Tag: firewall
-
SonicWall Advises Users to Reset Logins After Config Backup Leak
SonicWall has alerted its customers to reset all login credentials after a recent leak exposed firewall configuration backups. The vendor emphasizes three critical stages”, containment, remediation, and monitoring”, to minimize risk and restore secure access. Users should follow each stage in order, beginning with containment to block further exposure, proceeding to remediation to reset passwords…
-
WatchGuard warns of critical vulnerability in Firebox firewalls
WatchGuard has released security updates to address a remote code execution vulnerability impacting the company’s Firebox firewalls. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/watchguard-warns-of-critical-vulnerability-in-firebox-firewalls/
-
Warning: Brute force attacks hitting SonicWall firewall configuration backups
Tags: attack, authentication, backup, breach, cloud, computer, computing, credentials, data, defense, encryption, firewall, Hardware, login, mfa, password, phishing, software, technology, threatWhat are brute force attacks?: Brute force attacks use trial and error to crack passwords, login credentials, and encryption keys. They’ve been around since the beginning of the computer age, yet are still effective. Why? In part because people still use easily guessable passwords like ‘1234’, or their company’s name, or default passwords left on…
-
Attack on SonicWall’s cloud portal exposes customers’ firewall configurations
The company confirmed to CyberScoop that an unidentified cybercriminal accessed SonicWall’s customer portal through a series of brute-force attacks. First seen on cyberscoop.com Jump to article: cyberscoop.com/sonicwall-cyberattack-customer-firewall-configurations/
-
MySonicWall Cloud Backup File Incident: Backup der Konfiguration offen gelegt
Kurzer Hinweis an Leser, bei denen SonicWall zum Einsatz gelangt und die die Information heute noch nicht erhalten haben. Es gab einen Vorfall, bei dem Backup-Dateien der Firewall-Konfiguration, die in bestimmten MySonicWall-Konten gespeichert waren, offengelegt wurden. So konnten Angreifer die … First seen on borncity.com Jump to article: www.borncity.com/blog/2025/09/17/mysonicwall-cloud-backup-file-incident-backup-der-konfiguration-offen-gelegt/
-
SonicWall warns customers to reset credentials after breach
SonicWall warned customers today to reset credentials after their firewall configuration backup files were exposed in a security breach that impacted MySonicWall accounts. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/sonicwall-warns-customers-to-reset-credentials-after-MySonicWall-breach/
-
(g+) Altgeräteverwertung: Neue Aufgaben für eine alte Firewall
Geräte, die ihr EOL erreicht haben, lassen sich für private Zwecke oft noch nutzen. Wir zeigen, wie man eine alte Firewall von Sophos im Homeoffice betreiben kann. First seen on golem.de Jump to article: www.golem.de/news/altgeraeteverwertung-neue-aufgaben-fuer-eine-alte-firewall-2509-200086.html
-
Over 500GB of Sensitive Great Firewall of China Data Leaked Online
A massive data breach has exposed the inner workings of China’s internet censorship system, with over 500GB of sensitive documents from the Great Firewall of China (GFW) leaked online on September 11, 2025. This represents the largest leak of internal GFW documents in history, providing unprecedented insight into China’s digital surveillance apparatus. Breach Origins The…
-
Top 10 Best Web Application Firewall (WAF) Solutions In 2025
In 2025, web applications are no longer just static websites; they are dynamic, complex ecosystems that serve as the primary interface between businesses and their customers. This makes them a prime target for cybercriminals. Traditional network firewalls and intrusion prevention systems (IPS) are often blind to application-layer attacks, leaving web applications vulnerable to exploits like…
-
600 GB of Alleged Great Firewall of China Data Published in Largest Leak Yet
Hackers leaked 600 GB of data linked to the Great Firewall of China, exposing documents, code, and operations…. First seen on hackread.com Jump to article: hackread.com/great-firewall-of-china-data-published-largest-leak/
-
SonicWall firewalls targeted by fresh Akira ransomware surge
A recent wave of attacks targeting SonicWall customers has researchers and authorities on alert. Many victim organizations had misconfigurations in their systems. First seen on cyberscoop.com Jump to article: cyberscoop.com/sonicwall-akira-ransomware-attacks-surge/
-
Microsoft Windows Defender Firewall Vulnerabilities Allow Privilege Escalation
Microsoft has released security advisories for four newly discovered vulnerabilities in its Windows Defender Firewall Service that could enable attackers to elevate privileges on affected Windows systems. The flaws, tracked as CVE-2025-53808, CVE-2025-54104, CVE-2025-54109, and CVE-2025-54915, were all disclosed on September 9, 2025, and share similar characteristics. While exploitation requires local access, successful attacks could…
-
Microsoft Windows Defender Firewall Vulnerabilities Allow Privilege Escalation
Microsoft has released security advisories for four newly discovered vulnerabilities in its Windows Defender Firewall Service that could enable attackers to elevate privileges on affected Windows systems. The flaws, tracked as CVE-2025-53808, CVE-2025-54104, CVE-2025-54109, and CVE-2025-54915, were all disclosed on September 9, 2025, and share similar characteristics. While exploitation requires local access, successful attacks could…
-
Ransomware gang going after improperly patched SonicWall firewalls
Tags: authentication, awareness, data-breach, defense, firewall, Internet, mfa, phishing, ransomware, updatepatch all internet-exposed systems as soon as fixes are released;enable phishing-resistant multi-factor authentication for all users;monitor the internet for leaked credentials;run a regular phishing security awareness campaign for employees.CISOs can also refer to the IST’s Blueprint for Ransomware Defense for more tips. First seen on csoonline.com Jump to article: www.csoonline.com/article/4056080/ransomware-gang-going-after-improperly-patched-sonicwall-firewalls.html
-
Akira Ransomware exploits year-old SonicWall flaw with multiple vectors
Researchers warn that Akira ransomware group is exploiting a year-old SonicWall firewall flaw, likely using three attack vectors for initial access. The Akira ransomware group is exploiting a year-old SonicWall firewall vulnerability, tracked as CVE-2024-40766 (CVSS score of 9.3), likely using three attack vectors for initial access, according to Rapid7. >>Evidence collected during Rapid7’s investigations…
-
SonicWall SSLVPN Exploitation ‘Ongoing’ By Ransomware Group: Researchers
The Akira cybercriminal group is believed to be behind a resurgence in ransomware attacks exploiting a previously disclosed vulnerability impacting certain SonicWall firewalls, according to researchers at Rapid7. First seen on crn.com Jump to article: www.crn.com/news/security/2025/sonicwall-sslvpn-exploitation-ongoing-by-ransomware-group-researchers
-
Akira ransomware affiliates continue breaching organizations via SonicWall firewalls
Over a year after SonicWall patched CVE-2024-40766, a critical flaw in its next-gen firewalls, ransomware attackers are still gaining a foothold in organizations by exploiting … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2025/09/11/akira-ransomware-sonicwall-firewalls/
-
Docker malware breaks in through exposed APIs, then changes the locks
The variant has creative twists: Setting the variant apart is its move to deny others access to the same Docker API, effectively monopolizing the attack surface. It tries to modify firewall settings (iptables, nft, firewall-cmd, etc.) via a cron job to drop or reject incoming connections to port 2375. A cron job is a scheduled…
-
ACSC Warns of Actively Exploited SonicWall Access Control Vulnerability
The Australian Cyber Security Centre (ACSC) has issued an urgent warning about a critical vulnerability in SonicWall firewall devices that is being actively exploited by threat actors. The flaw, tracked as CVE-2024-40766, affects SonicOS management access and SSLVPN functionality across multiple generations of SonicWall devices. Critical Vulnerability Details The improper access control vulnerability carries a…
-
Reflected XSS Flaw Enables Attackers to Evade Amazon CloudFront Protection Using Safari
A recent bug bounty discovery has drawn attention to a browser-specific reflected Cross-Site Scripting (XSS) vulnerability on help-ads.target.com. This flaw was found to bypass Amazon CloudFront’s Web Application Firewall (WAF) protections but could only be exploited on the Safari browser. The finding highlights the importance of testing for diverse browser behaviors during security assessments. Discovery…
-
Microsoft Patch Tuesday security updates for September 2025 fixed two zero-day flaws
Microsoft Patch Tuesday security updates for September 2025 fixed 80 vulnerabilities, including two publicly disclosed zero-day flaws. Microsoft Patch Tuesday security updates for September 2025 addressed 80 vulnerabilities in Windows and Windows Components, Office and Office Components, Microsoft Edge (Chromium-based), Azure, Hyper-V, SQL Server, Defender Firewall Service, and Xbox (yup Xbox!). Eight of the […]…
-
Microsoft Patch Tuesday security updates for September 2025 fixed two zero-day flaws
Microsoft Patch Tuesday security updates for September 2025 fixed 80 vulnerabilities, including two publicly disclosed zero-day flaws. Microsoft Patch Tuesday security updates for September 2025 addressed 80 vulnerabilities in Windows and Windows Components, Office and Office Components, Microsoft Edge (Chromium-based), Azure, Hyper-V, SQL Server, Defender Firewall Service, and Xbox (yup Xbox!). Eight of the […]…
-
Fixing silent failures in security controls with adversarial exposure validation
Organizations often operate as if their security controls are fully effective simply because they’re deployed, configured, and monitored. Firewalls are in place, … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2025/09/10/picus-blue-report-security-controls/
-
Fixing silent failures in security controls with adversarial exposure validation
Organizations often operate as if their security controls are fully effective simply because they’re deployed, configured, and monitored. Firewalls are in place, … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2025/09/10/picus-blue-report-security-controls/
-
Fixing silent failures in security controls with adversarial exposure validation
Organizations often operate as if their security controls are fully effective simply because they’re deployed, configured, and monitored. Firewalls are in place, … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2025/09/10/picus-blue-report-security-controls/
-
Il 60% non colpisce nel segno. E tu?
Tags: firewallCosa rivela FireMon Insights sui rischi legati alle policy dei firewall e come porre rimedio La gestione del firewall è l’eroe silenzioso (o l’antagonista nascosto) della sicurezza di rete. Il… First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/09/il-60-non-colpisce-nel-segno-e-tu/

