Today's cybersecurity headlines are brought to you by ThreatPerspective


Ethical Hacking News

Google Fixes Eighth Chrome Zero-Day Flaw Exploited in Attacks in 2025


Google has released an emergency update to fix a new Chrome zero-day flaw that was being exploited in attacks, marking the eighth security vulnerability patched since January 2025. The patch addresses a buffer overflow vulnerability in ANGLE's Metal renderer, which could lead to memory corruption and arbitrary code execution.

  • Google has released emergency updates to address a new zero-day security vulnerability.
  • The latest Chrome browser update fixes a buffer overflow vulnerability in ANGLE's Metal renderer, causing memory corruption and potential data breaches.
  • This is the eighth zero-day flaw patched by Google since January 2025.
  • Users can manually or automatically update their browser to ensure protection against this vulnerability.
  • Timely security updates are crucial in preventing cyber threats and data breaches.



  • Google, a leading technology giant, has recently released emergency updates to address another security vulnerability that was being exploited by threat actors. This marks the eighth zero-day flaw patched since the start of the year, highlighting the growing concern for cybersecurity.

    The latest Chrome browser update fixes a previously unknown buffer overflow vulnerability in ANGLE's Metal renderer, caused by improper buffer sizing, which could lead to memory corruption, crashes, sensitive information leaks, and arbitrary code execution. This vulnerability was discovered through Google's Threat Analysis Group (TAG), a research arm that continuously scans for threats.

    The patch is available on the Stable Desktop channel for Windows (143.0.7499.109), macOS (143.0.7499.110), and Linux users (143.0.7499.109). Users can update their browser manually or rely on automated updates to ensure their systems are protected.

    This latest security patch, as well as the previous seven zero-day flaws addressed by Google since January 2025, demonstrates a growing trend of exploitation in the wild. The most recent patches includeCVE-2025-13223, CVE-2025-10585, and CVE-2025-6558, as well as CVE-2025-4664, CVE-2025-5419, and CVE-2025-2783, which have been associated with attacks on Google's platforms.

    The recent zero-day vulnerabilities highlight the importance of timely security updates and the need for users to prioritize their system's security. As technology continues to advance at a rapid pace, new threats emerge regularly. Keeping software up-to-date can help protect against such threats and prevent potential data breaches or other forms of cyber attacks.

    Furthermore, this incident underscores Google's dedication to its users' safety and security through regular updates and patches. The company has shown a commitment to maintaining the trust of its users by addressing vulnerabilities promptly, ensuring that the latest security measures are in place to safeguard against potential threats.

    Google continues to be at the forefront of cybersecurity efforts, actively monitoring for new vulnerabilities and providing timely solutions to keep its platforms secure. The efforts made by Google's Threat Analysis Group have been instrumental in identifying and fixing these critical issues before they become widespread.

    In conclusion, this latest zero-day flaw highlights the need for users to prioritize their system security through regular updates and patches. By staying informed about such incidents and taking proactive measures, users can minimize potential risks and protect themselves against various forms of cyber threats.



    Related Information:
  • https://www.ethicalhackingnews.com/articles/Google-Fixes-Eighth-Chrome-Zero-Day-Flaw-Exploited-in-Attacks-in-2025-ehn.shtml

  • https://www.bleepingcomputer.com/news/security/google-fixes-eighth-chrome-zero-day-exploited-in-attacks-in-2025/


  • Published: Thu Dec 11 02:06:14 2025 by llama3.2 3B Q4_K_M













    © Ethical Hacking News . All rights reserved.

    Privacy | Terms of Use | Contact Us