Close Menu
Pineapples Update –Pineapples Update –

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    I tried 0patch as a last resort for my Windows 10 PC – here’s how it compares to its promises

    January 20, 2026

    A PC Expert Explains Why Don’t Use Your Router’s USB Port When These Options Are Present

    January 20, 2026

    New ‘Remote Labor Index’ shows AI fails 97% of the time in freelancer tasks

    January 19, 2026
    Facebook X (Twitter) Instagram
    Facebook X (Twitter) Instagram Pinterest Vimeo
    Pineapples Update –Pineapples Update –
    • Home
    • Gaming
    • Gadgets
    • Startups
    • Security
    • How-To
    • AI/ML
    • Apps
    • Web3
    Pineapples Update –Pineapples Update –
    Home»Security»CISA tag recently actively packed the Chrome bug as an active exploitation
    Security

    CISA tag recently actively packed the Chrome bug as an active exploitation

    PineapplesUpdateBy PineapplesUpdateMay 18, 2025No Comments2 Mins Read
    Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
    CISA tag recently actively packed the Chrome bug as an active exploitation
    Share
    Facebook Twitter LinkedIn Pinterest Email

    CISA tag recently actively packed the Chrome bug as an active exploitation

    On Thursday, CISA warned American federal agencies to secure their system against the ongoing attacks, exploiting high-seriousness vulnerability in the Chrome web browser.

    Solidlab security researcher Vsevolod Kokorin shared the blame (CVE-2025-4664) and online technical details on 5 May. Google on Wednesday issued security updates to patch it.

    As Cocorin explained, is vulnerable Payable For insufficient policy enforcement in Google Chrome’s loader component, and successful exploitation may allow remote attackers to leak cross-zo data through maliciously designed HTML pages.

    “You probably know that unlike other browsers, Chrome solves the link header on subresores requests. But what is the problem? The issue is that the link header can set a refer-policy. Cocorine noted,

    “Querry parameters can contain sensitive data – for example, in Oauth flow, this can lead to an account acquisition. Developers rarely consider the possibility of stealing query parameters through an image from 3 -party resources.”

    While Google did not disclose whether the vulnerability was misused in the attacks earlier or if it is still being exploited, it warns a security advisor that it has a public exploitation, which usually indicates active exploitation.

    Actively marked as exploitation

    A day later, Sisa confirmed CVE-2025-4664 is being abused in the wild and added Known exploitative weaknesses catalogWhich actively lists exploited security defects in attacks.

    As November 2021 Binding Binding Operational Directive (BOD) 22-01, US Federal Civilian Executive Branch (FCB) agencies will have to patch their chrome installation within three weeks by May 7 to secure their system against potential violations.

    While this instruction applies only to federal agencies, all network defenders are advised to prioritize patching as soon as possible to this vulnerability.

    The cyber security agency warned, “These types of weaknesses are frequent attacks for malicious cyber actors and pose a significant risk for federal enterprises.”

    This year has been an actively exploited chrome zero-day patches by Google after another high-seriousness chrome zero-day bug (CVE-2025-2783), misused to target Russian government organizations, media outlets and educational institutions in cyber-Jasucian attacks.

    Researchers in Kascski, who looked at the zero-day attacks, said the danger actors exploited the CVE-2025-2783 to bypass Google Chrome’s sandbox security and infect the target with malware.


    Red Report 2025

    Based on the analysis of 14M malicious tasks, search for the top 10 MITERAT & CK techniques behind the 93% attacks and how to defend them against them.

    Active actively Bug Chrome CISA exploitation packed Tag
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Previous ArticleWhat is a planet alignment and how do you see it?
    Next Article Acer Frequence Smart Ring Slech Looks Series and Leaves Subscription Model
    PineapplesUpdate
    • Website

    Related Posts

    Startups

    How I used GPT-5.2-Codecs to solve a mystery bug and hosting nightmare in less than an hour

    January 19, 2026
    Startups

    This lightweight distro packed with apps isn’t your dad’s GNU/Linux – here’s why

    January 9, 2026
    Startups

    Why I Keep This Bluetooth Tracker Tag on My Keychain Instead of an AirTag – and I Don’t Regret It

    January 7, 2026
    Add A Comment
    Leave A Reply Cancel Reply

    Top Posts

    Microsoft’s new text editor is a VIM and Nano option

    May 19, 2025797 Views

    The best luxury car for buyers for the first time in 2025

    May 19, 2025724 Views

    Massives Datenleck in Cloud-Spichenn | CSO online

    May 19, 2025650 Views
    Stay In Touch
    • Facebook
    • YouTube
    • TikTok
    • WhatsApp
    • Twitter
    • Instagram
    Latest Reviews

    Subscribe to Updates

    Get the latest tech news from FooBar about tech, design and biz.

    Most Popular

    10,000 steps or Japanese walk? We ask experts if you should walk ahead or fast

    June 16, 20250 Views

    FIFA Club World Cup Soccer: Stream Palmirus vs. Porto lives from anywhere

    June 16, 20250 Views

    What do chatbott is careful about punctuation? I tested it with chat, Gemini and Cloud

    June 16, 20250 Views
    Our Picks

    I tried 0patch as a last resort for my Windows 10 PC – here’s how it compares to its promises

    January 20, 2026

    A PC Expert Explains Why Don’t Use Your Router’s USB Port When These Options Are Present

    January 20, 2026

    New ‘Remote Labor Index’ shows AI fails 97% of the time in freelancer tasks

    January 19, 2026

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    Facebook X (Twitter) Instagram Pinterest
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms And Conditions
    • Disclaimer
    © 2026 PineapplesUpdate. Designed by Pro.

    Type above and press Enter to search. Press Esc to cancel.