• Follow Us

Locked Dorr Security

  • Home
    • Newsletter
    • Locked Dorr Security Blog
  • Cyber News
    • Latest Cyber News and Breaches
    • Latest Malware
    • Latest in Scada and Industrial Control
  • Useful Links and How To Posts
    • Staying Up to Date with Cyber
    • Virtulization
      • Set up a “Host Only” Malware Testing Environment in esxi
      • Setting up ProxMox on a Trunk with multiple Interfaces
      • Import vmdk Virtual Disk from OVF into ProxMox
      • Setting Up a SPAN and Linux Bridge for a Network Sensor
    • Remote Management
      • Gl-iNet Travel Router with Wireguard
      • Guacamole Server for Clientless RDP/VNC Access
      • SSH login with Keys: Login without a Password
      • Lab Management with Portainer with DashMachine
    • Linux
      • Managing Linux Firewalls
    • pfSense and Hosting Web Services
      • SSL Offloading with HA Proxy on pfSense
      • Using Cloudflare with Namecheap DNS & Web-hosting Services and pfSense HA Proxy
    • Protecting Network Traffic with Wireguard or VPNs
      • Protecting your network traffic with Wireguard
      • Adding HA Proxy with Wireguard to proxy Network Traffic to pfSense
    • Install Arkime for conducting PCAP Analysis
    • Install Elastiflow Server on Ubuntu 20.04.1 LTS
    • Shutdown multiple Docker Images Gracefully
    • Updating my CTFd Docker Container with local git clones Repositories
    • Useful Links and How To Posts
  • Defensive Cyber
    • Scanning Techniques with NMAP
    • Packet Analysis with Magic Shark
    • Packet Analysis with tshark
    • Packet Analysis with Data Science
  • Hacktivities
    • RouterSpace Write-up on HTB
  • Docs
  • Home
    • - Newsletter
    • - Locked Dorr Security Blog
  • Cyber News
    • - Latest Cyber News and Breaches
    • - Latest Malware
    • - Latest in Scada and Industrial Control
  • Useful Links and How To Posts
    • - Staying Up to Date with Cyber
    • - Virtulization
      • - - Set up a “Host Only” Malware Testing Environment in esxi
      • - - Setting up ProxMox on a Trunk with multiple Interfaces
      • - - Import vmdk Virtual Disk from OVF into ProxMox
      • - - Setting Up a SPAN and Linux Bridge for a Network Sensor
    • - Remote Management
      • - - Gl-iNet Travel Router with Wireguard
      • - - Guacamole Server for Clientless RDP/VNC Access
      • - - SSH login with Keys: Login without a Password
      • - - Lab Management with Portainer with DashMachine
    • - Linux
      • - - Managing Linux Firewalls
    • - pfSense and Hosting Web Services
      • - - SSL Offloading with HA Proxy on pfSense
      • - - Using Cloudflare with Namecheap DNS & Web-hosting Services and pfSense HA Proxy
    • - Protecting Network Traffic with Wireguard or VPNs
      • - - Protecting your network traffic with Wireguard
      • - - Adding HA Proxy with Wireguard to proxy Network Traffic to pfSense
    • - Install Arkime for conducting PCAP Analysis
    • - Install Elastiflow Server on Ubuntu 20.04.1 LTS
    • - Shutdown multiple Docker Images Gracefully
    • - Updating my CTFd Docker Container with local git clones Repositories
    • - Useful Links and How To Posts
  • Defensive Cyber
    • - Scanning Techniques with NMAP
    • - Packet Analysis with Magic Shark
    • - Packet Analysis with tshark
    • - Packet Analysis with Data Science
  • Hacktivities
    • - RouterSpace Write-up on HTB
  • Docs

Latest Malware

  • Newly identified ransomware can execute total takeover of compromised devices
    December 11, 2025
    Droidlock, a new type of malware more accurately classified as ransomware, has the ability to lock device screens with a ransomware-like overlay …
  • DroidLock malware locks you out of your Android device and demands ransom
    December 11, 2025
    Researchers have found Android malware that holds your files and your device hostage until you pay the ransom.
  • Notepad++ Vulnerability Let Attackers Hijack Network Traffic to Install Malware via Updates
    December 11, 2025
    The popular text editor Notepad++ has addressed a severe security weakness in its update mechanism that could allow attackers to hijack network …
  • New ransomware locks Android devices and can also erase data – how to avoid this malware
    December 11, 2025
    Green skull on smartphone screen. (Image credit: Shutterstock). Newly discovered malware DroidLock can wreak havoc on your Android phone, taking …
  • New 'DroidLock' Android Malware Locks Users Out, Spies via Front Camera – Hackread
    December 11, 2025
    Vishnu Pratapagiri, Zimperium's security researcher and report author, noted that the malware acts much like ransomware (software that locks your …
  • Malware Discovered in 19 Visual Studio Code Extensions – Infosecurity Magazine
    December 11, 2025
    A new campaign involving 19 malicious Visual Studio Code extensions used a legitimate npm package to embed malware in dependency folders.
  • NANOREMOTE Malware Uses Google Drive API for Hidden Control on Windows Systems
    December 11, 2025
    Researchers detail NANOREMOTE, a Windows backdoor using Google Drive API for covert control and data theft.
  • Latest macOS malware uses trusted search & AI to dupe users – AppleInsider
    December 11, 2025
    A new Atomic macOS Stealer (AMOS) attack vector weaponizes Google searches and a user's trust in AI chatbots, researchers have found.
  • Malwarebytes Launches New Enhanced Mac Scan Engine for Smarter, Deeper macOS …
    December 11, 2025
    PR Newswire. SANTA CLARA, Calif., Dec. 11, 2025. New scan options and external drive scanning help detect and block infostealers, …
  • Malwarebytes for Mac now has smarter, deeper scans
    December 11, 2025
    We've given our Mac scan engine a serious intelligence boost, so it thinks faster and digs deeper. The new enhanced scan searches across more of your …
  • Malwarebytes Launches New Enhanced Mac Scan Engine for Smarter, Deeper macOS …
    December 11, 2025
    PRNewswire/ — Malwarebytes, a global leader in online protection, launched a new enhanced scan engine for Mac users that provides deeper coverage …
  • PyStoreRAT: A New AI-Driven Supply Chain Malware Campaign Targeting IT & OSINT Professionals
    December 11, 2025
    Morphisec Threat Labs has uncovered a coordinated malware operation abusing GitHub in a way that stands apart from typical opportunistic campaigns …
  • 'PyStoreRAT' malware uses fake developer tools on GitHub to infect Windows systems
    December 11, 2025
    PyStoreRAT uses malicious repositories that are often visually convincing, including polished README files, artificial intelligence-generated graphics …
  • ThreatsDay Bulletin: Spyware Alerts, Mirai Strikes, Docker Leaks, ValleyRAT Rootkit
    December 11, 2025
    The latest ThreatsDay Bulletin breaks down the week's biggest stories — rootkits evading Windows, Docker leaks, AI risks and global surveillance …
  • Hamas-Affiliated Ashen Lepus Targets Middle Eastern Diplomatic Entities With New AshTag …
    December 11, 2025
    Hamas-affiliated threat actor Ashen Lepus (aka WIRTE) is conducting espionage with its new AshTag malware suite against Middle Eastern government …
  • New Multi-Platform 01flip Ransomware Supports Multi-platform Architecture, Including …
    December 11, 2025
    Rust-based 01flip ransomware targets Windows and Linux, hitting APAC infrastructure with a new cross-platform, hard-to-detect threat.
  • Trend Micro issues warning over rise of 'vibe crime' as cyber criminals turn to agentic AI to …
    December 11, 2025
    Trend Micro is warning of a boom in 'vibe crime' – the use of agentic AI to support fully-automated cyber criminal operations and accelerate …
  • CastleLoader Malware Now Uses Python Loader to Bypass Security – Hackread
    December 11, 2025
    Cybersecurity researchers at Blackpoint Cyber discovered a new, evasive CastleLoader malware variant using Python and ClickFix social engineering to …
  • Trend Micro research claims an increase in 'Vibe Crime' – Cybersecurity Insiders
    December 11, 2025
    For those unfamiliar with the term, Vibe Crime refers to the increasing reliance on advanced AI technologies by cybercriminals to orchestrate attacks.
  • CTIX FLASH Update – December 10, 2025 – Lexology
    December 11, 2025
    Recent reports reveal alarming advancements in cybersecurity threats. The spyware company Intellexa has created a highly covert infection method…
Welcome to Locked Dorr Security
  • PRIVACY POLICY
  • TERMS OF USE
  • CONTACT US