News
SonicWall says that recent Akira ransomware attacks exploiting Gen 7 firewalls with SSLVPN enabled are exploiting an older ...
Akira ransomware exploits SonicWall SSL VPNs, hitting patched devices. Organizations face risks from possible zero-day flaw.
As of mid-July this year, cybersecurity researchers Arctic Wolf Labs observed an uptick in malicious logins, all coming ...
SonicWall firewall devices have been increasingly targeted since late July in a surge of Akira ransomware attacks, ...
SonicWall on Monday confirmed that it's investigating a rash of ransomware activity targeting its firewall devices, following ...
SonicWall investigating reports about a zero-day being exploited in ransomware attacks, but found no evidence of a new ...
SonicWall confirms recent SSL VPN attacks link to patched CVE-2024-40766 and reused passwords, urging password resets.
Threat researchers at GuidePoint Security have uncovered Akira affiliates abusing legitimate Windows drivers in a previously ...
SonicWall reported that exploitation of a previously disclosed vulnerability has been responsible for recent cyberattacks ...
Just sloppy setups and sneaky driversSonicWall walks back zero‑day fears, addresses credential reuse—and now driver-based evasion—in Gen 7 and newer VPN attacks What first looked like a zero-day ...
“The first driver, rwdrv.sys, is a legitimate driver for ThrottleStop. This Windows-based performance tuning and monitoring ...
In all of the cases observed by the security vendor, threat actors achieved VPN access through SonicWall SSL VPNs. There then ...
Results that may be inaccessible to you are currently showing.
Hide inaccessible results