• Follow Us

Locked Dorr Security

  • Home
    • Newsletter
    • Locked Dorr Security Blog
  • Cyber News
    • Cyber News
    • Latest Cyber News and Breaches
    • Latest Malware
    • Latest in Scada and Industrial Control
  • Useful Links and How To Posts
    • Staying Up to Date with Cyber
    • Virtulization
      • Set up a “Host Only” Malware Testing Environment in esxi
      • Setting up ProxMox on a Trunk with multiple Interfaces
      • Import vmdk Virtual Disk from OVF into ProxMox
      • Setting Up a SPAN and Linux Bridge for a Network Sensor
    • Remote Management
      • Gl-iNet Travel Router with Wireguard
      • Guacamole Server for Clientless RDP/VNC Access
      • SSH login with Keys: Login without a Password
      • Lab Management with Portainer with DashMachine
    • Linux
      • Managing Linux Firewalls
    • pfSense and Hosting Web Services
      • SSL Offloading with HA Proxy on pfSense
      • Using Cloudflare with Namecheap DNS & Web-hosting Services and pfSense HA Proxy
    • Protecting Network Traffic with Wireguard or VPNs
      • Protecting your network traffic with Wireguard
      • Adding HA Proxy with Wireguard to proxy Network Traffic to pfSense
    • Install Arkime for conducting PCAP Analysis
    • Install Elastiflow Server on Ubuntu 20.04.1 LTS
    • Shutdown multiple Docker Images Gracefully
    • Updating my CTFd Docker Container with local git clones Repositories
    • Useful Links and How To Posts
  • Defensive Cyber
    • Scanning Techniques with NMAP
    • Packet Analysis with Magic Shark
    • Packet Analysis with tshark
    • Packet Analysis with Data Science
  • Hacktivities
    • RouterSpace Write-up on HTB
  • Docs
  • Home
    • - Newsletter
    • - Locked Dorr Security Blog
  • Cyber News
    • - Cyber News
    • - Latest Cyber News and Breaches
    • - Latest Malware
    • - Latest in Scada and Industrial Control
  • Useful Links and How To Posts
    • - Staying Up to Date with Cyber
    • - Virtulization
      • - - Set up a “Host Only” Malware Testing Environment in esxi
      • - - Setting up ProxMox on a Trunk with multiple Interfaces
      • - - Import vmdk Virtual Disk from OVF into ProxMox
      • - - Setting Up a SPAN and Linux Bridge for a Network Sensor
    • - Remote Management
      • - - Gl-iNet Travel Router with Wireguard
      • - - Guacamole Server for Clientless RDP/VNC Access
      • - - SSH login with Keys: Login without a Password
      • - - Lab Management with Portainer with DashMachine
    • - Linux
      • - - Managing Linux Firewalls
    • - pfSense and Hosting Web Services
      • - - SSL Offloading with HA Proxy on pfSense
      • - - Using Cloudflare with Namecheap DNS & Web-hosting Services and pfSense HA Proxy
    • - Protecting Network Traffic with Wireguard or VPNs
      • - - Protecting your network traffic with Wireguard
      • - - Adding HA Proxy with Wireguard to proxy Network Traffic to pfSense
    • - Install Arkime for conducting PCAP Analysis
    • - Install Elastiflow Server on Ubuntu 20.04.1 LTS
    • - Shutdown multiple Docker Images Gracefully
    • - Updating my CTFd Docker Container with local git clones Repositories
    • - Useful Links and How To Posts
  • Defensive Cyber
    • - Scanning Techniques with NMAP
    • - Packet Analysis with Magic Shark
    • - Packet Analysis with tshark
    • - Packet Analysis with Data Science
  • Hacktivities
    • - RouterSpace Write-up on HTB
  • Docs

Latest Malware

  • PoC Exploit Released for Fortinet 0-Day Vulnerability that Allows Remote Code Execution
    June 9, 2025
    A new proof-of-concept (PoC) exploit for a critical zero-day vulnerability affecting multiple Fortinet products raises urgent concerns about the …
  • Security Concerns Raised Over Public Wi-Fi at Crypto Conferences – Binance
    June 8, 2025
    According to Odaily, Kraken's Chief Security Officer, Nick Percoco, has issued a warning about frequent security lapses at cryptocurrency industry …
  • Ukrainian Drones Self-Infect When Captured, Turning Every Crash Into a Digital Ambush
    June 8, 2025
    Ukraine has taken the concept of drone warfare to an entirely new level by equipping their drones with malware that self-infects when captured, …
  • Microsoft files legal action against information-stealing malware Lumma Stealer – MSN
    June 8, 2025
    Microsoft said on Wednesday its Digital Crimes Unit filed a legal action against Lumma Stealer last week, after it found nearly 400000 Windows …
  • Rokid to launch new AR glasses globally on AliExpress during the 618 summer sale
    June 8, 2025
    Chinese AR brand Rokid will launch its new smart glasses globally on AliExpress on June 16, with a US$100 discount during the 618 sale.
  • Cold Wallet's Token Promises 50x ROI and True Decentralization! ETH Rises While Exodus …
    June 8, 2025
    Learn how Ethereum is trending and what the Exodus wallet attack reveals, while Cold Wallet introduces a decentralized platform with total …
  • Cryptostealing Malware Found in Printer Software Highlights Growing Supply Chain Threat
    June 8, 2025
    A concerning cybersecurity incident has shed new light on the potential risks lurking in unexpected hardware—this time, printers. Users of certain …
  • Microsoft's quiet network tool is a hacker's dream, and security software still hasn't caught on
    June 8, 2025
    Malware attack virus alert , malicious software infection , cyber security awareness training to protect business. (Image Credit: TheDigitalArtist …
  • New Mirai botnet infect TBK DVR devices via command injection flaw – Bleeping Computer
    June 8, 2025
    A new variant of the Mirai malware botnet is exploiting a command injection vulnerability in TBK DVR-4104 and DVR-4216 digital video recording …
  • Xiaomi launches new Robot Vacuum S40C with better suction and smarter navigation
    June 8, 2025
    It offers 360° panoramic detection, helping the vacuum to map your home accurately and plan cleaning routes in real time. This means the vacuum can …
  • New Supply Chain Malware Operation Hits npm and PyPI Ecosystems, Targeting Millions Globally
    June 8, 2025
    Supply chain attack infects 16 GlueStack npm packages used by 1M weekly users, enabling malware that steals data and controls systems.
  • Malware-as-a-Service (MaaS): Cybercrime's Subscription Model – Check Point Software
    June 8, 2025
    Learn how Malware-as-a-Service (MaaS) is transforming the cyber threat landscape by making malware delivery available on demand to anyone.
  • U.S. Department of Justice Seeks Forfeiture of $7.74 Million in Cryptocurrency Linked to …
    June 8, 2025
    According to Odaily, the U.S. Department of Justice has initiated a civil forfeiture lawsuit to seize $7.74 million in cryptocurrency allegedly …
  • U.S. Department of Justice Seeks Forfeiture of $7.74 Million in Cryptocurrency Linked to … – Binance
    June 8, 2025
    North Korean Hackers Target Cryptocurrency Sector with New Malware. — … Explore the latest crypto news. ⚡️ Be a part of the latests …
  • 5 Android settings you need to turn off right now because they're a huge security risk
    June 8, 2025
    These default Android settings should get shut down or adjusted in order to keep your phone secure.
  • U.S. Department of Justice Seeks Forfeiture of $7.74 Million in Cryptocurrency Linked to … – Binance
    June 8, 2025
    These individuals are accused of securing employment at U.S. and international companies through fraudulent means. The workers reportedly used false …
  • Kali GPT- AI Assistant That Transforms Penetration Testing on Kali Linux
    June 8, 2025
    Kali GPT, a specialized AI model built on GPT-4 architecture, has been specifically developed to integrate seamlessly with Kali Linux, …
  • Latest news in the world of cryptocurrencies as of early June 2025. | LRCO on Binance Square
    June 8, 2025
    Cybersecurity: North Korean hackers Lazarus are using new malware OtterCookie to attack cryptocurrency specialists. The hack of the Force Bridge …
  • Latest news in the world of cryptocurrencies as of early June 2025. | LRCO on Binance Square
    June 8, 2025
    Bitcoin growth and volatility: Bitcoin is showing impressive results, outperforming major companies like Amazon, Tesla, and Meta. Bitfinex analysts …
  • Cybercriminals love this little-known Microsoft tool a lot – Inkl
    June 8, 2025
    Malware attack virus alert , malicious software infection , cyber security awareness training to protect business. Netsh.exe is the most abused …
Welcome to Locked Dorr Security
  • PRIVACY POLICY
  • TERMS OF USE
  • CONTACT US