• Follow Us

Locked Dorr Security

  • Home
    • Newsletter
    • Locked Dorr Security Blog
  • Cyber News
    • Latest Cyber News and Breaches
    • Latest Malware
    • Latest in Scada and Industrial Control
  • Useful Links and How To Posts
    • Staying Up to Date with Cyber
    • Virtulization
      • Set up a “Host Only” Malware Testing Environment in esxi
      • Setting up ProxMox on a Trunk with multiple Interfaces
      • Import vmdk Virtual Disk from OVF into ProxMox
      • Setting Up a SPAN and Linux Bridge for a Network Sensor
    • Remote Management
      • Gl-iNet Travel Router with Wireguard
      • Guacamole Server for Clientless RDP/VNC Access
      • SSH login with Keys: Login without a Password
      • Lab Management with Portainer with DashMachine
    • Linux
      • Managing Linux Firewalls
    • pfSense and Hosting Web Services
      • SSL Offloading with HA Proxy on pfSense
      • Using Cloudflare with Namecheap DNS & Web-hosting Services and pfSense HA Proxy
    • Protecting Network Traffic with Wireguard or VPNs
      • Protecting your network traffic with Wireguard
      • Adding HA Proxy with Wireguard to proxy Network Traffic to pfSense
    • Install Arkime for conducting PCAP Analysis
    • Install Elastiflow Server on Ubuntu 20.04.1 LTS
    • Shutdown multiple Docker Images Gracefully
    • Updating my CTFd Docker Container with local git clones Repositories
    • Useful Links and How To Posts
  • Defensive Cyber
    • Scanning Techniques with NMAP
    • Packet Analysis with Magic Shark
    • Packet Analysis with tshark
    • Packet Analysis with Data Science
  • Hacktivities
    • RouterSpace Write-up on HTB
  • Docs
  • Home
    • - Newsletter
    • - Locked Dorr Security Blog
  • Cyber News
    • - Latest Cyber News and Breaches
    • - Latest Malware
    • - Latest in Scada and Industrial Control
  • Useful Links and How To Posts
    • - Staying Up to Date with Cyber
    • - Virtulization
      • - - Set up a “Host Only” Malware Testing Environment in esxi
      • - - Setting up ProxMox on a Trunk with multiple Interfaces
      • - - Import vmdk Virtual Disk from OVF into ProxMox
      • - - Setting Up a SPAN and Linux Bridge for a Network Sensor
    • - Remote Management
      • - - Gl-iNet Travel Router with Wireguard
      • - - Guacamole Server for Clientless RDP/VNC Access
      • - - SSH login with Keys: Login without a Password
      • - - Lab Management with Portainer with DashMachine
    • - Linux
      • - - Managing Linux Firewalls
    • - pfSense and Hosting Web Services
      • - - SSL Offloading with HA Proxy on pfSense
      • - - Using Cloudflare with Namecheap DNS & Web-hosting Services and pfSense HA Proxy
    • - Protecting Network Traffic with Wireguard or VPNs
      • - - Protecting your network traffic with Wireguard
      • - - Adding HA Proxy with Wireguard to proxy Network Traffic to pfSense
    • - Install Arkime for conducting PCAP Analysis
    • - Install Elastiflow Server on Ubuntu 20.04.1 LTS
    • - Shutdown multiple Docker Images Gracefully
    • - Updating my CTFd Docker Container with local git clones Repositories
    • - Useful Links and How To Posts
  • Defensive Cyber
    • - Scanning Techniques with NMAP
    • - Packet Analysis with Magic Shark
    • - Packet Analysis with tshark
    • - Packet Analysis with Data Science
  • Hacktivities
    • - RouterSpace Write-up on HTB
  • Docs

Latest Malware

  • DeepMind's latest AI tool wants to detect and repair software vulnerabilities before they get attacked
    October 7, 2025
    The developers also acknowledge the growing use of AI by malicious actors and argue that defenders need equivalent tools. DeepMind plans to expand …
  • Google won't fix new ASCII smuggling attack in Gemini – Bleeping Computer
    October 7, 2025
    LLMs instructed to browse websites can also stumble upon hidden payloads in product descriptions and feed them with malicious URLs to convey to users.
  • OpenAI: Threat actors use us to be efficient, not make new tools | CyberScoop
    October 7, 2025
    A new report from the leader in the generative AI boom says AI is being used in existing workflows, instead of to create new ones dedicated to …
  • OpenAI bans suspected China-linked accounts for seeking surveillance proposals
    October 7, 2025
    … monitor social media conversations.In its latest public threat report, OpenAI said some individuals had asked its chatbot to outline social me…
  • Researchers track Cavalry Werewolf custom malware attacks on Russian government …
    October 7, 2025
    Malware, Phishing & Ransomware · News · Reports · Threat Landscape. Researchers track Cavalry Werewolf custom malware attacks on Russian government …
  • 13-Year-Old RediShell Vulnerability Puts 60,000 Redis Servers at Risk – Hackread
    October 7, 2025
    This level of access can allow theft of data, installation of malware, or the use of compromised servers for additional attacks. Cybersecurity …
  • Malwarebytes shifts to people-based protection with new security plans – BetaNews
    October 7, 2025
    Malware shield. Malwarebytes has introduced a new range of security packages designed to protect individuals and families based on the number of …
  • BatShadow Group Uses New Go-Based 'Vampire Bot' Malware to Hunt Job Seekers
    October 7, 2025
    A Vietnamese threat actor named BatShadow has been attributed to a new campaign that leverages social engineering tactics to deceive job seekers …
  • Prime Big Deal Days are here! – Komando.com
    October 7, 2025
    ⚡ Portable power station (50% off): Save $400 and don't get left in the dark when the first winter storm hits. Cordless car vacuum (50% off): No cords …
  • Medusa Ransomware Exploiting GoAnywhere MFT Flaw, Confirms Microsoft – Hackread
    October 7, 2025
    … ransomware group, according to a latest update from Microsoft. The flaw … Malware · Security · Jackpotting attacks hit U.S. ATMs; spit out cash …
  • 10 new movies and shows to stream (Oct 7–14, 2025) – CyberGuy
    October 7, 2025
    Check out family-friendly movies like How to Train Your Dragon and relaity baking shows like Is It Cake? Halloween this week.
  • This infamous ransomware has returned, and it's more dangerous than ever – TechRadar
    October 7, 2025
    XWorm resurfaces with versions 6.0–6.5, now maintained by alias XCoderTools · Malware includes RAT, ransomware, data theft, DoS, and over 35 modular …
  • The Invisible Threat: How Polymorphic Malware is Outsmarting Your Email Security
    October 7, 2025
    Join this webinar with James McQuiggan, CISO Advisor at KnowBe4, for insights and strategies to strengthen your security framework against …
  • Redefining Security Validation with AI-Powered Breach and Attack Simulation
    October 7, 2025
    Security teams are drowning in threat intelligence. Every day brings with it reports of new malware campaigns, novel C2 channels, bespoke evasion …
  • Researchers Reversed Asgard Malware Protector to Uncover it's Antivirus Bypass Techniques
    October 7, 2025
    In recent months, security researchers have turned their attention to Asgard Protector, a sophisticated crypter employed by cybercriminals to …
  • Microsoft: GoAnywhere MFT Flaw Fuels Medusa Ransomware – Petri IT Knowledgebase
    October 7, 2025
    Medusa ransomware group exploits a new GoAnywhere MFT vulnerability for large-scale attacks. · Microsoft links the flaw to remote code execution and …
  • Researchers Uncover 13-Yr-Old Redis Flaw Impacting 330,000 Instances
    October 7, 2025
    Also read: New Malware 'Redigo' Detected, Exploits Redis Servers … Bagwe has nearly half a decade of experience in reporting on the latest …
  • Threat Actors Behind WARMCOOKIE Malware Added New Features to It's Arsenal
    October 7, 2025
    Beyond simple command handlers, the malware now incorporates new capabilities to launch executables, DLLs, and PowerShell scripts on demand. Each …
  • The Malware That Couldn't Be Killed 'XWorm' Returns As A Fully Functional Ransomware
    October 7, 2025
    The XWorm malware resurfaces with a ransomware module and over 35 plugins for data theft and remote control. New criminal groups are using the …
  • Cl0p Ransomware Exploiting Oracle E-Business Suite 0-Day in Active Attacks – Cyber Press
    October 7, 2025
    … ransomware tactics. CVEs in the Latest Campaign. CVE Identifier, Affected Component, CVSS Score, Impact. CVE-2025-61882, BI Publisher Integration, 9.8 …
Welcome to Locked Dorr Security
  • PRIVACY POLICY
  • TERMS OF USE
  • CONTACT US