• Follow Us

Locked Dorr Security

  • Home
    • Newsletter
    • Locked Dorr Security Blog
  • Cyber News
    • Latest Cyber News and Breaches
    • Latest Malware
    • Latest in Scada and Industrial Control
  • Useful Links and How To Posts
    • Staying Up to Date with Cyber
    • Virtulization
      • Set up a “Host Only” Malware Testing Environment in esxi
      • Setting up ProxMox on a Trunk with multiple Interfaces
      • Import vmdk Virtual Disk from OVF into ProxMox
      • Setting Up a SPAN and Linux Bridge for a Network Sensor
    • Remote Management
      • Gl-iNet Travel Router with Wireguard
      • Guacamole Server for Clientless RDP/VNC Access
      • SSH login with Keys: Login without a Password
      • Lab Management with Portainer with DashMachine
    • Linux
      • Managing Linux Firewalls
    • pfSense and Hosting Web Services
      • SSL Offloading with HA Proxy on pfSense
      • Using Cloudflare with Namecheap DNS & Web-hosting Services and pfSense HA Proxy
    • Protecting Network Traffic with Wireguard or VPNs
      • Protecting your network traffic with Wireguard
      • Adding HA Proxy with Wireguard to proxy Network Traffic to pfSense
    • Install Arkime for conducting PCAP Analysis
    • Install Elastiflow Server on Ubuntu 20.04.1 LTS
    • Shutdown multiple Docker Images Gracefully
    • Updating my CTFd Docker Container with local git clones Repositories
    • Useful Links and How To Posts
  • Defensive Cyber
    • Scanning Techniques with NMAP
    • Packet Analysis with Magic Shark
    • Packet Analysis with tshark
    • Packet Analysis with Data Science
  • Hacktivities
    • RouterSpace Write-up on HTB
  • Docs
  • Home
    • - Newsletter
    • - Locked Dorr Security Blog
  • Cyber News
    • - Latest Cyber News and Breaches
    • - Latest Malware
    • - Latest in Scada and Industrial Control
  • Useful Links and How To Posts
    • - Staying Up to Date with Cyber
    • - Virtulization
      • - - Set up a “Host Only” Malware Testing Environment in esxi
      • - - Setting up ProxMox on a Trunk with multiple Interfaces
      • - - Import vmdk Virtual Disk from OVF into ProxMox
      • - - Setting Up a SPAN and Linux Bridge for a Network Sensor
    • - Remote Management
      • - - Gl-iNet Travel Router with Wireguard
      • - - Guacamole Server for Clientless RDP/VNC Access
      • - - SSH login with Keys: Login without a Password
      • - - Lab Management with Portainer with DashMachine
    • - Linux
      • - - Managing Linux Firewalls
    • - pfSense and Hosting Web Services
      • - - SSL Offloading with HA Proxy on pfSense
      • - - Using Cloudflare with Namecheap DNS & Web-hosting Services and pfSense HA Proxy
    • - Protecting Network Traffic with Wireguard or VPNs
      • - - Protecting your network traffic with Wireguard
      • - - Adding HA Proxy with Wireguard to proxy Network Traffic to pfSense
    • - Install Arkime for conducting PCAP Analysis
    • - Install Elastiflow Server on Ubuntu 20.04.1 LTS
    • - Shutdown multiple Docker Images Gracefully
    • - Updating my CTFd Docker Container with local git clones Repositories
    • - Useful Links and How To Posts
  • Defensive Cyber
    • - Scanning Techniques with NMAP
    • - Packet Analysis with Magic Shark
    • - Packet Analysis with tshark
    • - Packet Analysis with Data Science
  • Hacktivities
    • - RouterSpace Write-up on HTB
  • Docs

Latest Malware

  • OpenClaw and Claude Opus 4.6: Where is AI agent security headed? – IBM
    February 11, 2026
    15:05 – Move fast. Break security? 27:29 – Notepad++ breach; 38:55 – DragonForce ransomware cartel. The opinions expressed in this podcast are solely …
  • Frontier AI emerges as a new workplace hazard | Canadian Occupational Safety
    February 11, 2026
    According to the report, AI systems can “discover software vulnerabilities and write malicious code”, and in one competition an AI agent “identified …
  • LummaStealer returns using CastleLoader to bypass detection – CyberInsider
    February 11, 2026
    In these cases, users willingly execute the malware, believing it to be legitimate content. One of the observed infection chains. Bitdefender.
  • New Linux botnet SSHStalker uses old-school IRC for C2 comms – Bleeping Computer
    February 11, 2026
    Next, the malware fetches archives named GS and bootbou, which contain bot variants for orchestration and execution sequencing. Persistence is …
  • Deepfakes Meet Malware: North Korean Hackers Weaponize AI-Generated Video in …
    February 11, 2026
    North Korean hackers are deploying AI-generated video content to distribute cross-platform malware targeting macOS and Windows users, marking a …
  • Executive Travel Demands a New Approach to Mobile Security – Cybersecurity Insiders
    February 11, 2026
    Mobile threats are accelerating, driven by phishing variants like smishing, malicious applications, and increasingly sophisticated malware. For …
  • Malware can now “play dead” to evade security – Digit.fyi
    February 11, 2026
    Researchers uncovered highly sophisticated malware displaying some disturbing, never-before-seen characteristics, which allowed the malicious software …
  • North Korean hackers use AI-generated video to deliver malware for macOS and Windows
    February 11, 2026
    … Latest in Security. malware. Beware, this fake site offers up a malicious 7-Zip installer laced with malware · LastPass. 'It's easier to tell them …
  • Windows shortcut files targeted by ransomware gang Global Group – Computerworld
    February 11, 2026
    Cybercrime Malware Ransomware news. Newly discovered malicious extensions could be lurking in enterprise browsers. By Shweta Sharma. Dec 2, 2025 4 …
  • Malicious 7-Zip site distributes installer laced with proxy tool – Bleeping Computer
    February 11, 2026
    Residential proxy networks use home user devices to route traffic with the goal of evading blocks and performing various malicious activities such as …
  • Mispadu Phishing Malware Baseline: Delivery Chains, Capabilities, and Common Campaigns
    February 11, 2026
    At the time, it was a relatively simplistic malware that was primarily delivered via malicious advertisements, notably those for McDonald's coupons.
  • The game is over: when “free” comes at too high a price. What we know about RenEngine
    February 11, 2026
    This is a relatively new means of delivering and deploying malicious implants. A distinctive feature of this malware family is its modularity and …
  • North Korean hackers deploy arsenal of six new malware in espionage campaign | NK PRO
    February 11, 2026
    North Korean cybercriminals have deployed a wave of new malware in a campaign to collect data for future cryptocurrency heists, using artificial …
  • Google Cloud flags North Korea-linked crypto malware campaign – TradingView
    February 11, 2026
    North Korea-linked threat actors are escalating social engineering campaigns targeting cryptocurrency and fintech companies, deploying new malware …
  • North Korea-Linked UNC1069 Uses AI Lures to Attack Cryptocurrency Organizations
    February 11, 2026
    UNC1069 targets crypto firms via Telegram lures, fake Zoom meetings, and multi-stage malware to steal credentials, browser data, and funds.
  • North Korean actors blend ClickFix with new macOS backdoors in Crypto campaign
    February 11, 2026
    Latest · Newsletters · Resources · Buyer's Guides · Events. About. About Us … Cybercrime Malware Ransomware News. Pretend Disk Format: PDFs harbor new …
  • CTIX FLASH Update – February 10, 2026 – Lexology
    February 11, 2026
    Malware Activity. Large-Scale Cloud Attacks and Stealthy Espionage Tools. Recent cybersecurity reports reveal two significant threats.
  • North Korean hackers use new macOS malware in crypto-theft attacks – Bleeping Computer
    February 11, 2026
    North Korean hackers are running tailored campaigns using AI-generated video and the ClickFix technique to deliver malware for macOS and Windows …
  • Pride Month Phishing Targets Employees via Trusted Email Services – Hackread
    February 11, 2026
    Attackers are using Pride Month themed phishing emails to target employees worldwide, abusing trusted email platforms like SendGrid to harvest …
  • Bitdefender Threat Debrief | February 2026
    February 10, 2026
    The 0APT Ransomware Hoax: A New Threat Sounds a False Alarm . … Most critical attacks aren't “malware-first" anymore—they're credential-first.
Welcome to Locked Dorr Security
  • PRIVACY POLICY
  • TERMS OF USE
  • CONTACT US