Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Google Patches Mysterious Chrome Zero-Day Exploited in the Wild

Posted on December 11, 2025December 11, 2025 By CWS

Google has launched a safety replace for its Chrome browser, addressing a zero-day vulnerability that the corporate confirms is actively being exploited within the wild.

A number of exploited zero-day vulnerabilities have been patched by the web large in Chrome this yr. Nevertheless, the corporate has all the time shared a quick description of the flaw when saying patches.

On the time of writing, the most recent Chrome zero-day doesn’t have a CVE identifier, and it’s unclear which element of the browser it impacts. The corporate is at the moment figuring out it utilizing a bug tracker ID (466192044) and has marked it as ‘beneath coordination’.

It’s additionally unclear who found the vulnerability and when it was reported to Google. The one piece of knowledge that’s obtainable is that the safety gap has a ‘excessive severity’ score. 

Based mostly on historic traits of actively exploited Chrome zero-days, this flaw could also be a reminiscence corruption difficulty (probably kind confusion or use-after-free) throughout the V8 JavaScript engine or a associated element.

Most of these vulnerabilities can usually be leveraged for a sandbox escape or distant code execution. 

Chrome zero-days are ceaselessly exploited by government-sponsored espionage campaigns that make the most of refined business spy ware. This means that the mysterious vulnerability could have been a part of a focused, slightly than widespread, assault marketing campaign.

The zero-day has been patched with a Chrome 143 replace that additionally addresses two medium-severity points: a use-after-free within the browser’s password supervisor, and an inappropriate implementation flaw within the toolbar element. 

Every of those safety holes earned the reporting researchers a $2,000 bug bounty. Commercial. Scroll to proceed studying.

Associated: Google Fortifies Chrome Agentic AI In opposition to Oblique Immediate Injection Assaults

Associated: Chrome, Edge Extensions Caught Monitoring Customers, Creating Backdoors

Associated: Chrome to Flip HTTPS on by Default for Public Websites

Security Week News Tags:Chrome, Exploited, Google, Mysterious, Patches, Wild, ZeroDay

Post navigation

Previous Post: Chrome Targeted by Active In-the-Wild Exploit Tied to Undisclosed High-Severity Flaw
Next Post: Hackers Infiltrate VS Code Marketplace with 19 Malicious Extensions Posing as PNG File

Related Posts

High-Severity Vulnerabilities Patched in Tenable Nessus Agent Security Week News
Reach Security Raises $10 Million for Exposure Management Solution Security Week News
Hijacked Satellites and Orbiting Space Weapons: In the 21st Century, Space Is the New Battlefield Security Week News
Spyware Maker NSO Ordered to Pay $167 Million Over WhatsApp Hack Security Week News
New Campaigns Distribute Malware via Open Source Hacking Tools Security Week News
Valuable Information Leaked in LockBit Ransomware Hack  Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Recent GeoServer Vulnerability Exploited in Attacks
  • Microsoft Bug Bounty Program Expanded to Third-Party Code
  • New BlackForce Phishing Kit Lets Attackers Steal Credentials Using MitB Attacks and Bypass MFA
  • Policy, Isolation, and Data Controls That Actually Work
  • Beware of Fake Leonardo DiCaprio Movie Torrent File Drops Agent Tesla Malware

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Recent GeoServer Vulnerability Exploited in Attacks
  • Microsoft Bug Bounty Program Expanded to Third-Party Code
  • New BlackForce Phishing Kit Lets Attackers Steal Credentials Using MitB Attacks and Bypass MFA
  • Policy, Isolation, and Data Controls That Actually Work
  • Beware of Fake Leonardo DiCaprio Movie Torrent File Drops Agent Tesla Malware

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2025 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark