


NAS is at risk of being invaded and controlled. ASUSTOR urges users to update repair applications immediately
According to news from this site on February 8, ASUSTOR, a network storage brand owned by ASUS (this site's note: formerly known as "ASUSTOR"), recently issued a security advisory, urging users of its NAS and other devices to immediately use the Surveillance Center The monitoring center application is upgraded to the latest version to prevent attackers from gaining control by exploiting vulnerabilities in older versions of the application.

According to the announcement on the AiSote English official website , “The Surveillance Center app is pushing an emergency update to address a critical vulnerability detected in the software that could allow an attacker to escalate privileges and gain control of the device to execute code on the ADM (operating system) to install malware .This update fixes the underlying vulnerability.Asote strongly recommends that all users of the Surveillance Center for ADM application install the latest version as soon as possible to minimize their risk of being infected by malware.Asote also It is recommended to take additional security measures to prevent the potential harm of malware.”
Aisute official also reminds users to take the following measures to improve security:
Change the password and improve the password strength.
Change the system HTTP and HTTPS communication ports (do not use the default 8000 and 8001).
If there is no need to use SSH and SFTP services, please do not enable them. If you need to use it, please close the service immediately after use.
Please perform data backup and create snapshots regularly.
Enable risky IP detection function.
The above is the detailed content of NAS is at risk of being invaded and controlled. ASUSTOR urges users to update repair applications immediately. For more information, please follow other related articles on the PHP Chinese website!

Stay informed about the latest tech trends with these top developer newsletters! This curated list offers something for everyone, from AI enthusiasts to seasoned backend and frontend developers. Choose your favorites and save time searching for rel

This tutorial guides you through building a serverless image processing pipeline using AWS services. We'll create a Next.js frontend deployed on an ECS Fargate cluster, interacting with an API Gateway, Lambda functions, S3 buckets, and DynamoDB. Th

This pilot program, a collaboration between the CNCF (Cloud Native Computing Foundation), Ampere Computing, Equinix Metal, and Actuated, streamlines arm64 CI/CD for CNCF GitHub projects. The initiative addresses security concerns and performance lim


Hot AI Tools

Undresser.AI Undress
AI-powered app for creating realistic nude photos

AI Clothes Remover
Online AI tool for removing clothes from photos.

Undress AI Tool
Undress images for free

Clothoff.io
AI clothes remover

Video Face Swap
Swap faces in any video effortlessly with our completely free AI face swap tool!

Hot Article

Hot Tools

MinGW - Minimalist GNU for Windows
This project is in the process of being migrated to osdn.net/projects/mingw, you can continue to follow us there. MinGW: A native Windows port of the GNU Compiler Collection (GCC), freely distributable import libraries and header files for building native Windows applications; includes extensions to the MSVC runtime to support C99 functionality. All MinGW software can run on 64-bit Windows platforms.

mPDF
mPDF is a PHP library that can generate PDF files from UTF-8 encoded HTML. The original author, Ian Back, wrote mPDF to output PDF files "on the fly" from his website and handle different languages. It is slower than original scripts like HTML2FPDF and produces larger files when using Unicode fonts, but supports CSS styles etc. and has a lot of enhancements. Supports almost all languages, including RTL (Arabic and Hebrew) and CJK (Chinese, Japanese and Korean). Supports nested block-level elements (such as P, DIV),

SecLists
SecLists is the ultimate security tester's companion. It is a collection of various types of lists that are frequently used during security assessments, all in one place. SecLists helps make security testing more efficient and productive by conveniently providing all the lists a security tester might need. List types include usernames, passwords, URLs, fuzzing payloads, sensitive data patterns, web shells, and more. The tester can simply pull this repository onto a new test machine and he will have access to every type of list he needs.

EditPlus Chinese cracked version
Small size, syntax highlighting, does not support code prompt function

DVWA
Damn Vulnerable Web App (DVWA) is a PHP/MySQL web application that is very vulnerable. Its main goals are to be an aid for security professionals to test their skills and tools in a legal environment, to help web developers better understand the process of securing web applications, and to help teachers/students teach/learn in a classroom environment Web application security. The goal of DVWA is to practice some of the most common web vulnerabilities through a simple and straightforward interface, with varying degrees of difficulty. Please note that this software
