News

Ransomware group Akira is believed to be behind a large number of attacks that appear to be tied to SonicWall firewalls with SSLVPN enabled. Over ...
Hackers have been caught using a bring-your-own-vulnerable-driver (BYOVD) attack to exploit SonicWall firewall devices.
GuidePoint Security has discovered attackers exploiting legitimate drivers to gain access to a device. This is accomplished ...
Just sloppy setups and sneaky driversSonicWall walks back zero‑day fears, addresses credential reuse—and now driver-based evasion—in Gen 7 and newer VPN attacks What first looked like a zero-day ...
SonicWall reported that exploitation of a previously disclosed vulnerability has been responsible for recent cyberattacks ...
SonicWall investigating reports about a zero-day being exploited in ransomware attacks, but found no evidence of a new ...
“The first driver, rwdrv.sys, is a legitimate driver for ThrottleStop. This Windows-based performance tuning and monitoring ...
SonicWall says that recent Akira ransomware attacks exploiting Gen 7 firewalls with SSLVPN enabled are exploiting an older ...
Akira ransomware is abusing a legitimate Intel CPU tuning driver to turn off Microsoft Defender in attacks from security ...
Threat researchers at GuidePoint Security have uncovered Akira affiliates abusing legitimate Windows drivers in a previously ...
As of mid-July this year, cybersecurity researchers Arctic Wolf Labs observed an uptick in malicious logins, all coming ...