Skip to content

Blog

Diesel Vortex Targets Critical Freight Infrastructure

EXECUTIVE SUMMARY Lockard Security has identified and actively defended against a sophisticated multi-stage credential harvesting campaign targeting critical freight and logistics infrastructure since October 2025. The threat actor, designated Diesel Vortex, has successfully compromised 1,649 freight platform accounts across DAT,… 

Removing OneLaunch Malware: A Comprehensive Guide

Malware remains one of the most pressing challenges in cybersecurity today. One such malware that has been causing significant issues is the OneLaunch malware. This comprehensive guide will walk you through the history, impact, and detailed steps on how to… 

Avoid Service Accounts With Interactive Login Permissions

Allowing a service account to have interactive logins to systems containing highly confidential data presents several potential risks that need to be addressed. Here are the main concerns: To mitigate these risks, you should consider the following strategies: Remember, the… 

Top 25 Weakest Passwords

Lockard Security has compiled a list of the top 25 most vulnerable passwords. These passwords are considered weak due to their simplicity, predictability, and widespread usage. Avoid using these passwords or any variations of them to keep your accounts secure.… 

What are Hacking Tools and Software

Hacking tools and software are programs, utilities, or scripts used by hackers, security professionals, and sometimes even hobbyists to exploit, test, or assess the security of computer systems, networks, and software applications. These tools serve various purposes, ranging from identifying… 

How to detect and prevent hackers using LOLBINs

LOLBIN (Living Off the Land Binaries) refers to legitimate system tools or binaries that can be exploited by attackers for malicious purposes, such as bypassing security measures and performing various types of attacks. To detect and prevent the use of… 

How to detect and prevent the hacking tool NMAP

Nmap (Network Mapper) is a powerful open-source network scanning tool that can be used for legitimate purposes, such as network inventory and vulnerability assessments. However, it can also be misused by hackers to gather information about your network for malicious… 

How to detect and prevent the hacking tool Bloodhound

Bloodhound is a popular hacking tool used by attackers to perform reconnaissance and exploit Active Directory environments. It helps attackers to identify potential attack paths and vulnerabilities in the network. To detect and prevent Bloodhound from running within an enterprise…