
"Welcome to this week's Threatsday Bulletin -your Thursday check-in on the latest twists and turns in cybersecurity and hacking. The digital threat landscape never stands still. One week it's a critical zero-day, the next it's a wave of phishing lures or a state-backed disinformation push. Each headline is a reminder that the rules keep changing and that defenders-whether you're protecting a global enterprise or your own personal data-need to keep moving just as fast."
""SonicWall SMA 100 10.2.2.2-92sv build has been released with additional file checking, providing the capability to remove known rootkit malware present on the SMA devices," the company said. "SonicWall strongly recommends that users of the SMA 100 series products (SMA 210, 410, and 500v) upgrade to the 10.2.2.2-92sv version." The update comes after a report from Google that found a threat actor tracked as UNC6148 deploying OVERSTEP malware on end-of-life (EoL) SonicWall SMA 100 devices."
The digital threat landscape remains highly dynamic, shifting rapidly between zero-days, phishing waves, and state-backed disinformation, requiring defenders to adapt continuously. SonicWall released firmware 10.2.2.2-92sv with additional file checking to remove known rootkit malware on SMA 100 series devices and strongly recommends upgrading SMA 210, 410, and 500v units. SonicWall expedited end-of-support for all SMA 100 devices to October 31, 2025, after Google reported a threat actor tracked as UNC6148 deploying OVERSTEP on end-of-life SMA 100 devices. CISA published an advisory detailing a July 11, 2024 compromise of a U.S. federal civilian agency via GeoServer CVE-2024-36401 remote code execution.
Read at The Hacker News
Unable to calculate read time
Collection
[
|
...
]