• Follow Us

Locked Dorr Security

  • Home
    • Newsletter
    • Locked Dorr Security Blog
  • Cyber News
    • Latest Cyber News and Breaches
    • Latest Malware
    • Latest in Scada and Industrial Control
  • Useful Links and How To Posts
    • Staying Up to Date with Cyber
    • Virtulization
      • Set up a “Host Only” Malware Testing Environment in esxi
      • Setting up ProxMox on a Trunk with multiple Interfaces
      • Import vmdk Virtual Disk from OVF into ProxMox
      • Setting Up a SPAN and Linux Bridge for a Network Sensor
    • Remote Management
      • Gl-iNet Travel Router with Wireguard
      • Guacamole Server for Clientless RDP/VNC Access
      • SSH login with Keys: Login without a Password
      • Lab Management with Portainer with DashMachine
    • Linux
      • Managing Linux Firewalls
    • pfSense and Hosting Web Services
      • SSL Offloading with HA Proxy on pfSense
      • Using Cloudflare with Namecheap DNS & Web-hosting Services and pfSense HA Proxy
    • Protecting Network Traffic with Wireguard or VPNs
      • Protecting your network traffic with Wireguard
      • Adding HA Proxy with Wireguard to proxy Network Traffic to pfSense
    • Install Arkime for conducting PCAP Analysis
    • Install Elastiflow Server on Ubuntu 20.04.1 LTS
    • Shutdown multiple Docker Images Gracefully
    • Updating my CTFd Docker Container with local git clones Repositories
    • Useful Links and How To Posts
  • Defensive Cyber
    • Scanning Techniques with NMAP
    • Packet Analysis with Magic Shark
    • Packet Analysis with tshark
    • Packet Analysis with Data Science
  • Hacktivities
    • RouterSpace Write-up on HTB
  • Docs
  • Home
    • - Newsletter
    • - Locked Dorr Security Blog
  • Cyber News
    • - Latest Cyber News and Breaches
    • - Latest Malware
    • - Latest in Scada and Industrial Control
  • Useful Links and How To Posts
    • - Staying Up to Date with Cyber
    • - Virtulization
      • - - Set up a “Host Only” Malware Testing Environment in esxi
      • - - Setting up ProxMox on a Trunk with multiple Interfaces
      • - - Import vmdk Virtual Disk from OVF into ProxMox
      • - - Setting Up a SPAN and Linux Bridge for a Network Sensor
    • - Remote Management
      • - - Gl-iNet Travel Router with Wireguard
      • - - Guacamole Server for Clientless RDP/VNC Access
      • - - SSH login with Keys: Login without a Password
      • - - Lab Management with Portainer with DashMachine
    • - Linux
      • - - Managing Linux Firewalls
    • - pfSense and Hosting Web Services
      • - - SSL Offloading with HA Proxy on pfSense
      • - - Using Cloudflare with Namecheap DNS & Web-hosting Services and pfSense HA Proxy
    • - Protecting Network Traffic with Wireguard or VPNs
      • - - Protecting your network traffic with Wireguard
      • - - Adding HA Proxy with Wireguard to proxy Network Traffic to pfSense
    • - Install Arkime for conducting PCAP Analysis
    • - Install Elastiflow Server on Ubuntu 20.04.1 LTS
    • - Shutdown multiple Docker Images Gracefully
    • - Updating my CTFd Docker Container with local git clones Repositories
    • - Useful Links and How To Posts
  • Defensive Cyber
    • - Scanning Techniques with NMAP
    • - Packet Analysis with Magic Shark
    • - Packet Analysis with tshark
    • - Packet Analysis with Data Science
  • Hacktivities
    • - RouterSpace Write-up on HTB
  • Docs

Latest Cyber News and Breaches

  • Two Arrested by UK Met Police Following Children's Nursery Cyber Attack in London
    October 8, 2025
    Detectives investigating reports of a cyber-attack on a chain of London-based nurseries have made two arrests … Cybersecurity · Two Arrested by UK Met …
  • Hack on Japan's biggest brewer renews concerns over cyberattack readiness – WRAL.com
    October 8, 2025
    … attack has spotlighted the poor cybersecurity readiness among top-tier companies in the world's fifth-largest economy.
  • Cyber training to equip Texas town with tools to defend against real-world attacks
    October 8, 2025
    An attack on any of those systems could disrupt service or cause irreparable physical damage to the system's drinking water infrastructure. To …
  • Autonomous AI hacking and the future of cybersecurity – CSO Online
    October 8, 2025
    She is a founding member of the Google Security Team and a cybersecurity expert focused on breach recovery, incident response, insider risks, and …
  • JLR Resumes Production After Month-Long Cyber Attack Disruption – NDTV
    October 8, 2025
    The brand paused its production line on September 1st due to a cybersecurity breach. The cyber attack disrupted the brand's global supply chain …
  • As long as the cybercriminals' business model works, companies are vulnerable to attack
    October 8, 2025
    They threatened to expose personal data about young children and their families, shocking parents and cybersecurity experts alike. … attack and …
  • Qantas faces data leak after Salesforce refuses hackers' ultimatum – AFR
    October 8, 2025
    The Qantas IT department passed on a warning to its employees but failed to prevent the breach from occurring. … Australia's cybersecurity laws …
  • BatShadow Group Uses New Go-Based 'Vampire Bot' Malware to Hunt Job Seekers
    October 8, 2025
    The attack chains, per the cybersecurity company, leverage ZIP archives … See a Live Demo of Real-Time Breach Blocking in Action. Join us …
  • What we know about the latest university cybersecurity breach – and how to protect yourself
    October 8, 2025
    Brisbane Olympic chiefs warned of cyber attack risk … Western Sydney University is still reeling from a major cybersecurity breach that occurred on …
  • SHIELD Activated: Researchers build a defense to protect drones from cyberattacks
    October 8, 2025
    … cybersecurity framework, called SHIELD, that monitors the entire drone control system. SHIELD detects subtle signs of attack — including hardware …
  • FIU cybersecurity researchers develop midflight defense against drone hijacking
    October 8, 2025
    FIU cybersecurity researchers develop midflight defense against drone hijacking … Each attack leaves behind a unique signature, and SHIELD responds …
  • Teens arrested in London preschool ransomware attack – The Register
    October 8, 2025
    Cybersecurity Month · comment bubble on black. Teens arrested in London … Red Hat fesses up to GitLab breach after attackers brag of data theft.
  • Greenville Concludes Investigation After Ransomware Attack – Industry Insider
    October 7, 2025
    … cybersecurity firm to assess and mitigate the attack. Although customers of Greenville Electric Utility System (GEUS) experienced service …
  • Responding to Cloud Incidents A Step-by-Step Guide from the 2025 Unit 42 Global Incident …
    October 7, 2025
    What happens when your cloud environment falls under attack? How do you mitigate organizational impact step by step? Unit 42 helps cybersecurity pros …
  • Talent crisis meets tech revolution: Solving cybersecurity's skills gap amidst an AI attack surge
    October 7, 2025
    Talent crisis meets tech revolution: Solving cybersecurity's skills gap amidst an AI attack surge … breach cost avoidance. Strengthen industry …
  • When threats move fast, cybersecurity must move faster – ET Edge Insights
    October 7, 2025
    Supply chain attacks, like the 2020 SolarWinds breach … Talent crisis meets tech revolution: Solving cybersecurity's skills gap amidst an AI attack …
  • Can Cybersecurity Insurance Help with an Interanal Breach?
    October 7, 2025
    Can Cybersecurity Insurance Help with an Interanal Breach? There's … attack. More than 90% of attacks that progressed to the ransom stage …
  • Top cybersecurity missteps ISVs must avoid – DevPro Journal
    October 7, 2025
    The software landscape is constantly evolving, bringing with it incredible innovation, but also a rapidly expanding attack surface for cyber threats.
  • Why the nation needs a more proactive CISA – SC Media
    October 7, 2025
    The Cybersecurity and Infrastructure Security Agency (CISA) has … attack windows precisely when defenders can least afford it. The mission …
  • Data Breach at Doctors Imaging Group Exposes Sensitive Patient Information
    October 7, 2025
    … cybersecurity specialists to assess the scope of the intrusion. The … While the exact motive of the attack remains unknown, no ransomware …
Welcome to Locked Dorr Security
  • PRIVACY POLICY
  • TERMS OF USE
  • CONTACT US