Okay, deep breath, let's get this over with. In the grand act of digital self-sabotage, we've littered this site with cookies. Yep, we did that. Why? So your highness can have a 'premium' experience or whatever. These traitorous cookies hide in your browser, eagerly waiting to welcome you back like a guilty dog that's just chewed your favorite shoe. And, if that's not enough, they also tattle on which parts of our sad little corner of the web you obsess over. Feels dirty, doesn't it?
Akira Ransomware Exploits SonicWall Bug: Patch Now or Pay Later!
SonicWall SonicOS bug CVE-2024-40766 is being exploited in ransomware attacks. Researchers urge immediate patching to avoid becoming Akira’s next victim.

Hot Take:
Looks like SonicWall’s firewalls had an open-door policy, and Akira ransomware affiliates RSVP’d with a vengeance! Talk about a firewall that forgot it was supposed to be a wall!
Key Points:
- SonicWall’s firewall vulnerability (CVE-2024-40766) is actively being exploited.
- The bug impacts Gen 5, Gen 6, and Gen 7 firewalls, and the SSLVPN feature.
- Researchers from Arctic Wolf and Rapid7 confirmed the attacks.
- Akira ransomware affiliates are the culprits behind these attacks.
- Companies affected often had MFA disabled for high-value accounts.