An ASUS Live Update vulnerability tracked as CVE-2025-59374 has been making the rounds in infosec feeds, with some headlines ...
A cybercriminal campaign focused on targeting the supply chain through the exploitation of ASUS Live Update software may have involved the installation of backdoors on over one million PCs. On Monday, ...
Asus confirmed Tuesday that “a small number of devices” had been implemented with malicious code following an attack on its Live Update utility. That app has been patched, Asus said. Asus said that it ...
CISA adds a critical ASUS Live Update vulnerability to its KEV list, citing active exploitation linked to a past supply chain ...
Usually, when CISA adds flaws to KEV, it means that Federal Civilian Executive Branch agencies have a three-week deadline to patch up or stop using the products entirely. For the ASUS flaw, agencies ...
Hackers are said to have installed backdoors on PCs through Asus's Live Update software. When you purchase through links on our site, we may earn an affiliate commission. Here’s how it works. Update: ...
Thought the attack appears to have targeted a list of 600 machines, the associated malware made its way to an estimated one million people, according to Kaspersky Labs. When you purchase through links ...
A highly sophisticated cyberattack designed to look like a routine software update misled more than 57,000 Asus laptop owners, mostly in Russia, into installing malware that granted “backdoor” access ...
Two weeks into the launch, ASUS’s latest gaming superphone, the ROG Phone 5, is already receiving its third software update. The device is picking up the latest update with firmware version ...
Posts from this author will be added to your daily email digest and your homepage feed. It’s not clear what the hackers were after. However, the hackers did seem to target specific Asus customers: the ...
An attack on the update system for ASUS personal computers allowed attackers to inject backdoor malware into thousands of computers, according to researchers at Kaspersky Labs. The attack, reported ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results
Feedback