News
SonicWall and other threat researchers are investigating the ongoing incidents. It’s unknown yet whether this is a new or established vulnerability.
SonicWall confirms recent SSL VPN attacks link to patched CVE-2024-40766 and reused passwords, urging password resets.
SonicWall says that recent Akira ransomware attacks exploiting Gen 7 firewalls with SSLVPN enabled are exploiting an older ...
Global cyber risk consultancy S-RM has reported a sharp increase in ransomware incidents exploiting SonicWall firewall ...
SonicWall investigating reports about a zero-day being exploited in ransomware attacks, but found no evidence of a new ...
The company said it had linked recent hacks to customers’ use of legacy credentials when migrating from Gen 6 to Gen 7 ...
Threat researchers at GuidePoint Security have uncovered Akira affiliates abusing legitimate Windows drivers in a previously ...
A leading security vendor has dismissed claims of a zero-day vulnerability in its products, stating that a surge in ...
Just sloppy setups and sneaky driversSonicWall walks back zero‑day fears, addresses credential reuse—and now driver-based evasion—in Gen 7 and newer VPN attacks What first looked like a zero-day ...
“The first driver, rwdrv.sys, is a legitimate driver for ThrottleStop. This Windows-based performance tuning and monitoring ...
Ransomware group Akira is believed to be behind a large number of attacks that appear to be tied to SonicWall firewalls with SSLVPN enabled. Over ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results