• Follow Us

Locked Dorr Security

  • Home
    • Newsletter
    • Locked Dorr Security Blog
  • Cyber News
    • Latest Cyber News and Breaches
    • Latest Malware
    • Latest in Scada and Industrial Control
  • Useful Links and How To Posts
    • Staying Up to Date with Cyber
    • Virtulization
      • Set up a “Host Only” Malware Testing Environment in esxi
      • Setting up ProxMox on a Trunk with multiple Interfaces
      • Import vmdk Virtual Disk from OVF into ProxMox
      • Setting Up a SPAN and Linux Bridge for a Network Sensor
    • Remote Management
      • Gl-iNet Travel Router with Wireguard
      • Guacamole Server for Clientless RDP/VNC Access
      • SSH login with Keys: Login without a Password
      • Lab Management with Portainer with DashMachine
    • Linux
      • Managing Linux Firewalls
    • pfSense and Hosting Web Services
      • SSL Offloading with HA Proxy on pfSense
      • Using Cloudflare with Namecheap DNS & Web-hosting Services and pfSense HA Proxy
    • Protecting Network Traffic with Wireguard or VPNs
      • Protecting your network traffic with Wireguard
      • Adding HA Proxy with Wireguard to proxy Network Traffic to pfSense
    • Install Arkime for conducting PCAP Analysis
    • Install Elastiflow Server on Ubuntu 20.04.1 LTS
    • Shutdown multiple Docker Images Gracefully
    • Updating my CTFd Docker Container with local git clones Repositories
    • Useful Links and How To Posts
  • Defensive Cyber
    • Scanning Techniques with NMAP
    • Packet Analysis with Magic Shark
    • Packet Analysis with tshark
    • Packet Analysis with Data Science
  • Hacktivities
    • RouterSpace Write-up on HTB
  • Docs
  • Home
    • - Newsletter
    • - Locked Dorr Security Blog
  • Cyber News
    • - Latest Cyber News and Breaches
    • - Latest Malware
    • - Latest in Scada and Industrial Control
  • Useful Links and How To Posts
    • - Staying Up to Date with Cyber
    • - Virtulization
      • - - Set up a “Host Only” Malware Testing Environment in esxi
      • - - Setting up ProxMox on a Trunk with multiple Interfaces
      • - - Import vmdk Virtual Disk from OVF into ProxMox
      • - - Setting Up a SPAN and Linux Bridge for a Network Sensor
    • - Remote Management
      • - - Gl-iNet Travel Router with Wireguard
      • - - Guacamole Server for Clientless RDP/VNC Access
      • - - SSH login with Keys: Login without a Password
      • - - Lab Management with Portainer with DashMachine
    • - Linux
      • - - Managing Linux Firewalls
    • - pfSense and Hosting Web Services
      • - - SSL Offloading with HA Proxy on pfSense
      • - - Using Cloudflare with Namecheap DNS & Web-hosting Services and pfSense HA Proxy
    • - Protecting Network Traffic with Wireguard or VPNs
      • - - Protecting your network traffic with Wireguard
      • - - Adding HA Proxy with Wireguard to proxy Network Traffic to pfSense
    • - Install Arkime for conducting PCAP Analysis
    • - Install Elastiflow Server on Ubuntu 20.04.1 LTS
    • - Shutdown multiple Docker Images Gracefully
    • - Updating my CTFd Docker Container with local git clones Repositories
    • - Useful Links and How To Posts
  • Defensive Cyber
    • - Scanning Techniques with NMAP
    • - Packet Analysis with Magic Shark
    • - Packet Analysis with tshark
    • - Packet Analysis with Data Science
  • Hacktivities
    • - RouterSpace Write-up on HTB
  • Docs

Latest Cyber News and Breaches

  • Leaked Credentials Become Top Cause of Data Breaches in 2025 – Petri IT Knowledgebase
    August 12, 2025
    … cybersecurity strategy. In 2025 alone, leaked credentials spiked by over 160%, with a single breach exposing 16 billion records from tech giants …
  • Research Report: State of Cyber Risk and Exposure 2025 – BitSight Technologies
    August 12, 2025
    External Attack Surface Management · Supply Chain Exposure · Cyber … Explore exclusive findings from our global survey of 1,000 cybersecurity …
  • Cybersecurity attack may have exposed WestJet customers' personal information – YouTube
    August 12, 2025
    WestJet says an investigation into a June 13 breach revealed … Cybersecurity attack may have exposed WestJet customers' personal information.
  • GDPR Password Management: Ensuring Compliance with Passwork
    August 12, 2025
    Yet, they remain one of the most vulnerable aspects of cybersecurity. The Verizon Data Breach Investigations Report (2024) highlights the fact that …
  • Cyberattackers Leak Parks and Rec Data After St. Paul, MN, Refuses to Pay Ransom
    August 12, 2025
    Gov. Tim Walz activated the Minnesota National Guard to provide the city with cybersecurity specialists, and the FBI is investigating the attack.
  • Board Responsibilities in a Cybersecurity Crisis – GovInfoSecurity
    August 12, 2025
    Breach Notification · Digital Forensics … He was recognized for his breaking news coverage of the August 2019 coordinated ransomware attack …
  • Cybercrime Groups ShinyHunters, Scattered Spider Join Forces in Extortion Attacks on Businesses
    August 12, 2025
    Cloud securityCybercrimecybersecuritydata breachFinancial Securityphishing attackransomware-as-a-serviceScattered SpiderShinyHunterssocial engineering.
  • 3 Firms Get $600K In Fees After DialAmerica Data Breach Deal – Law360
    August 12, 2025
    data breach … Top 10 trending in Cybersecurity & Privacy. 13rd Circ. Affirms Toss Of …
  • Hackers post some St. Paul files online after city refuses to pay ransom | MPR News
    August 12, 2025
    … cybersecurity officials, including the Minnesota National Guard and the FBI. … St. Paul says cybersecurity breach was a ransomware attack. What does …
  • Weekly Cybersecurity Intelligence Report Cyber Threats & Breaches 4 Aug – 11 Aug, 2025
    August 12, 2025
    Cybersecurity Weekly: Aug 4–11, 2025 saw massive data breaches, zero … Cisco disclosed a data breach resulting from a voice phishing attack …
  • Cybersecurity's dual AI reality: Hacks and defenses both turbocharged – Axios
    August 12, 2025
    Cybersecurity's dual AI reality: Hacks and defenses both turbocharged. Sam Sabin. facebook (opens in new window). twitter (opens in new window).
  • Hackers breach and expose a major North Korean spying operation – TechCrunch
    August 12, 2025
    … breach as cybersecurity researchers and companies typically have to rely on. “It shows a glimpse how openly 'Kimsuky' cooperates with Chinese …
  • New 'Curly COMrades' APT Using NGEN COM Hijacking in Georgia, Moldova Attacks
    August 12, 2025
    Cybersecurity Webinars. The Last Line of Defense. Why AI's Attack Surface is Expanding—And How to Stop It. Join Karl Henrik Smith from Okta as he …
  • Retail Boardroom Breach-Preparedness: Proactive Strategies for Handling the Inevitable Cyberattack
    August 12, 2025
    Cybersecurity is more than just detecting and stopping the progress of the initial attack. … So how should boards better prepare for a cyber breach …
  • Columbia University data breach leaks about 460GB of information – Cybersecurity Insiders
    August 12, 2025
    The Breach: Scope and Impact. The breach was officially disclosed in … This attack underscores the vulnerability of institutions, regardless …
  • St. Paul doesn't pay ransom for cyberattack – Star Tribune
    August 12, 2025
    Three days before the attack on St. Paul, the federal Cybersecurity and Infrastructure Security Agency posted an advisory warning for businesses …
  • The human firewall: Building a cyber-aware workforce – Telecoms Tech News
    August 12, 2025
    The government's latest Cyber Security Breaches Survey reveals that half of all UK businesses experienced some form of cybersecurity breach in the …
  • New Ransomware Charon Uses Earth Baxia APT Techniques to Target Enterprises
    August 12, 2025
    The attack chain leveraged a legitimate browser-related file, Edge.exe … Trend Vision One™ is the only AI-powered enterprise cybersecurity …
  • Cybersecurity attack may have exposed WestJet customers' personal information – YouTube
    August 12, 2025
    WestJet says an investigation into a June 13 breach … / cp24breakfast — CP24 is Toronto's #1 source for breaking news. Cybersecurity attack may have …
  • Financial impact from severe OT events could top $300B – Cybersecurity Dive
    August 12, 2025
    The financial analysis is based on 10 years of breach and insurance-claims data from Marsh McLennan's Cyber Risk Intelligence Center. … attack linked …
Welcome to Locked Dorr Security
  • PRIVACY POLICY
  • TERMS OF USE
  • CONTACT US