QNAP has had plenty of embarrassing bugs and zero days. They have tried to shift to a more security focused architecture, and are catching the other side of that sword right now.
QNAP’s firmware push was intended, in part, to cover recent security vulnerabilities in their devices. QNAP devices are a rich and frequent target of criminal hackers. A severe vulnerability from February 2023 allowed for remote SQL injections and potential administrative control of a device, affecting nearly 30,000 devices seen in network scans. It was a follow-on from attacks by DeadBolt, a ransomware gang that infected thousands of QNAP devices and cornered QNAP into automatically pushing emergency updates, even to customers with automatic updates turned off.
Security researchers at WatchTowr said they found 15 vulnerabilities in QNAP’s operating systems and cloud services and informed the company of them. After QNAP failed to patch some of those vulnerabilities far beyond the typical 90-day window (and then some), WatchTowr went public with its findings, dubbed “QNAPping at the Wheel.”
QNAP locking people out, while D-Link is letting anybody in.
Everyone talks about D-Link devices but I’m yet to see one. Is that a brand wildly popular in US but unknown elsewhere?
you must’ve been living under a rock the past few decades
They are pretty big in Europe.
Here is a link for your country: https://d-link.com.tr/
They’re Taiwanese, sell worldwide and have been around for 40 years, so I don’t know why you’ve never heard of them.
Put them in a blender together and you’ll get one that lets in only the right folks and one that lets in only the wrong ones.
I think they should get married.
QNAP has had plenty of embarrassing bugs and zero days. They have tried to shift to a more security focused architecture, and are catching the other side of that sword right now.