Skip to content

Dataprise Defense Digest: SonicWall SMA 100 Series – OVERSTEP Rootkit & Critical Vulnerabilities

Dataprise Defense Digest 550x550 square 81b9c004fda6a6de80ab2a0e7f7c7938 46aw13uh8spc

Vulnerability Number: CVE-2024-38475; CVE-2025-40599 (see SNWLID-2025-0015) Severity Level: Critical (multi-vector) Executive Summary Researchers have observed active exploitation campaigns targeting SonicWall Secure Mobile Access (SMA) 100 Series appliances. A user-mode rootkit called OVERSTEP — (deployed by a tracked actor UNC6148) — has been used to maintain persistence on SMA devices, and two key CVEs (CVE-2024-38475 and…

Read More

Dataprise Defense Digest: Cisco ASA 5500-X Series Vulnerabilities

Dataprise Defense Digest 550x550 square 81b9c004fda6a6de80ab2a0e7f7c7938 46aw13uh8spc

Vulnerability Number: CVE-2025-20333, CVE-2025-20362, CVE-2025-20363 Severity Level: Critical Executive Summary Cisco has identified new activity targeting ASA 5500-X Series devices. Three CVEs have been released in connection with this event, which could allow attackers to implant malware, execute commands, and potentially exfiltrate data from the compromised devices. Details Cisco ASA 5500-X Series devices are actively…

Read More

Costly Mistakes in Incident Response: One Conversation, All Perspectives

When a Breach Strikes, the First 72 Hours Can Determine Everything.  Organizations often make avoidable mistakes, from overlooking backups to misjudging insurance coverage, that can turn a bad situation into a disaster. That’s why this on-demand discussion brings together all three voices you’ll hear in the heat of a breach: incident response, legal counsel, and cyber insurance. By…

Read More

MySonicWall Cloud Backup Files Exposed

d3

Executive Summary On September 17, 2025, SonicWall announced a security incident for users of the MySonicWall service. SonicWall has stated that some customers may be impacted by an incident that left firewall configuration backup files exposed to threat actors via the MySonicWall service.  Threat actors with access to a firewall configuration file may have an…

Read More

Cybersecurity Budgeting Playbook: How To Build, Justify, and Optimize Your Security Environment

cyber converge img 3 (1)

Cyber Attacks Devastate Businesses of All Sizes: 60% of SMBs Close Within 6 Months, While Enterprises Face Millions in Recovery Costs. Most organizations struggle to build effective security budgets, often reacting to threats instead of proactively investing in protection. Cyber attacks are increasing at unprecedented rates and compliance requirements tightening across industries, you need to…

Read More

Cyber Maturity in Healthcare: Are You Compliant and Secure?

cyber maturity in healthcare

Setting the Stage The healthcare industry is sitting on one of the most valuable targets in the cybercrime world: patient data. A single medical record can be worth ten times more than a stolen credit card number on the dark web. Cyberattacks on healthcare organizations are skyrocketing, from ransomware locking down hospital systems to phishing…

Read More

How Law Firms Can Plan for Cyber Risk in 2026: A Complete Guide to Legal Cybersecurity

cyber for law firms

For law firms, client trust is everything. In 2026, that trust depends not just on your legal expertise but also on how well you manage your law firm’s cyber risk and protect sensitive client information. Clients, insurers, and regulators are expecting more than ever, and firms that can’t prove strong cybersecurity may struggle to keep…

Read More

Redefining IT Budgeting: Cyber + Ops Stability

cyber budgeting

Build a Budget That Does More Than Keep the Lights On IT leaders today are stuck in a tough spot. You’ve got to deal with cyber threats that get more sophisticated by the hour, keep operations running smoothly, and somehow stretch your budget to cover it all. Most budgets were built for a different time,…

Read More

Trimming IT Waste Without Losing Value: A Panel with Dataprise and GEP

Azure Optimization

Stop Wasting Your IT Budget… Too many businesses throw away a chunk of their IT spend–on unused licenses, forgotten tools, and overpriced contracts–without even realizing it. Meanwhile critical areas like cybersecurity and business continuity get underfunded. You need to get smart with your IT dollars. It’s not about slashing budgets, but spending with intention, fixing…

Read More