Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Hackers Access SonicWall Cloud Firewall Backups, Spark Urgent Security Checks

Hackers Access SonicWall Cloud Firewall Backups, Spark Urgent Security Checks

Posted on October 9, 2025October 9, 2025 By CWS

Oct 09, 2025Ravie LakshmananCloud Safety / Community Safety
SonicWall on Wednesday disclosed that an unauthorized get together accessed firewall configuration backup recordsdata for all clients who’ve used the cloud backup service.
“The recordsdata include encrypted credentials and configuration knowledge; whereas encryption stays in place, possession of those recordsdata might improve the chance of focused assaults,” the corporate stated.
It additionally famous that it is working to inform all companions and clients, including it has launched instruments to help with gadget evaluation and remediation. The corporate can be urging customers to log in and verify for his or her gadgets.
The event comes a few weeks after SonicWall urged clients to carry out a credential reset after their firewall configuration backup recordsdata had been uncovered in a safety breach impacting MySonicWall accounts.

The checklist of impacted gadgets accessible on the MySonicWall portal has been assigned a precedence degree to assist clients prioritize remediation efforts. The labels are as follows –

Energetic – Excessive Precedence: Units with internet-facing companies enabled
Energetic – Decrease Precedence: Units with out internet-facing companies
Inactive: Units that haven’t pinged dwelling for 90 days

It beforehand acknowledged that the risk actors accessed backup firewall choice recordsdata saved within the cloud for lower than 5% of its clients, whereas emphasizing that the credentials inside these recordsdata had been encrypted however that in addition they included “data that would make it simpler for attackers to doubtlessly exploit the associated firewall.”
Customers are suggested to observe the steps beneath with speedy impact –

Log in to MySonicWall.com account and confirm if cloud backups exist for registered firewalls
If fields are clean, there is no such thing as a impression
If fields include backup particulars, confirm whether or not impacted serial numbers are listed within the account
If Serial Numbers are proven, customers ought to observe the containment and remediation pointers for the listed firewalls

SonicWall stated in instances the place clients have used the Cloud Backup function however no Serial Numbers are proven or solely among the registered Serial Numbers are displayed, it should present extra steerage in coming days.

The Hacker News Tags:Access, Backups, Checks, Cloud, Firewall, Hackers, Security, SonicWall, Spark, Urgent

Post navigation

Previous Post: Hackers Exploit DFIR Tool Velociraptor In Ransomware Attacks
Next Post: Lightship Security and OpenSSL Submit Version 3.5.4 for FIPS 140-3 Validation

Related Posts

Cybercriminals Exploit X’s Grok AI to Bypass Ad Protections and Spread Malware to Millions Cybercriminals Exploit X’s Grok AI to Bypass Ad Protections and Spread Malware to Millions The Hacker News
SharePoint 0-Day, Chrome Exploit, macOS Spyware, NVIDIA Toolkit RCE and More SharePoint 0-Day, Chrome Exploit, macOS Spyware, NVIDIA Toolkit RCE and More The Hacker News
Researchers Uncover Batavia Windows Spyware Stealing Documents from Russian Firms Researchers Uncover Batavia Windows Spyware Stealing Documents from Russian Firms The Hacker News
How To Automate Alert Triage With AI Agents and Confluence SOPs Using Tines How To Automate Alert Triage With AI Agents and Confluence SOPs Using Tines The Hacker News
Fileless Remcos RAT Delivered via LNK Files and MSHTA in PowerShell-Based Attacks Fileless Remcos RAT Delivered via LNK Files and MSHTA in PowerShell-Based Attacks The Hacker News
Why Critical Infrastructure Needs Stronger Security Why Critical Infrastructure Needs Stronger Security The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Huskeys Secures $8 Million in Seed Funding for ESM Platform
  • Critical XSS Flaw in Jira Could Compromise Organizations
  • Russian Group Star Blizzard Utilizes DarkSword iOS Exploit
  • Secrets Sprawl Expands in 2026: Key Insights for CISOs
  • Urgent Patches Address Critical Grafana Security Flaws

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Huskeys Secures $8 Million in Seed Funding for ESM Platform
  • Critical XSS Flaw in Jira Could Compromise Organizations
  • Russian Group Star Blizzard Utilizes DarkSword iOS Exploit
  • Secrets Sprawl Expands in 2026: Key Insights for CISOs
  • Urgent Patches Address Critical Grafana Security Flaws

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark