• Follow Us

Locked Dorr Security

  • Home
    • Newsletter
    • Locked Dorr Security Blog
  • Cyber News
    • Latest Cyber News and Breaches
    • Latest Malware
    • Latest in Scada and Industrial Control
  • Useful Links and How To Posts
    • Staying Up to Date with Cyber
    • Virtulization
      • Set up a “Host Only” Malware Testing Environment in esxi
      • Setting up ProxMox on a Trunk with multiple Interfaces
      • Import vmdk Virtual Disk from OVF into ProxMox
      • Setting Up a SPAN and Linux Bridge for a Network Sensor
    • Remote Management
      • Gl-iNet Travel Router with Wireguard
      • Guacamole Server for Clientless RDP/VNC Access
      • SSH login with Keys: Login without a Password
      • Lab Management with Portainer with DashMachine
    • Linux
      • Managing Linux Firewalls
    • pfSense and Hosting Web Services
      • SSL Offloading with HA Proxy on pfSense
      • Using Cloudflare with Namecheap DNS & Web-hosting Services and pfSense HA Proxy
    • Protecting Network Traffic with Wireguard or VPNs
      • Protecting your network traffic with Wireguard
      • Adding HA Proxy with Wireguard to proxy Network Traffic to pfSense
    • Install Arkime for conducting PCAP Analysis
    • Install Elastiflow Server on Ubuntu 20.04.1 LTS
    • Shutdown multiple Docker Images Gracefully
    • Updating my CTFd Docker Container with local git clones Repositories
    • Useful Links and How To Posts
  • Defensive Cyber
    • Scanning Techniques with NMAP
    • Packet Analysis with Magic Shark
    • Packet Analysis with tshark
    • Packet Analysis with Data Science
  • Hacktivities
    • RouterSpace Write-up on HTB
  • Docs
  • Home
    • - Newsletter
    • - Locked Dorr Security Blog
  • Cyber News
    • - Latest Cyber News and Breaches
    • - Latest Malware
    • - Latest in Scada and Industrial Control
  • Useful Links and How To Posts
    • - Staying Up to Date with Cyber
    • - Virtulization
      • - - Set up a “Host Only” Malware Testing Environment in esxi
      • - - Setting up ProxMox on a Trunk with multiple Interfaces
      • - - Import vmdk Virtual Disk from OVF into ProxMox
      • - - Setting Up a SPAN and Linux Bridge for a Network Sensor
    • - Remote Management
      • - - Gl-iNet Travel Router with Wireguard
      • - - Guacamole Server for Clientless RDP/VNC Access
      • - - SSH login with Keys: Login without a Password
      • - - Lab Management with Portainer with DashMachine
    • - Linux
      • - - Managing Linux Firewalls
    • - pfSense and Hosting Web Services
      • - - SSL Offloading with HA Proxy on pfSense
      • - - Using Cloudflare with Namecheap DNS & Web-hosting Services and pfSense HA Proxy
    • - Protecting Network Traffic with Wireguard or VPNs
      • - - Protecting your network traffic with Wireguard
      • - - Adding HA Proxy with Wireguard to proxy Network Traffic to pfSense
    • - Install Arkime for conducting PCAP Analysis
    • - Install Elastiflow Server on Ubuntu 20.04.1 LTS
    • - Shutdown multiple Docker Images Gracefully
    • - Updating my CTFd Docker Container with local git clones Repositories
    • - Useful Links and How To Posts
  • Defensive Cyber
    • - Scanning Techniques with NMAP
    • - Packet Analysis with Magic Shark
    • - Packet Analysis with tshark
    • - Packet Analysis with Data Science
  • Hacktivities
    • - RouterSpace Write-up on HTB
  • Docs

Latest Malware

  • New Malware Targeting WooCommerce Sites with Malicious Plugins Steals Credit Card Data
    October 30, 2025
    Advanced malware targets WooCommerce sites, stealing payment data via rogue plugins using encryption, fake images, and hidden backdoors.
  • npm hit by PhantomRaven supply chain attack – The Register
    October 30, 2025
    A new supply chain attack dubbed PhantomRaven has flooded the npm registry with malicious packages that steal credentials, tokens, …
  • Threat Actors Weaponizing Open Source AdaptixC2 Tied to Russian Underworld
    October 30, 2025
    Silent Push last month reported detecting a new malware loader called CountLoader that is associated with Russian ransomware gangs and was observed …
  • Hackers are using these malicious npm packages to target developers Windows, macOS …
    October 30, 2025
    Security experts have issued an alert after ten malicious npm packages were found to deliver infostealer malware across Windows, Linux, …
  • Russian Hackers Exploit Adaptix Pentesting Tool in Ransomware Attacks – Hackread
    October 30, 2025
    The investigation began when Silent Push researchers were tracking a new malware loader called CountLoader. During that work, they noticed Adaptix …
  • The latest Steam beta adds 'a suspicious chat warning' when you receive a potentially … – PC Gamer
    October 30, 2025
    Players can emulate others through similar profile pictures or usernames, so it's not out of the question to think bad actors could fake credentials …
  • ThreatsDay Bulletin: DNS Poisoning Flaw, Supply-Chain Heist, Rust Malware Trick and New …
    October 30, 2025
    Threat actors refine tactics with DNS attacks, new RATs, and Rust-based malware. Stay ahead with this week's top ThreatsDay intelligence brief.
  • Resistance to Google's Android verification grows among developers – Techzine Global
    October 30, 2025
    The open letter also emphasizes that the registration requirement could have consequences for digital sovereignty and free software development.
  • Talk about geriatric – This devious Android malware escapes detection by typing like an old person
    October 30, 2025
    Herodotus. Security researchers Threat Fabric recently discovered a brand new Android malware, named after the famous Greek historian, that includes a …
  • Microsoft: DNS outage impacts Azure and Microsoft 365 services – Bleeping Computer
    October 30, 2025
    Microsoft is suffering an ongoing DNS outage affecting customers worldwide, preventing them from logging into company networks and accessing …
  • McCrary report flags China's escalating cyber tactics, warns of Typhoon cyber threats to US …
    October 30, 2025
    A new report from the McCrary Institute for Cyber and Critical Infrastructure Security at Auburn University detailed that in recent years, …
  • Hackers Use NFC Relay Malware to Clone Tap-to-Pay Android Transactions – Hackread
    October 30, 2025
    A new investigation from mobile security firm Zimperium has revealed a fast-growing cybersecurity threat targeting Android users through their …
  • ISP BT to Launch New AI Anti-Virus Service for Small UK Businesses
    October 30, 2025
    Broadband and telecoms giant BT has announced that they've partnered with cloud-based cybersecurity firm CrowdStrike to launch a new AI-powered …
  • This Android malware mimics human input to mask its nefarious intent
    October 30, 2025
    A new Android malware called Herodotus has been discovered, and it has some potentially damaging capabilities. Malware is nothing new to the world …
  • Notorious cybercriminals target execs using AI-driven tools – IT-Online
    October 30, 2025
    Kaspersky's Global Research and Analysis Team (GReAT) has revealed the latest BlueNoroff APT activity through two highly targeted malicious campaigns …
  • Cybersecurity Awareness Month: Staying ahead of evolving phishing threats
    October 30, 2025
    Phishing remains one of the most reliable, profitable and widespread attack methods for cybercriminals. Today's attackers have expanded their reach …
  • Kaspersky exposes new BlueNoroff campaigns targeting Web3 firms – Gulf Business
    October 30, 2025
    At the Security Analyst Summit in Thailand, Kaspersky's Global Research and Analysis Team (GReAT) revealed the latest wave of BlueNoroff APT …
  • Microsoft, OpenAI Sign New AI Deal, Paving Way for More Investments – PCMag Australia
    October 30, 2025
    Microsoft emerges as the winner with significant concessions that make its original OpenAI investment well worthwhile.
  • Herodotus Android Trojan Mimics Human Input to Evade Banking Fraud Detection
    October 30, 2025
    In the ever-evolving world of cybersecurity threats, a new Android malware strain named Herodotus is raising alarms among experts for its cunning …
  • Suspected Nation-State Threat Actor Uses New Airstalk Malware in a Supply Chain Attack
    October 29, 2025
    Malware · Threat Research. Tags Icon. Tags: .NET · CL-STA-1009 · Malicious PowerShell scripts · Supply …
Welcome to Locked Dorr Security
  • PRIVACY POLICY
  • TERMS OF USE
  • CONTACT US