<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" version="2.0">
  <channel>
    <title>Security Bulletin</title>
    <link>https://www.logically.com/security-bulletin</link>
    <description>In this library you will find security updates that have been released by tour Cybersecurity team. The team investigates all reports of security vulnerabilities affecting our products and services, and releases these documents as part of the ongoing effort to help you manage security risks and help keep your systems protected.</description>
    <language>en</language>
    <pubDate>Thu, 05 Feb 2026 17:41:24 GMT</pubDate>
    <dc:date>2026-02-05T17:41:24Z</dc:date>
    <dc:language>en</dc:language>
    <item>
      <title>Urgent Security Alert: Action Required for New SonicWall SSL-VPN Threat Activity</title>
      <link>https://www.logically.com/security-bulletin/urgent-security-alert-action-required-for-new-sonicwall-ssl-vpn-threat-activity</link>
      <description>&lt;h2&gt;&lt;img src="https://www.logically.com/hs-fs/hubfs/sonicwall-logically.webp?width=1680&amp;amp;height=1008&amp;amp;name=sonicwall-logically.webp" width="1680" height="1008" alt="sonicwall-logically" style="height: auto; max-width: 100%; width: 1680px;"&gt;&lt;/h2&gt; 
&lt;h2&gt;Introduction: What's Happening?&lt;/h2&gt; 
&lt;p&gt;A significant security risk has been identified and is being actively exploited in certain SonicWall SSL VPN products. The issue was recently highlighted by cybersecurity news outlet &lt;em&gt;The Hacker News&lt;/em&gt;, and SonicWall previously released an official security advisory confirming the threat.&lt;/p&gt;</description>
      <content:encoded>&lt;h2&gt;&lt;img src="https://www.logically.com/hs-fs/hubfs/sonicwall-logically.webp?width=1680&amp;amp;height=1008&amp;amp;name=sonicwall-logically.webp" width="1680" height="1008" alt="sonicwall-logically" style="height: auto; max-width: 100%; width: 1680px;"&gt;&lt;/h2&gt; 
&lt;h2&gt;Introduction: What's Happening?&lt;/h2&gt; 
&lt;p&gt;A significant security risk has been identified and is being actively exploited in certain SonicWall SSL VPN products. The issue was recently highlighted by cybersecurity news outlet &lt;em&gt;The Hacker News&lt;/em&gt;, and SonicWall previously released an official security advisory confirming the threat.&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=4883612&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fwww.logically.com%2Fsecurity-bulletin%2Furgent-security-alert-action-required-for-new-sonicwall-ssl-vpn-threat-activity&amp;amp;bu=https%253A%252F%252Fwww.logically.com%252Fsecurity-bulletin&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>SonicWall</category>
      <pubDate>Fri, 12 Sep 2025 21:42:37 GMT</pubDate>
      <author>zack.finstad@logically.com (Zack Finstad)</author>
      <guid>https://www.logically.com/security-bulletin/urgent-security-alert-action-required-for-new-sonicwall-ssl-vpn-threat-activity</guid>
      <dc:date>2025-09-12T21:42:37Z</dc:date>
    </item>
    <item>
      <title>Fortinet TACACS+ Vulnerability Alert – CVE-2025-22252: What You Need to Know</title>
      <link>https://www.logically.com/security-bulletin/fortinet-tacacs-vulnerability-alert-cve-2025-22252-what-you-need-to-know</link>
      <description>&lt;p&gt;At Logically, maintaining the security of your network is our mission.&lt;/p&gt;</description>
      <content:encoded>&lt;p&gt;At Logically, maintaining the security of your network is our mission.&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=4883612&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fwww.logically.com%2Fsecurity-bulletin%2Ffortinet-tacacs-vulnerability-alert-cve-2025-22252-what-you-need-to-know&amp;amp;bu=https%253A%252F%252Fwww.logically.com%252Fsecurity-bulletin&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Fortinet</category>
      <pubDate>Thu, 15 May 2025 21:53:11 GMT</pubDate>
      <guid>https://www.logically.com/security-bulletin/fortinet-tacacs-vulnerability-alert-cve-2025-22252-what-you-need-to-know</guid>
      <dc:date>2025-05-15T21:53:11Z</dc:date>
      <dc:creator>Michael Webber</dc:creator>
    </item>
    <item>
      <title>Critical SonicWALL CVE Identified in Workplace Service – Immediate Action Recommended</title>
      <link>https://www.logically.com/security-bulletin/critical-sonicwall-cve-identified-in-workplace-service-immediate-action-recommended</link>
      <description>&lt;p&gt;At Logically, securing your technology environment is our top priority.&lt;/p&gt;</description>
      <content:encoded>&lt;p&gt;At Logically, securing your technology environment is our top priority.&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=4883612&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fwww.logically.com%2Fsecurity-bulletin%2Fcritical-sonicwall-cve-identified-in-workplace-service-immediate-action-recommended&amp;amp;bu=https%253A%252F%252Fwww.logically.com%252Fsecurity-bulletin&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>SonicWall</category>
      <pubDate>Thu, 15 May 2025 18:54:06 GMT</pubDate>
      <author>zack.finstad@logically.com (Zack Finstad)</author>
      <guid>https://www.logically.com/security-bulletin/critical-sonicwall-cve-identified-in-workplace-service-immediate-action-recommended</guid>
      <dc:date>2025-05-15T18:54:06Z</dc:date>
    </item>
    <item>
      <title>SonicWall Vulnerability Alert: CVE-2025-32818 | SNWLID-2025-0009</title>
      <link>https://www.logically.com/security-bulletin/sonicwall-vulnerability-alert-cve-2025-32818-snwlid-2025-0009</link>
      <description>&lt;p style="margin-top: 3.75pt; margin-right: 3.75pt; margin-bottom: 3.75pt; padding-left: 0in;"&gt;&amp;nbsp;&lt;/p&gt; 
&lt;h1 style="margin-top: 3.75pt; margin-right: 3.75pt; margin-bottom: 3.75pt; padding-left: 0in; text-align: center; font-size: 26px;"&gt;&lt;span&gt;&lt;strong&gt;SonicWall CVE-2025-32818: Logically’s Response and Action Plan&lt;/strong&gt;&lt;/span&gt;&lt;/h1&gt;</description>
      <content:encoded>&lt;p style="margin-top: 3.75pt; margin-right: 3.75pt; margin-bottom: 3.75pt; padding-left: 0in;"&gt;&amp;nbsp;&lt;/p&gt; 
&lt;h1 style="margin-top: 3.75pt; margin-right: 3.75pt; margin-bottom: 3.75pt; padding-left: 0in; text-align: center; font-size: 26px;"&gt;&lt;span&gt;&lt;strong&gt;SonicWall CVE-2025-32818: Logically’s Response and Action Plan&lt;/strong&gt;&lt;/span&gt;&lt;/h1&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=4883612&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fwww.logically.com%2Fsecurity-bulletin%2Fsonicwall-vulnerability-alert-cve-2025-32818-snwlid-2025-0009&amp;amp;bu=https%253A%252F%252Fwww.logically.com%252Fsecurity-bulletin&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>SonicWall</category>
      <pubDate>Mon, 28 Apr 2025 12:29:06 GMT</pubDate>
      <guid>https://www.logically.com/security-bulletin/sonicwall-vulnerability-alert-cve-2025-32818-snwlid-2025-0009</guid>
      <dc:date>2025-04-28T12:29:06Z</dc:date>
      <dc:creator>Kyle Sandy</dc:creator>
    </item>
    <item>
      <title>SonicWall Mobile Connect: Transitioning to NetExtender for Windows Users</title>
      <link>https://www.logically.com/security-bulletin/sonicwall-mobile-connect</link>
      <description>&lt;p&gt;&lt;span style="font-weight: bold;"&gt;S&lt;/span&gt;&lt;span&gt;&lt;strong&gt;onicWall Mobile Connect: Transitioning to NetExtender for Windows Users&lt;/strong&gt;&lt;/span&gt;&lt;/p&gt;</description>
      <content:encoded>&lt;p&gt;&lt;span style="font-weight: bold;"&gt;S&lt;/span&gt;&lt;span&gt;&lt;strong&gt;onicWall Mobile Connect: Transitioning to NetExtender for Windows Users&lt;/strong&gt;&lt;/span&gt;&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=4883612&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fwww.logically.com%2Fsecurity-bulletin%2Fsonicwall-mobile-connect&amp;amp;bu=https%253A%252F%252Fwww.logically.com%252Fsecurity-bulletin&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>SonicWall</category>
      <pubDate>Tue, 21 Jan 2025 17:40:06 GMT</pubDate>
      <author>zack.finstad@logically.com (Zack Finstad)</author>
      <guid>https://www.logically.com/security-bulletin/sonicwall-mobile-connect</guid>
      <dc:date>2025-01-21T17:40:06Z</dc:date>
    </item>
    <item>
      <title>Protect Yourself from Social Engineering Scams on Microsoft Teams</title>
      <link>https://www.logically.com/security-bulletin/protect-yourself-from-social-engineering-scams-on-microsoft-teams</link>
      <description>&lt;p&gt;&lt;span&gt;At Logically, your security is our priority. &lt;/span&gt;&lt;/p&gt; 
&lt;p&gt;&lt;span&gt;We want to alert you to a social engineering scam that is targeting our clients and many others. Scammers are exploiting the Microsoft Teams platform to impersonate trusted IT professionals, and it’s critical to stay vigilant. Here’s what you need to know:&lt;/span&gt;&lt;/p&gt;</description>
      <content:encoded>&lt;p&gt;&lt;span&gt;At Logically, your security is our priority. &lt;/span&gt;&lt;/p&gt; 
&lt;p&gt;&lt;span&gt;We want to alert you to a social engineering scam that is targeting our clients and many others. Scammers are exploiting the Microsoft Teams platform to impersonate trusted IT professionals, and it’s critical to stay vigilant. Here’s what you need to know:&lt;/span&gt;&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=4883612&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fwww.logically.com%2Fsecurity-bulletin%2Fprotect-yourself-from-social-engineering-scams-on-microsoft-teams&amp;amp;bu=https%253A%252F%252Fwww.logically.com%252Fsecurity-bulletin&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Microsoft</category>
      <pubDate>Mon, 20 Jan 2025 21:56:52 GMT</pubDate>
      <guid>https://www.logically.com/security-bulletin/protect-yourself-from-social-engineering-scams-on-microsoft-teams</guid>
      <dc:date>2025-01-20T21:56:52Z</dc:date>
      <dc:creator>Jake Tarrant</dc:creator>
    </item>
    <item>
      <title>Firmware Upgrade Required for Certain Fortinet Devices</title>
      <link>https://www.logically.com/security-bulletin/fortinet-cve-2024-55591</link>
      <description>&lt;p&gt;At Logically, we are committed to promoting cybersecurity awareness and safety within the broader community. We wish to inform you about a recently identified security vulnerability affecting specific Fortinet devices. This issue pertains to FortiOS (FortiGate) versions 7.0.0 to 7.0.16 and FortiProxy versions 7.0.0 to 7.0.19 &amp;amp; 7.2.0 to 7.2.12, cataloged under CVE-2024-55591.&lt;br&gt;&lt;/p&gt;</description>
      <content:encoded>&lt;p&gt;At Logically, we are committed to promoting cybersecurity awareness and safety within the broader community. We wish to inform you about a recently identified security vulnerability affecting specific Fortinet devices. This issue pertains to FortiOS (FortiGate) versions 7.0.0 to 7.0.16 and FortiProxy versions 7.0.0 to 7.0.19 &amp;amp; 7.2.0 to 7.2.12, cataloged under CVE-2024-55591.&lt;br&gt;&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=4883612&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fwww.logically.com%2Fsecurity-bulletin%2Ffortinet-cve-2024-55591&amp;amp;bu=https%253A%252F%252Fwww.logically.com%252Fsecurity-bulletin&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Fortinet</category>
      <pubDate>Wed, 15 Jan 2025 00:17:58 GMT</pubDate>
      <guid>https://www.logically.com/security-bulletin/fortinet-cve-2024-55591</guid>
      <dc:date>2025-01-15T00:17:58Z</dc:date>
      <dc:creator>Kyle Sandy</dc:creator>
    </item>
    <item>
      <title>SonicWall Known Exploited Vulnerabilities Update</title>
      <link>https://www.logically.com/security-bulletin/sonicwall-sma100-series</link>
      <description>&lt;p&gt;Keeping your network secure requires staying ahead of emerging threats. Recently, multiple vulnerabilities impacting the &lt;a href="https://www.logically.com/sonicwall"&gt;SonicWall&lt;/a&gt; SMA100 series have been identified, prompting swift action to ensure your devices are protected. Here's what you need to know and how Logically and SonicWall can support you in mitigating these risks.&lt;/p&gt;</description>
      <content:encoded>&lt;p&gt;Keeping your network secure requires staying ahead of emerging threats. Recently, multiple vulnerabilities impacting the &lt;a href="https://www.logically.com/sonicwall"&gt;SonicWall&lt;/a&gt; SMA100 series have been identified, prompting swift action to ensure your devices are protected. Here's what you need to know and how Logically and SonicWall can support you in mitigating these risks.&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=4883612&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fwww.logically.com%2Fsecurity-bulletin%2Fsonicwall-sma100-series&amp;amp;bu=https%253A%252F%252Fwww.logically.com%252Fsecurity-bulletin&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>SonicWall</category>
      <pubDate>Fri, 06 Dec 2024 02:36:18 GMT</pubDate>
      <guid>https://www.logically.com/security-bulletin/sonicwall-sma100-series</guid>
      <dc:date>2024-12-06T02:36:18Z</dc:date>
      <dc:creator>Kyle Sandy</dc:creator>
    </item>
    <item>
      <title>Fortinet VPN Zero Day</title>
      <link>https://www.logically.com/security-bulletin/fortinet-vpn-zero-day</link>
      <description>&lt;p&gt;Chinese threat actors, "BrazenBamboo," use a custom post-exploitation toolkit named &lt;em&gt;DeepData&lt;/em&gt; to exploit a zero-day vulnerability in Fortinet's FortiClient Windows VPN client. This vulnerability allows attackers to dump credentials from memory after a user authenticates with the VPN. &lt;em&gt;DeepData&lt;/em&gt; is a modular tool that employs multiple plugins for data theft, and its latest version includes a plugin specifically for extracting credentials and VPN server information from FortiClient by decrypting stored JSON objects in memory.&lt;br&gt;&lt;/p&gt;</description>
      <content:encoded>&lt;p&gt;Chinese threat actors, "BrazenBamboo," use a custom post-exploitation toolkit named &lt;em&gt;DeepData&lt;/em&gt; to exploit a zero-day vulnerability in Fortinet's FortiClient Windows VPN client. This vulnerability allows attackers to dump credentials from memory after a user authenticates with the VPN. &lt;em&gt;DeepData&lt;/em&gt; is a modular tool that employs multiple plugins for data theft, and its latest version includes a plugin specifically for extracting credentials and VPN server information from FortiClient by decrypting stored JSON objects in memory.&lt;br&gt;&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=4883612&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fwww.logically.com%2Fsecurity-bulletin%2Ffortinet-vpn-zero-day&amp;amp;bu=https%253A%252F%252Fwww.logically.com%252Fsecurity-bulletin&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Fortinet</category>
      <pubDate>Wed, 20 Nov 2024 21:10:26 GMT</pubDate>
      <guid>https://www.logically.com/security-bulletin/fortinet-vpn-zero-day</guid>
      <dc:date>2024-11-20T21:10:26Z</dc:date>
      <dc:creator>Michael Webber</dc:creator>
    </item>
    <item>
      <title>SonicOS Vulnerability – SNWLID-2024-0012</title>
      <link>https://www.logically.com/security-bulletin/sonicwall-snwlid-2024-0012</link>
      <description>&lt;p&gt;In a recent security update, SonicWall has added a new vulnerability, identified as SNWLID-2024-0012, to its Known Exploited Vulnerabilities Catalog. This vulnerability, tracked as CVE-2024-40764, affects the Gen 6 NSv and Gen 7 Firewalls series products. Here's what you need to know to ensure your network's security.&lt;/p&gt;</description>
      <content:encoded>&lt;p&gt;In a recent security update, SonicWall has added a new vulnerability, identified as SNWLID-2024-0012, to its Known Exploited Vulnerabilities Catalog. This vulnerability, tracked as CVE-2024-40764, affects the Gen 6 NSv and Gen 7 Firewalls series products. Here's what you need to know to ensure your network's security.&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=4883612&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fwww.logically.com%2Fsecurity-bulletin%2Fsonicwall-snwlid-2024-0012&amp;amp;bu=https%253A%252F%252Fwww.logically.com%252Fsecurity-bulletin&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>SonicWall</category>
      <pubDate>Fri, 19 Jul 2024 15:46:22 GMT</pubDate>
      <guid>https://www.logically.com/security-bulletin/sonicwall-snwlid-2024-0012</guid>
      <dc:date>2024-07-19T15:46:22Z</dc:date>
      <dc:creator>Kyle Sandy</dc:creator>
    </item>
  </channel>
</rss>
