News

The good driver that's being exploited here is called "rwdrv.sys,' which is used for tuning software for Intel CPUs. Hackers ...
Ransomware group Akira is believed to be behind a large number of attacks that appear to be tied to SonicWall firewalls with SSLVPN enabled. Over ...
Hackers have been caught using a bring-your-own-vulnerable-driver (BYOVD) attack to exploit SonicWall firewall devices.
GuidePoint Security has discovered attackers exploiting legitimate drivers to gain access to a device. This is accomplished ...
Just sloppy setups and sneaky driversSonicWall walks back zero‑day fears, addresses credential reuse—and now driver-based evasion—in Gen 7 and newer VPN attacks What first looked like a zero-day ...
SonicWall reported that exploitation of a previously disclosed vulnerability has been responsible for recent cyberattacks ...
SonicWall investigating reports about a zero-day being exploited in ransomware attacks, but found no evidence of a new ...
The company said it had linked recent hacks to customers’ use of legacy credentials when migrating from Gen 6 to Gen 7 ...
“The first driver, rwdrv.sys, is a legitimate driver for ThrottleStop. This Windows-based performance tuning and monitoring ...
SonicWall says that recent Akira ransomware attacks exploiting Gen 7 firewalls with SSLVPN enabled are exploiting an older ...
SonicWall confirms recent SSL VPN attacks link to patched CVE-2024-40766 and reused passwords, urging password resets.