Yazılar

CERT-In Warns: Google Chrome Vulnerabilities May Let Hackers Gain System Access

CERT-In Alerts Users to Critical Google Chrome Security Vulnerabilities

The Indian Computer Emergency Response Team (CERT-In) has issued an advisory warning users about multiple security flaws identified in Google Chrome for Desktop. These vulnerabilities, if exploited, could expose users to significant cyber threats. The national cybersecurity agency urged all users and organisations to immediately update to the latest version of Google Chrome across Windows, macOS, and Linux platforms to ensure protection. According to the advisory, users running outdated versions of the browser are at heightened risk.

In its vulnerability note, CIVN-2025-0099, published on May 16, CERT-In detailed the nature and severity of the issues, assigning them a “high” severity rating. The affected versions include Chrome for Desktop prior to version 136.0.7103.113 for Mac and Linux, and 136.0.7103.114 for Windows systems. These flaws could potentially be exploited by attackers to execute unauthorized actions on a user’s system.

Among the vulnerabilities, CVE-2025-4664 involves insufficient policy enforcement in Chrome’s Loader component, which could allow attackers to leak cross-origin data through a specially crafted HTML page. Another flaw, CVE-2025-4609, relates to the improper handling of operations within Mojo, Chrome’s inter-process communication system. Exploiting these weaknesses would typically require the attacker to trick users into visiting a malicious website, making social engineering a key part of the attack strategy.

Google acknowledged the issues and released security patches on May 14 to address four identified flaws. The company credited two independent security researchers for uncovering the vulnerabilities, as noted in CERT-In’s advisory. Users are strongly advised to update their browsers without delay, as continued use of unpatched versions could leave systems exposed to malicious exploitation.

Rapido Addresses Security Vulnerability That Exposed User and Driver Data

Rapido, the popular ride-hailing platform, has reportedly resolved a security flaw that exposed sensitive user and driver information. According to a report, the flaw was tied to a feedback form, which unintentionally revealed personal data such as full names, email addresses, and phone numbers of individuals submitting feedback. This issue, discovered by a security researcher, raised significant concerns about the potential misuse of this information in scams or other malicious activities. Rapido has since acknowledged the problem and taken swift action to secure the portal, safeguarding the data of its users and drivers.

Security Researcher Uncovers Vulnerability

The flaw was uncovered by security researcher Renganathan P, who identified a vulnerable feedback website used by Rapido to collect responses from both users and drivers. According to TechCrunch, the problem stemmed from an application programming interface (API) that transmitted the collected feedback to a third-party service. This misconfigured API inadvertently exposed personal data, making it accessible to anyone who could identify the issue.

User and Driver Data at Risk

The exposed portal reportedly revealed crucial personal details, including the names, email addresses, and phone numbers provided by individuals using the feedback form. Such information could be exploited for phishing attacks, scams, or other fraudulent activities, amplifying the need for immediate remediation of the issue.

Rapido’s Response to the Breach

In response to the discovery, Rapido acted promptly to set the affected portal to private, effectively mitigating the vulnerability. The company has assured users and drivers that the issue has been resolved and steps have been taken to prevent similar incidents in the future. This case highlights the importance of rigorous security measures in safeguarding user data and maintaining trust in digital platforms.

LeftoverLocals GPU Flaw Exposes AI Data in Devices Equipped with Apple, AMD, and Qualcomm Hardware

LeftoverLocals does not impact GPUs from Arm, Nvidia, and Intel, according to the security researchers who uncovered the flaw. Devamını Oku