117
Over 92,000 exposed D-Link NAS devices have a backdoor account
(www.bleepingcomputer.com)
c/cybersecurity is a community centered on the cybersecurity and information security profession. You can come here to discuss news, post something interesting, or just chat with others.
THE RULES
Instance Rules
Community Rules
If you ask someone to hack your "friends" socials you're just going to get banned so don't do that.
Learn about hacking
Other security-related communities !databreaches@lemmy.zip !netsec@lemmy.world !cybersecurity@lemmy.capebreton.social !securitynews@infosec.pub !netsec@links.hackliberty.org !cybersecurity@infosec.pub !pulse_of_truth@infosec.pub
Notable mention to !cybersecuritymemes@lemmy.world
Is there a nice up to date list of companies like this that have clearly little desire to improve security or are just very anti consumer?
They're all like that. Unless it's enterprise grade gear, which has a much longer support plan (although this kind of thing can happen there as well). It's a classic with domestic network gear.
Your way out is to replace the original firmware with an open source one if possible. Of course if you buy a brand new model, you don't know if it's going to eventually be supported.
For nas specifically, synology is usually fairly reliable, or you can build your own with one of several specialised system distributions, such as Truenas (there are several others). It may require a bit of learning, depending on how familiar you are with computing and networking.
Cool. My rule of thumb of only buying products that either are open source or can have open source firmware and software is sticking.
That's really the only reasonable way to go nowadays.