “For decades, browser … Illustration of DDOS attack on server with cybersecurity · DDoS attack on …
  • The Role of M.L.S. in Managing Cybersecurity Legal Challenges – University of Miami News
    November 19, 2025
    … breach. These vary somewhat between states but typically involve prompt … The goal is not simply to improve adherence to cybersecurity laws but also …
  • FOI data shows Australian mining and manufacturing sectors take months to detect cyber breaches
    November 19, 2025
    … cybersecurity of industries critical to the nation's economy. New … A ransomware breach is a type of cyber attack when criminals use …
  • ICYMI: DoorDash is alerting customers that a recent cybersecurity incident allowed an … – Facebook
    November 19, 2025
    … breach/507-03e1370d-c27c-4aa0-8b49-b4ab08dfa6a8?utm_medium … attack. When asked at the time, DoorDash could not explain how the affected …
  • #Holiday #Mobile Threats Quadrupled in 2024 — What's Expected This Year … – Instagram
    November 19, 2025
    … Cybersecurity #Cybercrime #AI Read the article via Securitymagazine.com : https … #Logitech confirms data #breach after Clop extortion attack.
  • Zumpano Patricios Defeats Data Breach Class Action in Federal Court – Yahoo Finance
    November 19, 2025
    Plaintiffs filed the lawsuit within days of receiving notices about a cybersecurity attack affecting Zumpano Patricios. The complaint alleged that …
  • Darktrace finds APJ cyber threats accelerating as AI-driven attacks, geopolitics, hybrid cloud …
    November 19, 2025
    … attack surface. 84% of … ASEAN has also continued to advance regional cybersecurity frameworks under its Cybersecurity Cooperation Strategy.
  • Fake CAPTCHA Triggers 42-Day Akira Ransomware Attack | eSecurity Planet
    November 19, 2025
    Fake CAPTCHA Triggers 42-Day Akira Ransomware Attack. A fake CAPTCHA click led to a 42-day Akira ransomware breach that went largely undetected …
  • North Carolina student, teacher data compromised in cybersecurity breach – MSN
    November 19, 2025
    Gretchen Carlson Spills Why Trump's 'Piggy' Attack Strikes Her 'At The Core' … North Carolina student, teacher data compromised in cybersecurity …
  • Python-Based WhatsApp Worm Spreads Eternidade Stealer Across Brazilian Devices
    November 19, 2025
    Cybersecurity researchers have disclosed details of a new campaign that … The attack culminates with the malware injecting the Eternidade …
Welcome to Locked Dorr Security
  • PRIVACY POLICY
  • TERMS OF USE
  • CONTACT US