News
Ransomware group Akira is believed to be behind a large number of attacks that appear to be tied to SonicWall firewalls with SSLVPN enabled. Over ...
Hackers have been caught using a bring-your-own-vulnerable-driver (BYOVD) attack to exploit SonicWall firewall devices.
GuidePoint Security has discovered attackers exploiting legitimate drivers to gain access to a device. This is accomplished ...
Just sloppy setups and sneaky driversSonicWall walks back zero‑day fears, addresses credential reuse—and now driver-based evasion—in Gen 7 and newer VPN attacks What first looked like a zero-day ...
SonicWall reported that exploitation of a previously disclosed vulnerability has been responsible for recent cyberattacks ...
SonicWall investigating reports about a zero-day being exploited in ransomware attacks, but found no evidence of a new ...
“The first driver, rwdrv.sys, is a legitimate driver for ThrottleStop. This Windows-based performance tuning and monitoring ...
SonicWall says that recent Akira ransomware attacks exploiting Gen 7 firewalls with SSLVPN enabled are exploiting an older ...
Akira ransomware is abusing a legitimate Intel CPU tuning driver to turn off Microsoft Defender in attacks from security ...
Threat researchers at GuidePoint Security have uncovered Akira affiliates abusing legitimate Windows drivers in a previously ...
As of mid-July this year, cybersecurity researchers Arctic Wolf Labs observed an uptick in malicious logins, all coming ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results