Skip to content
TheCyberThrone

Thinking Security ! Always

  • Latest Story
  • AI
  • Application Security
  • Cloud Security
    • AWS Security
    • Azure Security
    • Google Security
  • Container Security
  • Data Breaches
  • Email Security
  • Mobile Security
  • Security Acquisition
  • ZeroDay
  • Certification Guide
    • Cloud Certifications
    • Network Certifications
    • Security Certifications
  • Security NewsLetter
  • About Author
  • facebook.com
  • twitter.com
  • t.me
  • instagram.com
  • youtube.com
Subscribe

Fog ransomware

  • Home
  • Fog ransomware
SonicWall Vulnerability exploited by Fog and Akira Ransomware

SonicWall Vulnerability exploited by Fog and Akira Ransomware

Sonicwall SSL VPN vulnerability tracked as CVE-2024-40766 has been exploited in the recent cyberattacks involving Akira and Fog ransomware. Initial access to victim environments was facilitated through compromised SonicWall SSL…
Posted by PravinKarthik October 30, 2024
Veeam Backup flaw CVE-2024-40711 used in ransomware campaigns

Veeam Backup flaw CVE-2024-40711 used in ransomware campaigns

Security agencies were alerting about the mass exploitation of a critical Veeam backup and replication vulnerability by ransomware groups. The vulnerability tracked as CVE-2024-40711 with a CVSS score of 9.8,…
Posted by PravinKarthik October 12, 2024
Trending post
  • McGraw Hill Data Breach — 13.5 Million Records Exposed
    McGraw Hill Data Breach — 13.5 Million Records Exposed
  • CISSP Domain 3: Zero Hour Exam Cram Series
    CISSP Domain 3: Zero Hour Exam Cram Series
  • CISSP Executive Briefing: Attack Surface Inflation
    CISSP Executive Briefing: Attack Surface Inflation
  • NIST Limits NVD Enrichment to High-Priority CVEs
    NIST Limits NVD Enrichment to High-Priority CVEs
  • CISSP Domain 2 – Privacy Roles – Data Controller vs Processor vs Subject
    CISSP Domain 2 – Privacy Roles – Data Controller vs Processor vs Subject
  • Microsoft Defender Under Siege
    Microsoft Defender Under Siege
Archives

Click to Subscribe

Follow Us

  • Facebook
  • Twitter
  • Instagram
Copyright 2026 — TheCyberThrone. All rights reserved. Bloghash WordPress Theme
Scroll to Top