• Follow Us

Locked Dorr Security

  • Home
    • Newsletter
    • Locked Dorr Security Blog
  • Cyber News
    • Latest Cyber News and Breaches
    • Latest Malware
    • Latest in Scada and Industrial Control
  • Useful Links and How To Posts
    • Staying Up to Date with Cyber
    • Virtulization
      • Set up a “Host Only” Malware Testing Environment in esxi
      • Setting up ProxMox on a Trunk with multiple Interfaces
      • Import vmdk Virtual Disk from OVF into ProxMox
      • Setting Up a SPAN and Linux Bridge for a Network Sensor
    • Remote Management
      • Gl-iNet Travel Router with Wireguard
      • Guacamole Server for Clientless RDP/VNC Access
      • SSH login with Keys: Login without a Password
      • Lab Management with Portainer with DashMachine
    • Linux
      • Managing Linux Firewalls
    • pfSense and Hosting Web Services
      • SSL Offloading with HA Proxy on pfSense
      • Using Cloudflare with Namecheap DNS & Web-hosting Services and pfSense HA Proxy
    • Protecting Network Traffic with Wireguard or VPNs
      • Protecting your network traffic with Wireguard
      • Adding HA Proxy with Wireguard to proxy Network Traffic to pfSense
    • Install Arkime for conducting PCAP Analysis
    • Install Elastiflow Server on Ubuntu 20.04.1 LTS
    • Shutdown multiple Docker Images Gracefully
    • Updating my CTFd Docker Container with local git clones Repositories
    • Useful Links and How To Posts
  • Defensive Cyber
    • Scanning Techniques with NMAP
    • Packet Analysis with Magic Shark
    • Packet Analysis with tshark
    • Packet Analysis with Data Science
  • Hacktivities
    • RouterSpace Write-up on HTB
  • Docs
  • Home
    • - Newsletter
    • - Locked Dorr Security Blog
  • Cyber News
    • - Latest Cyber News and Breaches
    • - Latest Malware
    • - Latest in Scada and Industrial Control
  • Useful Links and How To Posts
    • - Staying Up to Date with Cyber
    • - Virtulization
      • - - Set up a “Host Only” Malware Testing Environment in esxi
      • - - Setting up ProxMox on a Trunk with multiple Interfaces
      • - - Import vmdk Virtual Disk from OVF into ProxMox
      • - - Setting Up a SPAN and Linux Bridge for a Network Sensor
    • - Remote Management
      • - - Gl-iNet Travel Router with Wireguard
      • - - Guacamole Server for Clientless RDP/VNC Access
      • - - SSH login with Keys: Login without a Password
      • - - Lab Management with Portainer with DashMachine
    • - Linux
      • - - Managing Linux Firewalls
    • - pfSense and Hosting Web Services
      • - - SSL Offloading with HA Proxy on pfSense
      • - - Using Cloudflare with Namecheap DNS & Web-hosting Services and pfSense HA Proxy
    • - Protecting Network Traffic with Wireguard or VPNs
      • - - Protecting your network traffic with Wireguard
      • - - Adding HA Proxy with Wireguard to proxy Network Traffic to pfSense
    • - Install Arkime for conducting PCAP Analysis
    • - Install Elastiflow Server on Ubuntu 20.04.1 LTS
    • - Shutdown multiple Docker Images Gracefully
    • - Updating my CTFd Docker Container with local git clones Repositories
    • - Useful Links and How To Posts
  • Defensive Cyber
    • - Scanning Techniques with NMAP
    • - Packet Analysis with Magic Shark
    • - Packet Analysis with tshark
    • - Packet Analysis with Data Science
  • Hacktivities
    • - RouterSpace Write-up on HTB
  • Docs

Latest Malware

  • New Ghost Campaign Uses Fake npm Progress Bars to Phish Sudo Passwords – Hackread
    March 27, 2026
    This latest threat, which first appeared at the beginning of February 2026, involves malicious code hidden inside npm packages, which programmers use …
  • Risky Bulletin: Russia to use custom crypto-algorithm for its 5G network
    March 27, 2026
    Infiniti Stealer: Malwarebytes has spotted a new macOS infostealer named Infiniti Stealer. Obviously, like all the cool malware these days, it's being …
  • A major hacking tool has leaked online, putting millions of iPhones at risk. Here's what you …
    March 27, 2026
    In some cases, victims can be hacked simply by visiting a legitimate website under the control of malicious hackers. When victims are initially …
  • New Torg Grabber Stealer Moves From Telegram Exfiltration to Encrypted REST API C2
    March 27, 2026
    A new Malware-as-a-Service (MaaS) credential stealer named Torg Grabber has surfaced, showing remarkable development pace over just three months.
  • Converging Interests: Analysis of Threat Clusters Targeting a Southeast Asian Government
    March 26, 2026
    EggStremeFuel backdoor; Masol remote access Trojan (RAT); EggStreme Loader (which delivered the comprehensive Gorem RAT with keylogging); A simple …
  • New PXA Stealer Malware Targets Banks, Uses Telegram to Exfiltrate Data – Hackread
    March 26, 2026
    CyberProof reports a 10% surge in PXA Stealer attacks targeting financial firms, using phishing and Telegram to steal passwords and crypto assets.
  • Europe's Democratic Backsliding Is Spreading Like Malware – CEPA
    March 26, 2026
    Poland ran the program for eight years before a new government began the slow work of institutional repair — a project measured in decades, not …
  • Infiniti Stealer: a new macOS infostealer using ClickFix and Python/Nuitka | Malwarebytes
    March 26, 2026
    A new macOS infostealer, NukeChain (now Infiniti Stealer), uses fake CAPTCHA pages to trick users into running malicious commands.
  • GhostClaw AI Assisted Malware Attacking macOS Users to Deploy Credential-Stealing Payloads
    March 26, 2026
    The malware was distributed through malicious npm packages, targeting developers who routinely install tools from public package registries. The …
  • Major global cybercrime syndicates infiltrate trusted domains with millions now at risk – TechRadar
    March 26, 2026
    Outdated software, crypto fraud, and fake ecommerce sites are running rampant.
  • A year of open source vulnerability trends: CVEs, advisories, and malware
    March 26, 2026
    You can receive Dependabot alerts when your repositories depend on npm packages with known malicious versions. When you enable malware alerting, …
  • This new scam could trick you into downloading malware – WXII
    March 26, 2026
    A new scam involving fake CAPTCHA boxes is tricking people into downloading malware that can steal sensitive information.
  • Huge numbers of web stores are facing attack from this dangerous new malware
    March 26, 2026
    Targeting a $100 billion company · Cyber-security · Computer Hacked, System Error, Virus, Cyber attack, Malware Concept. · WordPress logo on mobile · Side …
  • Fraud overtakes ransomware in cyber risk rankings for insurers – Munich Re
    March 26, 2026
    Claims data shows familiar drivers with new sources of loss emerging. Munich Re identifies ransomware, data breach, BEC, and distributed denial of …
  • TikTok for Business accounts targeted in new phishing campaign – Bleeping Computer
    March 26, 2026
    TikTok has previously been used to spread information-stealing malware via malicious videos, as well as cryptocurrency scams via fake promotions.
  • Stryker rules out ransomware, confirms threat actor used non-propagating malicious file
    March 26, 2026
    Following its recent cybersecurity incident, medical technology giant Stryker said it found no indication of ransomware or malware. As the …
  • GlassWorm attack installs fake browser extension for surveillance – Malwarebytes
    March 26, 2026
    Use an up-to-date, real-time anti-malware solution to detect and block malicious connections and the downloaded malware. … Want to stay informed on …
  • Dangerous DarkSword malware has emerged—iPhone users should take action now
    March 26, 2026
    Support us! Latest news. Dangerous DarkSword malware has emerged—iPhone users should take action now. 26. March 2026 06:00. Igor Wallossek. With the …
  • Fake npm Install Messages Hide RAT Malware in New Open Source Supply Chain Campaign
    March 26, 2026
    Researchers noted that the use of fake installation logs to mask malicious behavior was a novel technique, representing a clear shift in how threat …
  • New Kiss Loader Malware Uses Early Bird APC Injection in Emerging Attack Campaign
    March 26, 2026
    A newly discovered malware loader called Kiss Loader has emerged as a serious threat, using advanced code injection techniques to quietly …
Welcome to Locked Dorr Security
  • PRIVACY POLICY
  • TERMS OF USE
  • CONTACT US