Close Menu
Pineapples Update –Pineapples Update –

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    Soul is above $ 151 after sharp pullback

    June 8, 2025

    How to capture Nintendo Switch 2 in 4K

    June 8, 2025

    Forget Otter.ai: Chat only entered the meeting room

    June 8, 2025
    Facebook X (Twitter) Instagram
    Facebook X (Twitter) Instagram Pinterest Vimeo
    Pineapples Update –Pineapples Update –
    • Home
    • Gaming
    • Gadgets
    • Startups
    • Security
    • How-To
    • AI/ML
    • Apps
    • Web3
    Pineapples Update –Pineapples Update –
    Home»Security»Google exploits new chrome zero-day bug in attacks
    Security

    Google exploits new chrome zero-day bug in attacks

    PineapplesUpdateBy PineapplesUpdateJune 3, 2025No Comments3 Mins Read
    Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
    Google exploits new chrome zero-day bug in attacks
    Share
    Facebook Twitter LinkedIn Pinterest Email

    Google exploits new chrome zero-day bug in attacks

    Google has released an emergency safety update to fix the third chrome zero-day vulnerability exploited in attacks since the beginning of the year.

    “Google knows that an exploitation for CVE-2025-5419 is present in the wild,” the company warned Security Consulting Published on Monday.

    This high-seriousness is due to the weakness of reading and writing an out-of-bounds in the V8 JavaScript engine of Chrome, reported by Benoit Sevens of Clement Lesigne and Google’s Threat Analysis Group a week ago.

    Google says the issue was reduced a day later when the company was pushed to the stable channel on all chrome platforms by a configuration change.

    On Monday, it also set a zero-day for Windows/Mac for 137.0.7151.68/69 and 137.0.0.7151.68 for Linux, for Linux, editions that are rolling for users in the stable desktop channels in the coming weeks.

    While the chrome will be automatically updated when the new security patch is available, users can move the process by going to Chrome Menu> Help> about Google Chrome, allowing to finish the update, and click on the ‘Relach’ button to install it immediately.

    Chrome 137.0.7151.69

    While Google has already confirmed that the CVE-2025-5419 is being exploited in the wild, the company will not share additional information about these attacks unless more users have patching their browsers.

    Google said, “Access to the buggle details and links can be banned until most users are updated with the fix,” Google said. “We will also maintain the restriction if the bug is present in a third party library that depends like other projects, but not yet decided.”

    With two more patch in March and May, this is Google’s third chrome zero-day vulnerability since the beginning of the year.

    The first, discovered by Boris Larin and Igor Kuznetsov of Kasperki, was used to deploy malware in a high-seriousness Sandbox Escape Floe (CVE-2025-2783) to deploy malware in espionage attacks targeting Russian government organizations and media outlets.

    The company released another set of emergency safety updates in May to patch Chrome zero-day in May, allowing the attackers to handle accounts after successful exploitation.

    Last year, Google patches 10 zero-days, which were either demolished during the PWN2OWN hacking competition or exploited in attacks.


    Tines needle

    Manual patching is old. It is slow, error-prone and hard for scale.

    On June 4, join Kandji + Tines, to see why the older methods are short. See the real -world examples of how modern teams use automation to patch rapid patching, risk cuts, obedient stay and leaving complex scripts.

    attacks Bug Chrome exploits Google zeroday
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Previous ArticleMicrosoft Windows users in Europe can now uninstall the Microsoft Store, Microsoft Edge Default Signs
    Next Article Pixel 10 Pro image can give us its best on phone so far – and it looks very familiar
    PineapplesUpdate
    • Website

    Related Posts

    Security

    Remove project directors presented as malicious NPM package utilities

    June 8, 2025
    Security

    Supply series attacks Glustac NPM package with 960K weekly download

    June 7, 2025
    Security

    Exploitation of Critical Round Cube webmail as hacker taking intly

    June 7, 2025
    Add A Comment
    Leave A Reply Cancel Reply

    Top Posts

    Microsoft’s new text editor is a VIM and Nano option

    May 19, 2025595 Views

    The best luxury car for buyers for the first time in 2025

    May 19, 2025538 Views

    Massives Datenleck in Cloud-Spichenn | CSO online

    May 19, 2025466 Views
    Stay In Touch
    • Facebook
    • YouTube
    • TikTok
    • WhatsApp
    • Twitter
    • Instagram
    Latest Reviews

    Subscribe to Updates

    Get the latest tech news from FooBar about tech, design and biz.

    Most Popular

    The new coding agent of Chatgpt is very big, even if you are not a programmer

    May 16, 20250 Views

    Google’s AI overview is often wrong with so confident that I have lost all confidence in them

    May 16, 20250 Views

    Set for Steller Blade PC launch set for June 11, PC System Requirements Detected

    May 16, 20250 Views
    Our Picks

    Soul is above $ 151 after sharp pullback

    June 8, 2025

    How to capture Nintendo Switch 2 in 4K

    June 8, 2025

    Forget Otter.ai: Chat only entered the meeting room

    June 8, 2025

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    Facebook X (Twitter) Instagram Pinterest
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms And Conditions
    • Disclaimer
    © 2025 PineapplesUpdate. Designed by Pro.

    Type above and press Enter to search. Press Esc to cancel.