• Follow Us

Locked Dorr Security

  • Home
    • Newsletter
    • Locked Dorr Security Blog
  • Cyber News
    • Latest Cyber News and Breaches
    • Latest Malware
    • Latest in Scada and Industrial Control
  • Useful Links and How To Posts
    • Staying Up to Date with Cyber
    • Virtulization
      • Set up a “Host Only” Malware Testing Environment in esxi
      • Setting up ProxMox on a Trunk with multiple Interfaces
      • Import vmdk Virtual Disk from OVF into ProxMox
      • Setting Up a SPAN and Linux Bridge for a Network Sensor
    • Remote Management
      • Gl-iNet Travel Router with Wireguard
      • Guacamole Server for Clientless RDP/VNC Access
      • SSH login with Keys: Login without a Password
      • Lab Management with Portainer with DashMachine
    • Linux
      • Managing Linux Firewalls
    • pfSense and Hosting Web Services
      • SSL Offloading with HA Proxy on pfSense
      • Using Cloudflare with Namecheap DNS & Web-hosting Services and pfSense HA Proxy
    • Protecting Network Traffic with Wireguard or VPNs
      • Protecting your network traffic with Wireguard
      • Adding HA Proxy with Wireguard to proxy Network Traffic to pfSense
    • Install Arkime for conducting PCAP Analysis
    • Install Elastiflow Server on Ubuntu 20.04.1 LTS
    • Shutdown multiple Docker Images Gracefully
    • Updating my CTFd Docker Container with local git clones Repositories
    • Useful Links and How To Posts
  • Defensive Cyber
    • Scanning Techniques with NMAP
    • Packet Analysis with Magic Shark
    • Packet Analysis with tshark
    • Packet Analysis with Data Science
  • Hacktivities
    • RouterSpace Write-up on HTB
  • Docs
  • Home
    • - Newsletter
    • - Locked Dorr Security Blog
  • Cyber News
    • - Latest Cyber News and Breaches
    • - Latest Malware
    • - Latest in Scada and Industrial Control
  • Useful Links and How To Posts
    • - Staying Up to Date with Cyber
    • - Virtulization
      • - - Set up a “Host Only” Malware Testing Environment in esxi
      • - - Setting up ProxMox on a Trunk with multiple Interfaces
      • - - Import vmdk Virtual Disk from OVF into ProxMox
      • - - Setting Up a SPAN and Linux Bridge for a Network Sensor
    • - Remote Management
      • - - Gl-iNet Travel Router with Wireguard
      • - - Guacamole Server for Clientless RDP/VNC Access
      • - - SSH login with Keys: Login without a Password
      • - - Lab Management with Portainer with DashMachine
    • - Linux
      • - - Managing Linux Firewalls
    • - pfSense and Hosting Web Services
      • - - SSL Offloading with HA Proxy on pfSense
      • - - Using Cloudflare with Namecheap DNS & Web-hosting Services and pfSense HA Proxy
    • - Protecting Network Traffic with Wireguard or VPNs
      • - - Protecting your network traffic with Wireguard
      • - - Adding HA Proxy with Wireguard to proxy Network Traffic to pfSense
    • - Install Arkime for conducting PCAP Analysis
    • - Install Elastiflow Server on Ubuntu 20.04.1 LTS
    • - Shutdown multiple Docker Images Gracefully
    • - Updating my CTFd Docker Container with local git clones Repositories
    • - Useful Links and How To Posts
  • Defensive Cyber
    • - Scanning Techniques with NMAP
    • - Packet Analysis with Magic Shark
    • - Packet Analysis with tshark
    • - Packet Analysis with Data Science
  • Hacktivities
    • - RouterSpace Write-up on HTB
  • Docs

Latest Malware

  • New 7-Zip Vulnerability Enables Malicious RAR5 File to Crash Your System
    July 21, 2025
    … malware delivery methods according to recent threat research. Malicious actors regularly exploit archive processing vulnerabilities to bypass …
  • Kaspersky identifies a new backdoor targeting Microsoft Exchange servers – newswit
    July 21, 2025
    The malware may be part of an advanced persistent threat (APT) campaign targeting high-value entities in Asia, including high-tech companies.
  • First-ever AI malware 'LameHug' hides in ZIP files to hack Windows PCs | Kashmir Reader
    July 21, 2025
    NEW DELHI: A new family of malware called LameHug is infecting systems around the world using the very same tech that powers AI chatbots like …
  • Critical SharePoint Zero-Day Exploited in the Wild, No Patch Yet Available | CyberInsider
    July 20, 2025
    125.147; Malicious user-agent string matching Firefox/120.0. Mitigations and guidance. Microsoft has not released a patch, but recommends immediate …
  • Your smart TV might be secretly working for criminals | Kashmir Reader
    July 20, 2025
    “Cybercriminals infected these devices with pre-installed malware and exploited them to conduct large-scale ad fraud and other digital crimes.”.
  • Hackers are exploiting a critical RCE Flaw in a popular FTP server — here's what you need to know
    July 20, 2025
    One attacker created malicious session files that used certutil and cmd.exe to fetch and execute remote payloads. Although the attack was ultimately …
  • Thousands of ecommerce sites at risk after popular CMS targeted by malware attack – MSN
    July 20, 2025
    OpenCart websites were silently injected with malware that mimics trusted tracking scripts; Script hides in analytics tags and quietly swaps real …
  • Weekly Cybersecurity Newsletter: Chrome 0-Day, VMware Flaws Patched, Fortiweb Hack …
    July 20, 2025
    A new ransomware variant named “Dark 101” has been identified … Chinese Threat Actors Using 2,800 Malicious Domains to Deliver Windows-Specific …
  • EncryptHub Targets Web3 Developers Using Fake AI Platforms to Deploy Fickle Stealer Malware
    July 20, 2025
    … malware. "LARVA-208 has evolved its tactics, using fake AI platforms (e.g. … While the group has a history of deploying ransomware, the latest …
  • Punjab National Bank Hosts Prize Distribution Ceremony for Cybersecurity Hackathon
    July 20, 2025
    New Delhi : PNB, today hosted the Prize Distribution Ceremony of the “Code Against Malware” Hackathon at its Head Office. The hackathon was …
  • Punjab National Bank Hosts Prize Distribution Ceremony for Cybersecurity Hackathon
    July 20, 2025
    New Delhi : PNB, today hosted the Prize Distribution Ceremony of the “Code Against Malware” Hackathon at its Head Office.
  • SquidLoader Malware Campaign Hits Hong Kong Financial Firms – Hackread
    July 20, 2025
    Cybersecurity researchers at Trellix spot SquidLoader malware targeting Hong Kong, Singapore, and Australia's financial service institutions.
  • Malware Discovered in Arch Linux AUR Packages – LXer
    July 20, 2025
    Malware Discovered in Arch Linux AUR Packages. Posted by bobolin on Jul 20, 2025 1:52 AM CST Linuxiac.com; By Bobby Borisov, Mail this story
  • Chinese Groups Launder $580M in India Using Fake Apps and Mule Accounts – Hackread
    July 20, 2025
    Famous Uploader CracksNow Banned from Torrents for Distributing GrandCrab Ransomware. CracksNow is a prominent software uploader who appears… byWaqas.
  • Fraudsters drain bank accounts in Gujarat: Sends fake RTO challan and gas bill messages
    July 20, 2025
    Once clicked, malware is installed, allowing access to banking apps, OTPs, and contacts. The same malicious link is often forwarded to others from the …
  • Hackers are exploiting a critical RCE Flaw in a popular FTP server — here's what you need to know
    July 20, 2025
    … virus alert , malicious software infection , cyber security awareness training to protect business. Antivirus vs Anti-malware: which is best for you?
  • Dangerous new AI malware LameHug evades security using ML – Kalinga TV
    July 20, 2025
    New malware called LameHug is spreading worldwide. The LameHug, malware is written in Python, a widely used programming language.
  • 12 signs your phone has been hacked — and what to do next – Tom's Guide
    July 20, 2025
    Hacks can happen to anyone, even on mobile devices. Here's what to do when the worst occurs.
  • New GhostContainer Backdoor Targets Microsoft Exchange Servers – BusinessToday
    July 20, 2025
    … new backdoor named GhostContainer. It was found in a file called App_Web_Container_1.dll during an incident response case. The malware targets …
  • This dangerous virus attacks without internet Biggest cyber threat… – India Herald
    July 20, 2025
    As soon as a user connects the infected device to the system, this malware gets activated automatically. This ransomware often uses hidden files …
Welcome to Locked Dorr Security
  • PRIVACY POLICY
  • TERMS OF USE
  • CONTACT US