Topic: network scanning
-
Akira Ransomware Bypasses MFA to Breach SonicWall VPNs
Akira ransomware is bypassing multi-factor authentication on SonicWall SSL VPN devices, likely using stolen OTP seeds to generate valid tokens despite security patches. Attackers exploit the CVE-2024-40766 vulnerability to steal credentials, which they reuse even on patched systems, gaining rapid...
Read More » -
Cisco ASA Firewalls Remain Vulnerable to Zero-Day Attacks
Approximately 48,000 Cisco ASA devices remain vulnerable to active zero-day attacks, posing ongoing risks globally, with the majority located in the U.S. and other key countries. Attackers have used advanced tactics, including disabling logging and intercepting commands, to exploit vulnerabilitie...
Read More » -
AI Emerges as a Core Cybercrime Tool, Anthropic Warns
AI is now deeply integrated into all stages of cybercrime, automating tasks from reconnaissance to extortion and fundamentally changing the threat landscape. It enables a single individual to orchestrate complex attacks that previously required a team, collapsing the gap between planning and exec...
Read More » -
Akira Ransomware: 4 Hours from VPN Login to Total Encryption
Akira ransomware attacks can achieve full network encryption in as little as four hours after initial VPN access, leaving organizations with a very narrow window for detection and response. Attackers exploit stolen SonicWall VPN credentials and bypass multi-factor authentication to systematically...
Read More » -
Kali Linux 2025.3: Enhanced VM Support & 10 New Tools
Kali Linux 2025.3 introduces significant virtual machine infrastructure enhancements and ten new tools, reinforcing its role for cybersecurity and forensics professionals. The update reintroduces Nexmon Wi-Fi support for broader hardware compatibility and adds tools like Caido for web auditing an...
Read More »