Hosted on MSN
A poisoned Asus utility tool was found online
CISA added a critical Asus Live Update supply‑chain compromise (CVE‑2025‑59374) to KEV, tied to tampered installers distributed before 2021 The flaw stems from the 2018–2019 incident, where attackers ...
Software security firm Kaspersky Lab announced on Monday that Asus computer users were targeted last year with malware via Asus' update utility in a so-called "supply-chain attack." The attackers were ...
Security vendor Kaspersky has disclosed today a new advanced persistent threat (APT) that it claims to have potentially affected more than a million users of ASUS hardware worldwide. The hackers ...
A cybercriminal campaign focused on targeting the supply chain through the exploitation of ASUS Live Update software may have involved the installation of backdoors on over one million PCs. On Monday, ...
On Monday, we saw once again how criminals can exploit trust and use it as a weakness. Cybersecurity reporter Kim Zetter revealed that one of the world’s largest computer manufacturers, Taiwan-based ...
The attack appears to be associated with a China-backed APT actor. A supply-chain attack dubbed “Operation ShadowHammer” has been uncovered, targeting users of the ASUS Live Update Utility with a ...
Kaspersky Lab says that thousands of Asus computers have been infected by malware via the company's own Live Update Utility tool, as hackers compromised the software and inserted a backdoor. Dubbed ...
Today's news that hackers put backdoors into thousands of Asus computers using the company's own software update platform is a reminder of why supply-chain compromises are one of the scariest digital ...
If you have an ASUS computer that is running the company’s Live Update utility, it’s possible that your system was susceptible to backdoor intrusions during the latter half of 2018. The folks at ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results