Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Chrome Targeted by Active In-the-Wild Exploit Tied to Undisclosed High-Severity Flaw

Chrome Targeted by Active In-the-Wild Exploit Tied to Undisclosed High-Severity Flaw

Posted on December 11, 2025December 11, 2025 By CWS

Dec 11, 2025Ravie LakshmananZero-Day / Vulnerability
Google on Wednesday shipped safety updates for its Chrome browser to handle three safety flaws, together with one it stated has come beneath energetic exploitation within the wild.
The vulnerability, rated excessive in severity, is being tracked beneath the Chromium difficulty tracker ID “466192044.” In contrast to different disclosures, Google has opted to maintain details about the CVE identifier, the affected part, and the character of the flaw beneath wraps.
“Google is conscious that an exploit for 466192044 exists within the wild,” the corporate famous, including that extra particulars are “beneath coordination.”
Naturally, the tech large has additionally not disclosed any specifics on the id of the menace actor behind the assaults, who might have been focused, or the size of such efforts.
That is usually achieved in order to make sure that a majority of the customers have utilized the fixes and to forestall different unhealthy actors from reverse engineering the patch and creating their very own exploits.

With the newest replace, Google has addressed eight zero-day flaws in Chrome which have been both actively exploited or demonstrated as a proof-of-concept (PoC) for the reason that begin of the 12 months. The checklist consists of CVE-2025-2783, CVE-2025-4664, CVE-2025-5419, CVE-2025-6554, CVE-2025-6558, CVE-2025-10585, and CVE-2025-13223.
Additionally addressed by Google are two different medium-severity vulnerabilities –

CVE-2025-14372 – Use-after-free in Password Supervisor
CVE-2025-14373 – Inappropriate implementation in Toolbar

To safeguard towards potential threats, it is suggested to replace their Chrome browser to variations 143.0.7499.109/.110 for Home windows and Apple macOS, and 143.0.7499.109 for Linux. To verify the newest updates are put in, customers can navigate to Extra > Assist > About Google Chrome and choose Relaunch.
Customers of different Chromium-based browsers, corresponding to Microsoft Edge, Courageous, Opera, and Vivaldi, are additionally suggested to use the fixes as and once they turn into obtainable.

The Hacker News Tags:Active, Chrome, Exploit, Flaw, HighSeverity, InTheWild, Targeted, Tied, Undisclosed

Post navigation

Previous Post: Active Attacks Exploit Gladinet’s Hard-Coded Keys for Unauthorized Access and Code Execution
Next Post: Google Patches Mysterious Chrome Zero-Day Exploited in the Wild

Related Posts

WhatsApp Worm Spreads Astaroth Banking Trojan Across Brazil via Contact Auto-Messaging WhatsApp Worm Spreads Astaroth Banking Trojan Across Brazil via Contact Auto-Messaging The Hacker News
New StackWarp Hardware Flaw Breaks AMD SEV-SNP Protections on Zen 1–5 CPUs New StackWarp Hardware Flaw Breaks AMD SEV-SNP Protections on Zen 1–5 CPUs The Hacker News
Chrome Zero-Day Exploited to Deliver Italian Memento Labs’ LeetAgent Spyware Chrome Zero-Day Exploited to Deliver Italian Memento Labs’ LeetAgent Spyware The Hacker News
SEC Files Charges Over  Million Crypto Scam Using Fake AI-Themed Investment Tips SEC Files Charges Over $14 Million Crypto Scam Using Fake AI-Themed Investment Tips The Hacker News
New MacSync macOS Stealer Uses Signed App to Bypass Apple Gatekeeper New MacSync macOS Stealer Uses Signed App to Bypass Apple Gatekeeper The Hacker News
That Network Traffic Looks Legit, But it Could be Hiding a Serious Threat That Network Traffic Looks Legit, But it Could be Hiding a Serious Threat The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News