Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Chrome Targeted by Active In-the-Wild Exploit Tied to Undisclosed High-Severity Flaw

Chrome Targeted by Active In-the-Wild Exploit Tied to Undisclosed High-Severity Flaw

Posted on December 11, 2025December 11, 2025 By CWS

Dec 11, 2025Ravie LakshmananZero-Day / Vulnerability
Google on Wednesday shipped safety updates for its Chrome browser to handle three safety flaws, together with one it stated has come beneath energetic exploitation within the wild.
The vulnerability, rated excessive in severity, is being tracked beneath the Chromium difficulty tracker ID “466192044.” In contrast to different disclosures, Google has opted to maintain details about the CVE identifier, the affected part, and the character of the flaw beneath wraps.
“Google is conscious that an exploit for 466192044 exists within the wild,” the corporate famous, including that extra particulars are “beneath coordination.”
Naturally, the tech large has additionally not disclosed any specifics on the id of the menace actor behind the assaults, who might have been focused, or the size of such efforts.
That is usually achieved in order to make sure that a majority of the customers have utilized the fixes and to forestall different unhealthy actors from reverse engineering the patch and creating their very own exploits.

With the newest replace, Google has addressed eight zero-day flaws in Chrome which have been both actively exploited or demonstrated as a proof-of-concept (PoC) for the reason that begin of the 12 months. The checklist consists of CVE-2025-2783, CVE-2025-4664, CVE-2025-5419, CVE-2025-6554, CVE-2025-6558, CVE-2025-10585, and CVE-2025-13223.
Additionally addressed by Google are two different medium-severity vulnerabilities –

CVE-2025-14372 – Use-after-free in Password Supervisor
CVE-2025-14373 – Inappropriate implementation in Toolbar

To safeguard towards potential threats, it is suggested to replace their Chrome browser to variations 143.0.7499.109/.110 for Home windows and Apple macOS, and 143.0.7499.109 for Linux. To verify the newest updates are put in, customers can navigate to Extra > Assist > About Google Chrome and choose Relaunch.
Customers of different Chromium-based browsers, corresponding to Microsoft Edge, Courageous, Opera, and Vivaldi, are additionally suggested to use the fixes as and once they turn into obtainable.

The Hacker News Tags:Active, Chrome, Exploit, Flaw, HighSeverity, InTheWild, Targeted, Tied, Undisclosed

Post navigation

Previous Post: Active Attacks Exploit Gladinet’s Hard-Coded Keys for Unauthorized Access and Code Execution
Next Post: Google Patches Mysterious Chrome Zero-Day Exploited in the Wild

Related Posts

Grafana Patches CVSS 10.0 SCIM Flaw Enabling Impersonation and Privilege Escalation Grafana Patches CVSS 10.0 SCIM Flaw Enabling Impersonation and Privilege Escalation The Hacker News
Microsoft Mitigates Record 15.72 Tbps DDoS Attack Driven by AISURU Botnet Microsoft Mitigates Record 15.72 Tbps DDoS Attack Driven by AISURU Botnet The Hacker News
The Wild West of Shadow IT The Wild West of Shadow IT The Hacker News
Malicious Outlook Add-In Exploits Supply Chain Flaws Malicious Outlook Add-In Exploits Supply Chain Flaws The Hacker News
Iran-Linked RedKitten Cyber Campaign Targets Human Rights NGOs and Activists Iran-Linked RedKitten Cyber Campaign Targets Human Rights NGOs and Activists The Hacker News
Malicious PyPI and npm Packages Discovered Exploiting Dependencies in Supply Chain Attacks Malicious PyPI and npm Packages Discovered Exploiting Dependencies in Supply Chain Attacks The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages
  • DragonForce Ransomware Group’s Expanding Cartel Operations
  • North Korean Hackers Exploit AI for Enhanced Cyber Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages
  • DragonForce Ransomware Group’s Expanding Cartel Operations
  • North Korean Hackers Exploit AI for Enhanced Cyber Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News