News

SonicWall says that recent Akira ransomware attacks exploiting Gen 7 firewalls with SSLVPN enabled are exploiting an older ...
Akira ransomware exploits SonicWall SSL VPNs, hitting patched devices. Organizations face risks from possible zero-day flaw.
As of mid-July this year, cybersecurity researchers Arctic Wolf Labs observed an uptick in malicious logins, all coming ...
SonicWall firewall devices have been increasingly targeted since late July in a surge of Akira ransomware attacks, ...
SonicWall on Monday confirmed that it's investigating a rash of ransomware activity targeting its firewall devices, following ...
SonicWall investigating reports about a zero-day being exploited in ransomware attacks, but found no evidence of a new ...
SonicWall confirms recent SSL VPN attacks link to patched CVE-2024-40766 and reused passwords, urging password resets.
Threat researchers at GuidePoint Security have uncovered Akira affiliates abusing legitimate Windows drivers in a previously ...
SonicWall reported that exploitation of a previously disclosed vulnerability has been responsible for recent cyberattacks ...
Just sloppy setups and sneaky driversSonicWall walks back zero‑day fears, addresses credential reuse—and now driver-based evasion—in Gen 7 and newer VPN attacks What first looked like a zero-day ...
“The first driver, rwdrv.sys, is a legitimate driver for ThrottleStop. This Windows-based performance tuning and monitoring ...
In all of the cases observed by the security vendor, threat actors achieved VPN access through SonicWall SSL VPNs. There then ...