<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[“Patchato” non significa protetto: attaccanti bypassano l’MFA sui VPN SonicWall Gen6 e raggiungono i file server in 30 minuti]]></title><description><![CDATA[<h1><b><a href="https://insicurezzadigitale.com/patchato-non-significa-protetto-attaccanti-bypassano-lmfa-sui-vpn-sonicwall-gen6-e-raggiungono-i-file-server-in-30-minuti/" rel="noopener noreferrer">“Patchato” non significa protetto: attaccanti bypassano l’MFA sui VPN SonicWall Gen6 e raggiungono i file server in 30 minuti</a></b></h1><p><br /><span><a href="/user/..%2Fcategory%2Finformatica%40feddit.it">@<span>informatica</span></a></span><br />CVE-2024-12802 sulle appliance SonicWall Gen6 SSL-VPN viene sfruttata attivamente nonostante la patch disponibile. Il motivo: il fix firmware non basta — richiede sei<br />RE: <a href="https://insicurezzadigitale.com/?p=9571" rel="noopener noreferrer">insicurezzadigitale.com/?p=957…</a></p>]]></description><link>https://citiverse.it/topic/b1ff97a0-8481-48a4-96a3-7a2f95027e71/patchato-non-significa-protetto-attaccanti-bypassano-l-mfa-sui-vpn-sonicwall-gen6-e-raggiungono-i-file-server-in-30-minuti</link><generator>RSS for Node</generator><lastBuildDate>Sat, 23 May 2026 02:31:24 GMT</lastBuildDate><atom:link href="https://citiverse.it/topic/b1ff97a0-8481-48a4-96a3-7a2f95027e71.rss" rel="self" type="application/rss+xml"/><pubDate>Fri, 22 May 2026 10:39:19 GMT</pubDate><ttl>60</ttl></channel></rss>