Tag: firewall
-
SonicWall Investigating If Zero-Day Flaw Is Behind Recent Attacks
SonicWall said Monday it’s investigating whether a zero-day vulnerability has been exploited in cyberattacks targeting Gen 7 firewalls with SSLVPN enabled. First seen on crn.com Jump to article: www.crn.com/news/security/2025/sonicwall-investigating-if-zero-day-flaw-is-behind-recent-attacks
-
Akira Ramps Up Assault on SonicWall Firewalls, Suggesting Zero-Day
An uptick of ransomware activity by the group in late July that uses the vendor’s SSL VPN devices for initial intrusion shows evidence of an as-yet-undisclosed flaw under exploitation. First seen on darkreading.com Jump to article: www.darkreading.com/threat-intelligence/akira-sonicwall-firewalls-zero-day
-
Aktivitäten mit Fokus auf Sonicwall-SSL-VPNs der Ransomware Akira nehmen zu
Ende Juli 2025 hat Arctic Wolf eine Zunahme von Ransomware-Aktivitäten festgestellt, bei denen Sonicwall-Firewall-Geräte als Einstiegsstellen genutzt wurden. In den analysierten Fällen wurden innerhalb kurzer Zeit mehrere sogenannte ‘Pre-Ransomware”-Intrusionen mit Zugang über Sonicwall-SSL-VPNs durchgeführt. Obwohl Angriffe auf Basis kompromittierter Zugangsdaten nicht in allen Fällen ausgeschlossen werden können, deuten die vorliegenden Hinweise auf eine Zero-Day-Schwachstelle in…
-
SonicWall firewalls targeted in ransomware attacks, possibly via zero-day
Attackers wielding the Akira ransomware and possibly a zero-day exploit have been spotted targeting SonicWall firewalls since July 15, 2025. >>In the intrusions reviewed, … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2025/08/04/sonicwall-firewalls-ssl-vpn-ransomware-akira/
-
Aktivitäten mit Fokus auf Sonicwall-SSL-VPNs der Ransomware Akira nehmen zu
Ende Juli 2025 hat Arctic Wolf eine Zunahme von Ransomware-Aktivitäten festgestellt, bei denen Sonicwall-Firewall-Geräte als Einstiegsstellen genutzt wurden. In den analysierten Fällen wurden innerhalb kurzer Zeit mehrere sogenannte ‘Pre-Ransomware”-Intrusionen mit Zugang über Sonicwall-SSL-VPNs durchgeführt. Obwohl Angriffe auf Basis kompromittierter Zugangsdaten nicht in allen Fällen ausgeschlossen werden können, deuten die vorliegenden Hinweise auf eine Zero-Day-Schwachstelle in…
-
China’s botched Great Firewall upgrade invites attacks on its censorship infrastructure
Attempts to censor QUIC traffic create chance to block access to offshore DNS resolvers First seen on theregister.com Jump to article: www.theregister.com/2025/08/04/china_great_firewall_quic_security_flaws/
-
Akira Ransomware Exploits 0-Day Vulnerability in SonicWall Firewall Devices
Tags: access, attack, cyber, cybersecurity, exploit, firewall, ransomware, vpn, vulnerability, zero-dayCybersecurity firm Arctic Wolf has identified a significant increase in ransomware attacks targeting SonicWall firewall devices in late July 2025, with evidence pointing to the exploitation of a previously unknown zero-day vulnerability. The company’s investigation revealed multiple coordinated attacks using SonicWall SSL VPNs as the initial access point, raising serious concerns about the security of…
-
SonicWall firewall devices hit in surge of Akira ransomware attacks
SonicWall firewall devices have been increasingly targeted since late July in a surge of Akira ransomware attacks, potentially exploiting a previously unknown security vulnerability, according to cybersecurity company Arctic Wolf. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/surge-of-akira-ransomware-attacks-hits-sonicwall-firewall-devices/
-
Wie EDR EDR aushebelt
Tags: access, cisco, crowdstrike, cyberattack, detection, edr, endpoint, firewall, monitoring, software, tool, vulnerabilityLegitime Security-Tools gegeneinander auszuspielen, eröffnet Cyberkriminellen diverse Vorteile.Cybersicherheitsforscher haben einen unheilvollen neuen Angriffsvektor entdeckt. Dabei könnten Angreifer kostenlose Testversionen von Endpoint Detection and Response (EDR)-Software dazu missbrauchen, vorhandene Sicherheits-Tools zu deaktivieren. Die Researcher Ezra Woods und Mike Manrod haben das Phänomen entdeckt und dokumentiert, das sie als “EDR-on-EDR Violence” bezeichnen. Ihre Erkenntnisse haben die Sicherheitsexperten…
-
How to Run a Firewall Test: A Guide for Enterprises
Cyber threats evolve quickly, and firewalls are often the first line of defense. However, having one in place isn’t the same as having one that works the way you expect…. First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/07/how-to-run-a-firewall-test-a-guide-for-enterprises/
-
Seeing Your APIs Through an Attacker’s Eyes: Introducing Salt Surface
Tags: api, attack, backdoor, breach, cloud, data-breach, endpoint, firewall, Internet, monitoring, risk, tool, vulnerability, wafYour API attack surface is larger and more exposed than you realize. In today’s complex, cloud-native environment, APIs are deployed at an astonishing rate. While this rapid pace fuels innovation, it also creates a significant visibility gap. The APIs you are aware of and manage are only the tip of the iceberg. Your actual risk…
-
Firewalls umgangen: Hacker infiltrieren Netzwerk einer Bank per Raspberry Pi
Der Raspberry Pi wurde einfach am Switch eines Geldautomaten angeschlossen. Dank 4G-Modem konnten sich die Angreifer danach im Netzwerk austoben. First seen on golem.de Jump to article: www.golem.de/news/firewalls-umgangen-hacker-infiltrieren-netzwerk-einer-bank-per-raspberry-pi-2507-198674.html
-
UNC2891 Hackers Breach ATMs Using Raspberry Pi Devices for Network Access
A Raspberry Pi device that was directly attached to an internal network switch was used by the financially motivated threat actor group UNC2891 to breach ATM networks in a sophisticated cyber campaign that targeted banking infrastructure. This embedded hardware, equipped with a 4G modem, facilitated remote access over mobile data, bypassing perimeter firewalls and establishing…
-
Applying Tenable’s Risk-based Vulnerability Management to the Australian Cyber Security Centre’s Essential Eight
Tags: ai, attack, breach, business, cloud, compliance, container, control, cvss, cyber, cybersecurity, data, data-breach, defense, endpoint, finance, firewall, framework, google, government, identity, incident response, infrastructure, intelligence, Internet, microsoft, mitigation, network, ransomware, risk, service, software, strategy, technology, threat, tool, update, vpn, vulnerability, vulnerability-management, windows, zero-dayLearn how Thales Cyber Services uses Tenable to help customers navigate the maturity levels of the Essential Eight, enabling vulnerability management and staying ahead of cyber threats. In today’s fast-moving digital world, cyber threats are more advanced and relentless than ever. A single security breach can mean financial loss, reputational damage and operational chaos. That’s…
-
Palo Alto kauft CyberArk
Tags: ceo, cloud, cybersecurity, cyersecurity, endpoint, firewall, google, governance, identity, infrastructure, network, risk, toolDer israelische Identity-Management-Anbieter CyberArk wird Teil von Palo Alto Networks. Mit der Übernahme des Identity-Management-Spezialisten CyberArk für rund 25 Milliarden Dollar geht Palo Alto Networks möglicherweise das größte Risiko seiner Geschichte ein. Faszinierend ist dieser Deal insbesondere deshalb, weil Palo Alto Networks über Jahre den Bereich Identity Management bewusst gemieden hat. Und das aus gutem…
-
Game changer: How AI simplifies implementation of Zero Trust security objectives
Tags: access, ai, api, automation, cloud, computing, cyber, data, detection, firewall, infrastructure, network, service, software, strategy, technology, threat, tool, vmware, vulnerability, zero-trust“You may think, oh that’s good enough,” Rajagopalan said. “I’ll protect my critical apps through Zero Trust and not worry about non-critical apps. But that ‘partial Zero Trust’ approach won’t work. Modern attackers identify less-secure environments and systems, enter through them, and then move laterally toward high value assets. True Zero Trust demands that every…
-
MCP”‘Sicherheit: Das Rückgrat von Agentic AI sichern
Tags: access, ai, api, authentication, ciso, credentials, cyberattack, cyersecurity, firewall, infrastructure, LLM, mfa, risk, toolIm Zuge von Agentic AI sollten sich CISOs mit MCP-Sicherheit auseinandersetzen. Das Model Context Protocol (MCP) wurde erst Ende 2024 vorgestellt, dennoch sind die technologischen Folgen in vielen Architekturen bereits deutlich spürbar. Damit Entwickler nicht jede Schnittstelle mühsam von Hand programmieren müssen, stellt MCP eine einheitliche ‘Sprache” für LL-Agenten bereit. Dadurch können sie Tools, Datenbanken und SaaS”‘Dienste…
-
Beyond Passwords: A Guide to Advanced Enterprise Security Protection
Credentials, not firewalls, are now the front line of enterprise security. Attackers are bypassing traditional defenses using stolen passwords, infostealer malware, and MFA … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2025/07/29/enzoic-beyond-passwords-a-guide-to-advanced-enterprise-security-protection/
-
Nile Gives Your Campus Network More Than Just a Password
For decades, network security followed a simple model: the castle and moat design philosophy. We built strong perimeters with firewalls and relied on Network Access Control (NAC) to act as a guardian, checking credentials at the door. Once inside, users and devices were assumed to be trusted. Today, the assumptions have all changed. Thanks to..…
-
Sophos fixed two critical Sophos Firewall vulnerabilities
Sophos addressed five Sophos Firewall vulnerabilities that could allow remote attackers to execute arbitrary code. Sophos has fixed five vulnerabilities (CVE-2025-6704, CVE-2025-7624, CVE-2025-7382, CVE-2024-13974, CVE-2024-13973) in Sophos Firewall that could allow an attacker to remotely execute arbitrary code. >>Sophos has resolved five independent security vulnerabilities in Sophos Firewall. Every Critical and High severity vulnerability was…
-
Microsoft fixes bug behind incorrect Windows Firewall errors
Microsoft has resolved a known issue that triggers invalid Windows Firewall errors after rebooting Windows 11 24H2 systems with the June 2025 preview update installed. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/microsoft/microsoft-fixes-bug-behind-incorrect-windows-firewall-errors/
-
Critical Sophos Firewall Flaws Allow Pre-Auth RCE
Tags: authentication, cyber, cybersecurity, firewall, flaw, network, rce, remote-code-execution, risk, sophos, vulnerabilitySophos has disclosed multiple critical security vulnerabilities affecting its Firewall products, with the most severe flaws enabling pre-authentication remote code execution that could allow attackers to completely compromise affected systems. The cybersecurity company released hotfixes for five independent vulnerabilities, two of which carry critical severity ratings and pose significant risks to enterprise networks worldwide. Severe…
-
Microsoft ‘digital escorts’ reveal crucial US counterintelligence blind spot
Tags: access, china, cio, cloud, compliance, country, cyber, cybersecurity, data, defense, firewall, framework, google, government, injection, intelligence, law, microsoft, military, oracle, risk, service, threat, update, vulnerabilityWhat the program was, and how it worked: The digital escort model, according to ProPublica, was designed to comply with federal contracting rules that prohibit foreign nationals from directly accessing sensitive government systems. Under this framework:China-based engineers would file support tickets for tasks such as firewall updates or bug fixes.US-based escorts, often former military personnel…
-
AI Needs a Firewall and Cloud Needs a Rethink
Tom Leighton of Akamai Wants to End Cloud Bloat and Secure AI From Inside Out. The cloud was meant to be cheaper, but it’s not. A bold new vision is emerging: one that slashes costs, decentralizes AI and secures APIs at the edge. From inference to firewalls, a reimagined internet is challenging hyperscaler dominance. First…
-
Microsoft mistakenly tags Windows Firewall error log bug as fixed
Microsoft has mistakenly tagged an ongoing Windows Firewall error message bug as fixed in recent updates, stating that they are still working on a resolution. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/microsoft/microsoft-mistakenly-tags-windows-firewall-error-log-bug-as-fixed/
-
WAFFLED: New Technique Targets Web Application Firewall Weaknesses
Cybersecurity researchers at Northeastern University and Dartmouth College have unveiled a groundbreaking attack technique that exploits fundamental parsing discrepancies in Web Application Firewalls (WAFs), potentially compromising the security of millions of websites worldwide. The research, dubbed “WAFFLED” (Web Application Firewall Fuzzing through Language Exploitation and Discrepancy), demonstrates how attackers can bypass five major WAF platforms.…
-
Check Point Unveils Quantum Spark 2500 Series, Bringing Enterprise-Level Security and Advanced Connectivity to SMBs
Check Point has unveiled the new Quantum Spark 2500 series, a next-generation firewall family designed for small and medium-sized businesses (SMBs) and managed service providers (MSPs). With built-in Wi-Fi 7, 5G, SD-WAN, and AI-powered threat prevention, the 2500 series delivers fast, secure, and resilient connectivity as part of the Check Point Infinity architecture. “The Quantum…

