Google has promptly addressed a critical security vulnerability in its Chrome browser, identified as CVE-2025-5419. This is the third actively exploited zero-day flaw discovered this year and originates from an out-of-bounds read and write issue within Chrome's V8 JavaScript engine. Google acted swiftly, deploying a configuration change to the Stable channel and releasing an official patch on June 3, 2025. Chrome users are currently receiving an emergency update, identified as versions 137.0.7151.68/.69 for Windows and Mac, and 137.0.7151.68 for Linux. Due to ongoing active exploitation, Google is withholding specific technical details of CVE-2025-5419 to allow more users to update their browsers and secure their systems. While Chrome typically updates automatically, users can manually expedite the process by accessing the Chrome menu, navigating to Help, then About Google Chrome, allowing the update to download, and finally clicking 'Relaunch' to apply the fix. This latest fix follows two other zero-day vulnerabilities patched by Google earlier in 2025. One, CVE-2025-2783, was a sandbox escape flaw leveraged in espionage campaigns against Russian entities. The second, addressed in May, facilitated account takeovers upon successful exploitation. In 2024, Google remediated a total of ten zero-day vulnerabilities, some of which were publicly demonstrated during the Pwn2Own hacking competition.
Security researchers have identified a new variant of the SparkCat malware circulating on both the Apple App Store and Google Play Store, more than a year after its initial discove...
The European Union’s cybersecurity agency, CERT-EU, has attributed a significant cloud breach involving the European Commission to the TeamPCP threat group. The attack targeted t...
Microsoft has rolled out automatic updates for unmanaged Windows 11 24H2 Home and Pro edition devices to Windows 11 25H2, also known as the Windows 11 2025 Update. This transition ...