Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

SonicWall Confirms No New SSLVPN 0-Day Ransomware Attack Linked to Old Vulnerability

Posted on August 7, 2025August 7, 2025 By CWS

Cybersecurity agency SonicWall has formally addressed latest considerations a couple of potential new zero-day vulnerability in its Safe Sockets Layer Digital Personal Community (SSLVPN) merchandise.

In an announcement to Cybersecurity Information, the corporate confirmed that latest ransomware assaults will not be the results of a brand new flaw, however are as an alternative linked to a beforehand recognized and patched vulnerability.

SonicWall said with excessive confidence that the malicious exercise is related to CVE-2024-40766. This vulnerability was disclosed earlier and detailed within the firm’s public advisory, SNWLID-2024-0015. The corporate’s investigation refutes claims of a brand new or unknown zero-day exploit circulating within the wild.

In line with the report, the impression of those assaults has been restricted, with fewer than 40 confirmed instances recognized.

The incidents look like related to the usage of legacy credentials in the course of the migration course of from older Era 6 firewalls to the newer Era 7 fashions. This means that attackers exploited outdated or weak credentials that weren’t up to date in the course of the {hardware} refresh cycle.

In response to the assaults, SonicWall has issued up to date steering for its clients. The corporate is urging customers to vary their credentials to forestall unauthorized entry instantly.

Moreover, it strongly recommends upgrading to SonicOS 7.3.0, which includes enhanced Multi-Issue Authentication (MFA) protections and different safety features designed to thwart such assaults. These options embody login try lockouts and the enforcement of advanced password insurance policies.

Since figuring out the risk, SonicWall has maintained a proactive stance on communication and buyer safety. The corporate has been instantly notifying affected clients and companions, offering them with detailed mitigation steps.

Equip your SOC with full entry to the newest risk knowledge from ANY.RUN TI Lookup that may Enhance incident response -> Get 14-day Free Trial

Cyber Security News Tags:0Day, Attack, Confirms, Linked, Ransomware, SonicWall, SSLVPN, Vulnerability

Post navigation

Previous Post: ScarCruft Hacker Group Launched a New Malware Attack Using Rust and PubNub
Next Post: SonicWall Says Recent Attacks Don’t Involve Zero-Day Vulnerability

Related Posts

Threat Actors Breaking to Enterprise Infrastructure Within 18 Minutes From Initial Access Cyber Security News
Hackers Can Manipulate BitLocker Registry Keys Via WMI to Execute Malicious Code as Interactive User Cyber Security News
Threat Actors Exploiting DevOps Web Servers Misconfigurations To Deploy Malware Cyber Security News
AMD Warns of Transient Scheduler Attacks Affecting Wide Range of Chipsets Cyber Security News
Critical Meshtastic Vulnerability Let Attackers to Decrypt Private Messages Cyber Security News
VMware Tools and Aria 0-Day Vulnerability Exploited for Privilege Escalation and Code Execution Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Hackers Hijack Samsung Galaxy Phones via 0-Day Exploit Using a Single WhatsApp Image
  • Threat Actors Leveraging RDP Credentials to Deploy Cephalus Ransomware
  • German ISP Aurologic GmbH has Become a Central Nexus for Hosting Malicious Infrastructure
  • ClickFix Attacks Evolved With Weaponized Videos That Tricks Users via Self-infection Process
  • Samsung Zero-Click Flaw Exploited to Deploy LANDFALL Android Spyware via WhatsApp

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Hackers Hijack Samsung Galaxy Phones via 0-Day Exploit Using a Single WhatsApp Image
  • Threat Actors Leveraging RDP Credentials to Deploy Cephalus Ransomware
  • German ISP Aurologic GmbH has Become a Central Nexus for Hosting Malicious Infrastructure
  • ClickFix Attacks Evolved With Weaponized Videos That Tricks Users via Self-infection Process
  • Samsung Zero-Click Flaw Exploited to Deploy LANDFALL Android Spyware via WhatsApp

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News