Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Chrome Targeted by Active In-the-Wild Exploit Tied to Undisclosed High-Severity Flaw

Chrome Targeted by Active In-the-Wild Exploit Tied to Undisclosed High-Severity Flaw

Posted on December 11, 2025December 11, 2025 By CWS

Dec 11, 2025Ravie LakshmananZero-Day / Vulnerability
Google on Wednesday shipped safety updates for its Chrome browser to handle three safety flaws, together with one it stated has come beneath energetic exploitation within the wild.
The vulnerability, rated excessive in severity, is being tracked beneath the Chromium difficulty tracker ID “466192044.” In contrast to different disclosures, Google has opted to maintain details about the CVE identifier, the affected part, and the character of the flaw beneath wraps.
“Google is conscious that an exploit for 466192044 exists within the wild,” the corporate famous, including that extra particulars are “beneath coordination.”
Naturally, the tech large has additionally not disclosed any specifics on the id of the menace actor behind the assaults, who might have been focused, or the size of such efforts.
That is usually achieved in order to make sure that a majority of the customers have utilized the fixes and to forestall different unhealthy actors from reverse engineering the patch and creating their very own exploits.

With the newest replace, Google has addressed eight zero-day flaws in Chrome which have been both actively exploited or demonstrated as a proof-of-concept (PoC) for the reason that begin of the 12 months. The checklist consists of CVE-2025-2783, CVE-2025-4664, CVE-2025-5419, CVE-2025-6554, CVE-2025-6558, CVE-2025-10585, and CVE-2025-13223.
Additionally addressed by Google are two different medium-severity vulnerabilities –

CVE-2025-14372 – Use-after-free in Password Supervisor
CVE-2025-14373 – Inappropriate implementation in Toolbar

To safeguard towards potential threats, it is suggested to replace their Chrome browser to variations 143.0.7499.109/.110 for Home windows and Apple macOS, and 143.0.7499.109 for Linux. To verify the newest updates are put in, customers can navigate to Extra > Assist > About Google Chrome and choose Relaunch.
Customers of different Chromium-based browsers, corresponding to Microsoft Edge, Courageous, Opera, and Vivaldi, are additionally suggested to use the fixes as and once they turn into obtainable.

The Hacker News Tags:Active, Chrome, Exploit, Flaw, HighSeverity, InTheWild, Targeted, Tied, Undisclosed

Post navigation

Previous Post: Active Attacks Exploit Gladinet’s Hard-Coded Keys for Unauthorized Access and Code Execution
Next Post: Google Patches Mysterious Chrome Zero-Day Exploited in the Wild

Related Posts

Cisco 0-Day, Record DDoS, LockBit 5.0, BMC Bugs, ShadowV2 Botnet & More Cisco 0-Day, Record DDoS, LockBit 5.0, BMC Bugs, ShadowV2 Botnet & More The Hacker News
How Threat Hunting Builds Readiness How Threat Hunting Builds Readiness The Hacker News
The Future of Cybersecurity Includes Non-Human Employees The Future of Cybersecurity Includes Non-Human Employees The Hacker News
Security Patches Released by Over 60 Software Vendors Security Patches Released by Over 60 Software Vendors The Hacker News
Oracle Resolves Critical RCE Vulnerability in Identity Manager Oracle Resolves Critical RCE Vulnerability in Identity Manager The Hacker News
Hackers Exploit Fake Resumes to Launch Crypto Miners Hackers Exploit Fake Resumes to Launch Crypto Miners The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Huskeys Secures $8 Million in Seed Funding for ESM Platform
  • Critical XSS Flaw in Jira Could Compromise Organizations
  • Russian Group Star Blizzard Utilizes DarkSword iOS Exploit
  • Secrets Sprawl Expands in 2026: Key Insights for CISOs
  • Urgent Patches Address Critical Grafana Security Flaws

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Huskeys Secures $8 Million in Seed Funding for ESM Platform
  • Critical XSS Flaw in Jira Could Compromise Organizations
  • Russian Group Star Blizzard Utilizes DarkSword iOS Exploit
  • Secrets Sprawl Expands in 2026: Key Insights for CISOs
  • Urgent Patches Address Critical Grafana Security Flaws

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark