• Follow Us

Locked Dorr Security

  • Home
    • Newsletter
    • Locked Dorr Security Blog
  • Cyber News
    • Latest Cyber News and Breaches
    • Latest Malware
    • Latest in Scada and Industrial Control
  • Useful Links and How To Posts
    • Staying Up to Date with Cyber
    • Virtulization
      • Set up a “Host Only” Malware Testing Environment in esxi
      • Setting up ProxMox on a Trunk with multiple Interfaces
      • Import vmdk Virtual Disk from OVF into ProxMox
      • Setting Up a SPAN and Linux Bridge for a Network Sensor
    • Remote Management
      • Gl-iNet Travel Router with Wireguard
      • Guacamole Server for Clientless RDP/VNC Access
      • SSH login with Keys: Login without a Password
      • Lab Management with Portainer with DashMachine
    • Linux
      • Managing Linux Firewalls
    • pfSense and Hosting Web Services
      • SSL Offloading with HA Proxy on pfSense
      • Using Cloudflare with Namecheap DNS & Web-hosting Services and pfSense HA Proxy
    • Protecting Network Traffic with Wireguard or VPNs
      • Protecting your network traffic with Wireguard
      • Adding HA Proxy with Wireguard to proxy Network Traffic to pfSense
    • Install Arkime for conducting PCAP Analysis
    • Install Elastiflow Server on Ubuntu 20.04.1 LTS
    • Shutdown multiple Docker Images Gracefully
    • Updating my CTFd Docker Container with local git clones Repositories
    • Useful Links and How To Posts
  • Defensive Cyber
    • Scanning Techniques with NMAP
    • Packet Analysis with Magic Shark
    • Packet Analysis with tshark
    • Packet Analysis with Data Science
  • Hacktivities
    • RouterSpace Write-up on HTB
  • Docs
  • Home
    • - Newsletter
    • - Locked Dorr Security Blog
  • Cyber News
    • - Latest Cyber News and Breaches
    • - Latest Malware
    • - Latest in Scada and Industrial Control
  • Useful Links and How To Posts
    • - Staying Up to Date with Cyber
    • - Virtulization
      • - - Set up a “Host Only” Malware Testing Environment in esxi
      • - - Setting up ProxMox on a Trunk with multiple Interfaces
      • - - Import vmdk Virtual Disk from OVF into ProxMox
      • - - Setting Up a SPAN and Linux Bridge for a Network Sensor
    • - Remote Management
      • - - Gl-iNet Travel Router with Wireguard
      • - - Guacamole Server for Clientless RDP/VNC Access
      • - - SSH login with Keys: Login without a Password
      • - - Lab Management with Portainer with DashMachine
    • - Linux
      • - - Managing Linux Firewalls
    • - pfSense and Hosting Web Services
      • - - SSL Offloading with HA Proxy on pfSense
      • - - Using Cloudflare with Namecheap DNS & Web-hosting Services and pfSense HA Proxy
    • - Protecting Network Traffic with Wireguard or VPNs
      • - - Protecting your network traffic with Wireguard
      • - - Adding HA Proxy with Wireguard to proxy Network Traffic to pfSense
    • - Install Arkime for conducting PCAP Analysis
    • - Install Elastiflow Server on Ubuntu 20.04.1 LTS
    • - Shutdown multiple Docker Images Gracefully
    • - Updating my CTFd Docker Container with local git clones Repositories
    • - Useful Links and How To Posts
  • Defensive Cyber
    • - Scanning Techniques with NMAP
    • - Packet Analysis with Magic Shark
    • - Packet Analysis with tshark
    • - Packet Analysis with Data Science
  • Hacktivities
    • - RouterSpace Write-up on HTB
  • Docs

Latest Cyber News and Breaches

  • Cybersecurity Breach at Central Maine Healthcare Exposes Patient Data – Binance
    January 23, 2026
    Central Maine Healthcare has reported a cybersecurity breach that occurred between March and June 2025, compromising the personal and health …
  • Cyber Risk in 2026: From Today's Pressures to Tomorrow's Threats | Bitsight
    January 23, 2026
    Then we'll turn the lens forward to explore what's next: how expanding attack … What cybersecurity leaders say is their #1 priority for 2026 …
  • CT credit union hit with proposed class-action lawsuit over data breach … – Hartford Business Journal
    January 23, 2026
    … breach that affected more than 17600 people last year … cybersecurity measures and failing to promptly alert customers. It also …
  • Gavin Newsom takes another swipe at Trump with updated fraud 'tracker' | StateScoop
    January 23, 2026
    But at Davos early in the week, Trump did not directly attack … cybersecurity, IT governance and artificial intelligence. colin.wood …
  • DE&TH to Vulnerabilities: Huntress Catches SmarterMail Account Takeover Leading to RCE
    January 22, 2026
    … attack. Request. Purpose. POST /api/v1/auth/force-reset-password. Exploits … down arrow. BlogResource CenterCybersecurity 101Upcoming EventsSupport …
  • Diversified Business Services Data Breach Claims Investigated by Lynch Carpenter
    January 22, 2026
    … breach class action cybersecurity attack hacked leaked personal information it security Class Action. Related Links. DBS data breach form · LC News …
  • databreach #cybersecurity #incidentresponse #securitybreach #cybercrime #dataprotection …
    January 22, 2026
    Follow Hoplin Infosec for real world cybersecurity tips and breach response guides. … How Penetration Testing Saves Millions Before the Attack Happens.
  • Under Armour looking into data breach affecting customers' email addresses – ABC News
    January 22, 2026
    The breach is believed to have happened late last year, and affected 72 million email addresses, according to information cited by the cybersecurity …
  • Preparing for the post-quantum era of cybersecurity – Intelligent CISO
    January 22, 2026
    Preparing for the post-quantum era of cybersecurity. Bill Tanner … attack capabilities never seen before. Considerations like these led to …
  • MITRE introduces ESTM 3.0 to protect embedded systems across critical infrastructure
    January 22, 2026
    … attack path analysis, and its alignment with established cybersecurity frameworks ensures seamless integration with existing security practices.
  • and that's why cybersecurity matters. This 6-month program is designed to train you beyond …
    January 22, 2026
    1 likes, 0 comments – stonetech.academy on January 22, 2026: "One breach can shut down an entire business — and that's why cybersecurity matters.
  • The Real Attack Surface Isn't Code Anymore — It's Business Users
    January 22, 2026
    Yair Finzi, co-founder and CEO of Nokod Security, is a technology entrepreneur with more than 15 years of experience in cybersecurity. Prior to …
  • Update on the OSB's Cybersecurity Initiative – Canada.ca
    January 22, 2026
    Growing cybersecurity threats and rising fraud in Canada underscore … breach or attempted breach occurs. In the meantime, LITs are required …
  • House hearing exposes threats to U.S. transportation, CDL system – Land Line Media
    January 22, 2026
    Whether it concerns cybersecurity or commercial driver's licenses, the United States needs to take control. … “We're already under attack …
  • AI surge exposes cloud security gaps, report warns – New Zealand
    January 22, 2026
    … attack surface at a speed that outpaces traditional security … As the time between vulnerability and attack narrows, 66% of cybersecurity …
  • $1M Community First Medical Center data breach class action settlement
    January 22, 2026
    Digital security concept illustrating a cybersecurity breach. (Photo Credit: Digineer Station/Shutterstock). Community First Medical Center agreed …
  • New Wave of Attacks Targeting FortiGate Firewalls – SecurityWeek
    January 22, 2026
    Cybersecurity News · Webcasts · Virtual Events. ICS: ICS Cybersecurity … Old Attack, New Speed: Researchers Optimize Page Cache Exploits · Webinar …
  • I scan, you scan, we all scan for… knowledge? – Cisco Talos Blog
    January 22, 2026
    The attack involves approaching high-value individuals through messages … cybersecurity's overwhelming (and sometimes most controversial) topics.
  • Cybersecurity for Operational Technology Networks – Guidance and Opportunity
    January 22, 2026
    Cybersecurity for Operational Technology Networks – Guidance and Opportunity … attack surface management (EASM) tools to identify accidental or …
  • A Cyber-Resilient UAV Swarm Framework for Fire-Fighting with AI-Based In-Flight Defect Inspection
    January 22, 2026
    … attack success rates, early detection of drone … Cybersecurity, MITM Attack Mitigation, Secure Routing, GNS3 Simulation, Amazon Rekognition.
Welcome to Locked Dorr Security
  • PRIVACY POLICY
  • TERMS OF USE
  • CONTACT US