• Follow Us

Locked Dorr Security

  • Home
    • Newsletter
    • Locked Dorr Security Blog
  • Cyber News
    • Latest Cyber News and Breaches
    • Latest Malware
    • Latest in Scada and Industrial Control
  • Useful Links and How To Posts
    • Staying Up to Date with Cyber
    • Virtulization
      • Set up a “Host Only” Malware Testing Environment in esxi
      • Setting up ProxMox on a Trunk with multiple Interfaces
      • Import vmdk Virtual Disk from OVF into ProxMox
      • Setting Up a SPAN and Linux Bridge for a Network Sensor
    • Remote Management
      • Gl-iNet Travel Router with Wireguard
      • Guacamole Server for Clientless RDP/VNC Access
      • SSH login with Keys: Login without a Password
      • Lab Management with Portainer with DashMachine
    • Linux
      • Managing Linux Firewalls
    • pfSense and Hosting Web Services
      • SSL Offloading with HA Proxy on pfSense
      • Using Cloudflare with Namecheap DNS & Web-hosting Services and pfSense HA Proxy
    • Protecting Network Traffic with Wireguard or VPNs
      • Protecting your network traffic with Wireguard
      • Adding HA Proxy with Wireguard to proxy Network Traffic to pfSense
    • Install Arkime for conducting PCAP Analysis
    • Install Elastiflow Server on Ubuntu 20.04.1 LTS
    • Shutdown multiple Docker Images Gracefully
    • Updating my CTFd Docker Container with local git clones Repositories
    • Useful Links and How To Posts
  • Defensive Cyber
    • Scanning Techniques with NMAP
    • Packet Analysis with Magic Shark
    • Packet Analysis with tshark
    • Packet Analysis with Data Science
  • Hacktivities
    • RouterSpace Write-up on HTB
  • Docs
  • Home
    • - Newsletter
    • - Locked Dorr Security Blog
  • Cyber News
    • - Latest Cyber News and Breaches
    • - Latest Malware
    • - Latest in Scada and Industrial Control
  • Useful Links and How To Posts
    • - Staying Up to Date with Cyber
    • - Virtulization
      • - - Set up a “Host Only” Malware Testing Environment in esxi
      • - - Setting up ProxMox on a Trunk with multiple Interfaces
      • - - Import vmdk Virtual Disk from OVF into ProxMox
      • - - Setting Up a SPAN and Linux Bridge for a Network Sensor
    • - Remote Management
      • - - Gl-iNet Travel Router with Wireguard
      • - - Guacamole Server for Clientless RDP/VNC Access
      • - - SSH login with Keys: Login without a Password
      • - - Lab Management with Portainer with DashMachine
    • - Linux
      • - - Managing Linux Firewalls
    • - pfSense and Hosting Web Services
      • - - SSL Offloading with HA Proxy on pfSense
      • - - Using Cloudflare with Namecheap DNS & Web-hosting Services and pfSense HA Proxy
    • - Protecting Network Traffic with Wireguard or VPNs
      • - - Protecting your network traffic with Wireguard
      • - - Adding HA Proxy with Wireguard to proxy Network Traffic to pfSense
    • - Install Arkime for conducting PCAP Analysis
    • - Install Elastiflow Server on Ubuntu 20.04.1 LTS
    • - Shutdown multiple Docker Images Gracefully
    • - Updating my CTFd Docker Container with local git clones Repositories
    • - Useful Links and How To Posts
  • Defensive Cyber
    • - Scanning Techniques with NMAP
    • - Packet Analysis with Magic Shark
    • - Packet Analysis with tshark
    • - Packet Analysis with Data Science
  • Hacktivities
    • - RouterSpace Write-up on HTB
  • Docs

Latest Cyber News and Breaches

  • New Malware Attack Leverages SVGs, Email Attachments to Deliver XWorm and Remcos RAT
    September 13, 2025
    The attack chain demonstrates remarkable sophistication in its execution methodology. … Tushar is a senior cybersecurity and breach reporter. He …
  • French Advisory Sheds Light on Apple Spyware Activity – Dark Reading
    September 13, 2025
    … attack against … Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends.
  • Professional Cybersecurity Services in Woodland Hills – Alcala Consulting
    September 13, 2025
    Corporate and financial services face elevated breach costs due to extensive client data and regulatory requirements. … Don't wait for a cyber attack …
  • Cybersecurity summit seeks strategies to keep communities safe | kare11.com
    September 13, 2025
    Cybersecurity summit seeks strategies to keep communities safe … The summit at Metro State University comes on the heels of a major ransomware attack …
  • A large database in Vietnam containing data on creditors has been attacked by hackers, and …
    September 13, 2025
    Equifax says a giant cybersecurity breach compromised the personal … The breach was most likely because of an attack into the company's customer …
  • AI-powered Pentesting Tool 'Villager' Combines Kali Linux Tools with DeepSeek AI for …
    September 13, 2025
    … attack workflows … Cybersecurity researchers at Straiker's AI Research (STAR) team have uncovered a concerning development in AI-powered …
  • Trusted Connections, Hidden Risks: Token Management in the Third-Party Supply Chain
    September 13, 2025
    … breach. This underscores a critical threat landscape of inconsistently managed integrations and tokens. Downstream clients of a third-party …
  • CATA hosts PennDOT Cybersecurity Task Force Tabletop Exercises for PA transit authorities
    September 13, 2025
    … Cybersecurity. … attack. Participants learned the importance of maintaining an up-to …
  • 23AndMe Inks $3.25M Data Breach Deal With Canadian Users – Law360
    September 13, 2025
    … cybersecurity breach, touting the… To view the full article, register now. FREE Access for 7 Days. Already a subscriber? Click here to view full …
  • What is a Data Breach? #itsupport #itsecurity #cybersecurity #shortsfeed #shorts #data – YouTube
    September 13, 2025
    What is a Data Breach? #itsupport #itsecurity #cybersecurity #shortsfeed #shorts #data. Like. Dislike.
  • Proton Mail Suspended Journalist Accounts at Request of Cybersecurity Agency
    September 13, 2025
    … cybersecurity agency. After a public outcry, and multiple weeks … attack. Israel's War on Gaza. Gaza Aid Security Contractor Hired Members …
  • Without Federal Help, Cyber Defense Is Up to the Rest of Us
    September 13, 2025
    … attack is a strategic one. … Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging …
  • Windows 11 Patch Opens Kernel Leak CVE-2025-53136 – eSecurity Planet
    September 13, 2025
    This case highlights a key cybersecurity challenge: patches can create new attack surfaces, necessitating a balance between quick fixes and thorough …
  • Audit finds 16% of Japan government IT systems unprepared for attack – Nikkei Asia
    September 13, 2025
    The attack threw government systems into chaos, including airport … Latest on Cybersecurity. Cybersecurity · Mitsubishi Electric eyes top spot …
  • Blockstream sounds the alarm on new email phishing campaign – Cointelegraph
    September 13, 2025
    Typically, this involves a customer service email sent to the target warning of an imminent account closure, theft, cybersecurity breach or some …
  • Cybersecurity summit seeks strategies to keep communities safe – YouTube
    September 13, 2025
    The summit at Metro State University comes on the heels of a major ransomware attack in St … Cybersecurity summit seeks strategies to keep communities …
  • Payment System Vendor Took Year+ to Patch Infinite Card Top-Up Hack: Security Firm
    September 13, 2025
    Cybersecurity News · Webcasts · Virtual Events. ICS: ICS Cybersecurity … An attacker can conduct an attack using a hardware tool such as the …
  • 23AndMe Inks $3.25M Data Breach Deal With Canadian Users – Law360
    September 13, 2025
    … cybersecurity breach, touting the deal as an "excellent result" considering limited funds available and other issues implicated by the company's …
  • Cyberattack attempts on Nevada state websites increased 300% after August ransomware attack
    September 13, 2025
    In This Story. cybersecurity · Joe Lombardo · Nevada · ransomware · ransomware attack · State & Local News · Tech News · Tim Galluzi. Share. Facebook …
  • Undocumented Radios Found in Solar-Powered Devices – Dark Reading
    September 13, 2025
    Related:Water Systems Under Attack … Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and …
Welcome to Locked Dorr Security
  • PRIVACY POLICY
  • TERMS OF USE
  • CONTACT US