Article Details

Scrape Timestamp (UTC): 2025-03-31 11:34:18.532

Source: https://thehackernews.com/2025/03/weekly-recap-chrome-0-day.html

Original Article Text

Click to Toggle View

⚡ Weekly Recap: Chrome 0-Day, IngressNightmare, Solar Bugs, DNS Tactics, and More. Every week, someone somewhere slips up—and threat actors slip in. A misconfigured setting, an overlooked vulnerability, or a too-convenient cloud tool becomes the perfect entry point. But what happens when the hunters become the hunted? Or when old malware resurfaces with new tricks? Step behind the curtain with us this week as we explore breaches born from routine oversights—and the unexpected cracks they reveal in systems we trust. ⚡ Threat of the Week Google Patches Actively Exploited Chrome 0-Day — Google has addressed a high-severity security flaw in its Chrome browser for Windows that has been exploited by unknown actors as part of a sophisticated attack aimed at Russian entities. The flaw, CVE-2025-2783 (CVSS score: 8.3), is said to have been combined with another exploit to break out of the browser's sandbox and achieve remote code execution. The attacks involved distributing specially crafted links via phishing emails that, when clicked and launched using Chrome, triggered the exploit. A similar flaw has since been patched in Mozilla Firefox and Tor Browser (CVE-2025-2857), although there is no evidence that it has been exploited. Gartner® Market Guide for Adversarial Exposure Validation Are you facing a constant barrage of new threats and attack scenarios? Then check out the latest Gartner® Market Guide, "Market Guide for Adversarial Exposure Validation" now and learn how to assess your readiness against evolving cybersecurity challenges. Grab your complimentary copy today. 🔔 Top News ‎️‍🔥 Trending CVEs Attackers love software vulnerabilities—they're easy doors into your systems. Every week brings fresh flaws, and waiting too long to patch can turn a minor oversight into a major breach. Below are this week's critical vulnerabilities you need to know about. Take a look, update your software promptly, and keep attackers locked out. This week's list includes — CVE-2025-2783, CVE-2025-2476 (Google Chrome), CVE-2025-2857 (Mozilla Firefox, Tor Browser), CVE-2025-1974 (Kubernetes NGINX Ingress Controller), CVE-2025-26512 (NetApp SnapCenter), CVE-2025-22230 (VMware Tools for Windows), CVE-2025-2825 (CrushFTP), CVE-2025-20229 (Splunk), CVE-2025-30232 (Exim), CVE-2025-1716, CVE-2025-1889, CVE-2025-1944, CVE-2025-1945 (picklescan), and CVE-2025-2294 (Kubio AI Page Builder plugin). 📰 Around the Cyber World 🎥 Expert Webinar 🔧 Cybersecurity Tools 🔒 Tip of the Week Disable Browser Autofill for Sensitive Fields — Autofill might save time, but it can silently leak your data. Attackers can craft hidden form fields on malicious websites that your browser unknowingly fills with your email, phone number, or even credit card info—without you ever clicking a thing. It's a quiet but real threat, especially in phishing attacks. To stay safer, disable autofill for personal and sensitive fields in your browser settings. In Chrome, go to Settings → Autofill, and turn off Passwords, Payment methods, and Addresses. In Firefox, head to Settings → Privacy & Security, and uncheck all Forms and Autofill options. For Edge, go to Profiles → Personal Info & Payment Info, and switch off both. On Safari, navigate to Preferences → AutoFill and deselect every category. For even more control, use a password manager like Bitwarden or KeePassXC—they only autofill when you explicitly approve it. Convenience is great, but not at the cost of silent data leaks. Conclusion We often place trust in tools, platforms, and routines—until they become the very weapons used against us. This week's stories are a reminder that threat actors don't break the rules—they bend the conveniences we rely on. It's not just about patching systems; it's about questioning assumptions.

Daily Brief Summary

CYBERCRIME // Google Fixes Chrome Zero-Day Exploited in Targeted Attacks

Google recently patched a high-severity Chrome vulnerability (CVE-2025-2783) that was actively exploited to target Russian entities.

The Chrome flaw allowed attackers to execute remote code by escaping the browser's sandbox through specially crafted phishing links.

This zero-day vulnerability was also identified and patched in Mozilla Firefox and Tor Browser.

The ongoing issue raises concerns about persistent cyber threats and emphasizes the importance of timely software updates to mitigate risks.

Recommendations include disabling browser autofill for sensitive fields to prevent data leakage and maintaining updated security practices to protect against evolving cyber threats.

The report highlights the use of everyday conveniences by attackers to bend rules and access secure systems, underlining the necessity for continuous vigilance in cybersecurity measures.