News
A max-severity RCE vulnerability in Erlang’s OTP SSH daemon, CVE-2025-32433, was actively exploited in OT networks across six ...
SonicWall and other threat researchers are investigating the ongoing incidents. It’s unknown yet whether this is a new or established vulnerability.
Global cyber risk consultancy S-RM has reported a sharp increase in ransomware incidents exploiting SonicWall firewall ...
Ransomware group Akira is believed to be behind a large number of attacks that appear to be tied to SonicWall firewalls with SSLVPN enabled. Over ...
Hackers have been caught using a bring-your-own-vulnerable-driver (BYOVD) attack to exploit SonicWall firewall devices.
GuidePoint Security has discovered attackers exploiting legitimate drivers to gain access to a device. This is accomplished ...
Just sloppy setups and sneaky driversSonicWall walks back zero‑day fears, addresses credential reuse—and now driver-based evasion—in Gen 7 and newer VPN attacks What first looked like a zero-day ...
SonicWall reported that exploitation of a previously disclosed vulnerability has been responsible for recent cyberattacks ...
SonicWall investigating reports about a zero-day being exploited in ransomware attacks, but found no evidence of a new ...
The company said it had linked recent hacks to customers’ use of legacy credentials when migrating from Gen 6 to Gen 7 ...
“The first driver, rwdrv.sys, is a legitimate driver for ThrottleStop. This Windows-based performance tuning and monitoring ...
SonicWall says that recent Akira ransomware attacks exploiting Gen 7 firewalls with SSLVPN enabled are exploiting an older ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results