SonicWall
-
SonicWall says unauthorized party accessed cloud firewall backup files
SonicWall said an unauthorized party accessed firewall configuration backup files stored in its cloud for all customers who used the cloud backup service; the files contain encrypted credentials and the company is urging users to check accounts and follow containment and remediation guidance.
-
Chinese state-sponsored group RedNovember exploited enterprise network gear in global campaign, researchers say
Recorded Future says a Chinese state-sponsored group called RedNovember ran a global espionage campaign from June 2024 to July 2025, exploiting vulnerabilities in enterprise network appliances to breach defense contractors, government agencies and other organizations and using publicly available tools to maintain persistent access.
-
Akira campaign bypasses OTP MFA on SonicWall VPNs, researchers say
Researchers report the Akira ransomware group has successfully logged into SonicWall SSL VPN accounts protected by OTP MFA, possibly using previously stolen OTP seeds. Vendors including SonicWall and Arctic Wolf advise installing updates and resetting VPN credentials while investigations continue.
-
SonicWall Addresses Surge in SSL VPN Activity Linked to Patched Vulnerability
SonicWall has confirmed that recent SSL VPN activity is linked to an older, patched vulnerability and password reuse, urging users to update firmware and reset passwords to enhance security against ongoing attacks.
-
Surge in Vulnerabilities Plagues SonicWall Devices, Heightening Cybersecurity Concerns
SonicWall faces a surge in vulnerabilities affecting its devices, with 20 disclosed in 2025, raising cybersecurity concerns as attackers exploit these weaknesses. The company’s efforts to patch vulnerabilities and enhance security features are underway as the threat landscape evolves.