Synology, a Taiwanese NAS device maker, has urgently released a security patch to mitigate a severe vulnerability affecting its DiskStation and BeePhotos products. The issue, identified as CVE-2024-10443 and named *RISK:STATION* by the security firm Midnight Blue, could allow attackers to execute remote code on affected devices. The vulnerability was publicly demonstrated by security researcher Rick de Jager during the Pwn2Own Ireland 2024 hacking contest, drawing attention to its potential for exploitation. This zero-click vulnerability is particularly dangerous because it does not require any user interaction to trigger. Attackers can exploit the flaw to gain root-level access to vulnerable Synology NAS devices, including popular models like DiskStation and BeeStation. Once exploited, the flaw could allow attackers to steal sensitive data, deploy malware, or otherwise compromise the devices. Given the widespread use of Synology products, millions of devices could be exposed to risk. The affected versions include BeePhotos for BeeStation OS 1.0 (which should be updated to 1.0.2-10026 or later), BeePhotos for BeeStation OS 1.1 (requiring an update to 1.1.0-10053 or higher), Synology Photos 1.6 for DSM 7.2 (which should be updated to 1.6.2-0720 or later), and Synology Photos 1.7 for DSM 7.2 (requiring an update to 1.7.0-0795 or above). Synology has withheld additional technical details to give users time to apply the patches, but it is estimated that between one and two million devices may be exposed to this vulnerability, many of which are accessible from the internet. This disclosure follows similar security concerns for QNAP, which recently patched critical vulnerabilities in its NAS devices, also demonstrated at Pwn2Own 2024. While there is no evidence that these vulnerabilities have been exploited in the wild, both Synology and QNAP users are strongly urged to apply the necessary updates without delay.
Microsoft has released its September 2025 Patch Tuesday security updates, addressing 81 vulnerabilities, including two publicly disclosed zero-day flaws (CVE-2025-55234 and CVE-202...
Rockwell Automation has issued a critical advisory for a vulnerability tracked as CVE-2025-7350, affecting its Stratix industrial Ethernet switches. The flaw, rated 9.6 CVSS 3.1 sc...
In June 2025, Chess.com suffered a data breach when attackers exploited a third-party file transfer tool used by the platform. The intrusion took place between June 5 and June 18, ...