snabelen.no is one of the many independent Mastodon servers you can use to participate in the fediverse.
Ein norsk heimstad for den desentraliserte mikroblogge-plattformen.

Administrert av:

Serverstatistikk:

456
aktive brukere

#chrome

23 innlegg21 deltakereett innlegg i dag
Kevin Karhan :verified:<p><span class="h-card" translate="no"><a href="https://social.vivaldi.net/@ajsadauskas" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>ajsadauskas</span></a></span> <span class="h-card" translate="no"><a href="https://infosec.exchange/@JessTheUnstill" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>JessTheUnstill</span></a></span> <span class="h-card" translate="no"><a href="https://mastodon.world/@tomiahonen" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>tomiahonen</span></a></span> <span class="h-card" translate="no"><a href="https://oxytodon.com/@fuchsiii" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>fuchsiii</span></a></span> obviously, that would've been a good standard for everyone, given that almost all non-<a href="https://infosec.space/tags/Gaming" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Gaming</span></a> <a href="https://infosec.space/tags/Apps" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Apps</span></a> these days are <a href="https://infosec.space/tags/WebApps" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>WebApps</span></a> and at that point we'd not have 100+ MB <a href="https://infosec.space/tags/bloatware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>bloatware</span></a> that essentially just loads a <a href="https://infosec.space/tags/Website" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Website</span></a> and can't even cache shit!</p><ul><li>/me stares angrily at <a href="https://infosec.space/tags/Cordova" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cordova</span></a> *</li></ul><p>Personally I believe the <span class="h-card" translate="no"><a href="https://respublicae.eu/@europarl_en" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>europarl_en</span></a></span> &amp; <span class="h-card" translate="no"><a href="https://ec.social-network.europa.eu/@EUCommission" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>EUCommission</span></a></span> could do that and establish as well as enforce an <a href="https://infosec.space/tags/EC" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>EC</span></a> <a href="https://infosec.space/tags/norm" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>norm</span></a>, just as they did with <a href="https://infosec.space/tags/USBc" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>USBc</span></a>, <a href="https://infosec.space/tags/CCS2" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CCS2</span></a> and <a href="https://infosec.space/tags/GDPR" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>GDPR</span></a>!</p><ul><li>It's just lack of political <a href="https://infosec.space/tags/pressure" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>pressure</span></a> and <a href="https://infosec.space/tags/will" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>will</span></a> to actually deal with the <a href="https://infosec.space/tags/AntiCompetitive" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AntiCompetitive</span></a>-ness of <a href="https://infosec.space/tags/GAFAMs" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>GAFAMs</span></a> and given <a href="https://infosec.space/tags/Microsoft" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Microsoft</span></a> got forced into the <a href="https://infosec.space/tags/BrowserChoice" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>BrowserChoice</span></a> setup in <a href="https://infosec.space/tags/WindowsXP" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>WindowsXP</span></a> &amp; <a href="https://infosec.space/tags/Windows7" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Windows7</span></a>, I <em>demand</em> the same for <a href="https://infosec.space/tags/iOS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>iOS</span></a>, <a href="https://infosec.space/tags/macOS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>macOS</span></a> and <a href="https://infosec.space/tags/Windows11" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Windows11</span></a> to include not only <a href="https://infosec.space/tags/Firefox" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Firefox</span></a> &amp; <a href="https://infosec.space/tags/Chrome" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Chrome</span></a> but also <a href="https://infosec.space/tags/TorBrowser" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>TorBrowser</span></a>!</li></ul><p><a href="https://infosec.space/tags/Android" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Android</span></a> needs to be <em>better</em> as in being more than just the <em>"lesser evil"</em> compared to iOS!</p>
Hacker News 50<p>Show HN: A Chrome extension to give you back control over short-form videos</p><p>Link: <a href="https://chromewebstore.google.com/detail/seek-anywhere/opofkjlejjcjalcpaimnpmkmjlclgded" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">chromewebstore.google.com/deta</span><span class="invisible">il/seek-anywhere/opofkjlejjcjalcpaimnpmkmjlclgded</span></a><br>Discussion: <a href="https://news.ycombinator.com/item?id=43545641" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">news.ycombinator.com/item?id=4</span><span class="invisible">3545641</span></a></p><p><a href="https://social.lansky.name/tags/chrome" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>chrome</span></a></p>
Jörg Kantel<p>Google korrigiert wieder kritische Sicherheitslücken in Chrome</p><p>Zwar ist es schon spät, aber es ist immer noch Mittwoch, und Mittwochs aktualisiert (in der Regel) unser aller Datenkrake ihr Flaggschiff: <a href="https://kantel.github.io/posts/2025040203_chrome_update/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">kantel.github.io/posts/2025040</span><span class="invisible">203_chrome_update/</span></a> <a href="https://mastodon.social/tags/Google" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Google</span></a> <a href="https://mastodon.social/tags/Chrome" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Chrome</span></a> <a href="https://mastodon.social/tags/Update" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Update</span></a> <a href="https://mastodon.social/tags/Security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Security</span></a></p>
Atanas Laskov 🏳️‍🌈<p>Colleague recently told me about the Dark Reader plugin, it's a great way to put the web in dark mode. Works with all the websites that I tried so far.</p><p><a href="https://mastodon.social/tags/darkmode" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>darkmode</span></a> <a href="https://mastodon.social/tags/chrome" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>chrome</span></a> <a href="https://mastodon.social/tags/firefox" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>firefox</span></a></p>
Montalvo<p><span class="h-card"><a href="https://mastodon.online/@readeck" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>readeck</span></a></span> fue la solución. Muy fácil de instalar, y de agregar nuevos contenidos gracias a una extensión que se instala en <a href="https://mstdn.mx/tags/Chrome" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Chrome</span></a> o en <a href="https://mstdn.mx/tags/Firefox" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Firefox</span></a>. Todo queda almacenado de manera LOCAL, y es muy sencillo incluso el IMPORTAR la base de datos de Pocket.</p><p>Para no comprometer espacio en mi <a href="https://mstdn.mx/tags/MacBook" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>MacBook</span></a> decidí instalarlo en una unidad externa SSD de 1tb, donde se ejecuta la aplicación, se mantiene la base de datos y todo el contenido adicional. (2/3)</p>
Andres S<p>So in chromium 135 I'm finally seeing V2 (and by extension ublock origin) disabled.</p><p>I switched to ublock origin lite, and after a few days of usage I haven't actually noticed a difference, other than needing to manually configure aggressive filtering and also the missing ability to disable javascript for the site.</p><p>Anything in particular that works much worse in ublock origin lite compared to ublock origin?</p><p><a href="https://social.ridetrans.it/tags/Chrome" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Chrome</span></a> <a href="https://social.ridetrans.it/tags/chromium" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>chromium</span></a> <a href="https://social.ridetrans.it/tags/UBlockOrigin" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>UBlockOrigin</span></a> <a href="https://social.ridetrans.it/tags/UBlockOriginLite" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>UBlockOriginLite</span></a></p>
Marcus "MajorLinux" Summers<p>We need to continue to expose these companies and how they exploit consumers and creators!</p><p>Honey has now lost 4 million Chrome users after shady tactics were revealed </p><p><a href="https://9to5google.com/2025/03/31/honey-extension-users-dropped-chrome-march-2025/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">9to5google.com/2025/03/31/hone</span><span class="invisible">y-extension-users-dropped-chrome-march-2025/</span></a></p><p><a href="https://toot.majorshouse.com/tags/Honey" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Honey</span></a> <a href="https://toot.majorshouse.com/tags/PayPal" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>PayPal</span></a> <a href="https://toot.majorshouse.com/tags/Chrome" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Chrome</span></a> <a href="https://toot.majorshouse.com/tags/Tech" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Tech</span></a></p>
IT News<p>Honey Lost 4 Million Chrome Users After Shady Tactics Were Revealed - The Chrome extension Honey has lost over 4 million users after a viral video expos... - <a href="https://tech.slashdot.org/story/25/03/31/1948230/honey-lost-4-million-chrome-users-after-shady-tactics-were-revealed?utm_source=rss1.0mainlinkanon&amp;utm_medium=feed" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">tech.slashdot.org/story/25/03/</span><span class="invisible">31/1948230/honey-lost-4-million-chrome-users-after-shady-tactics-were-revealed?utm_source=rss1.0mainlinkanon&amp;utm_medium=feed</span></a> <a href="https://schleuss.online/tags/chrome" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>chrome</span></a></p>
Hacker News 50<p>Honey has now lost 4M Chrome users after shady tactics were revealed</p><p>Link: <a href="https://9to5google.com/2025/03/31/honey-extension-users-dropped-chrome-march-2025/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">9to5google.com/2025/03/31/hone</span><span class="invisible">y-extension-users-dropped-chrome-march-2025/</span></a><br>Discussion: <a href="https://news.ycombinator.com/item?id=43538113" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">news.ycombinator.com/item?id=4</span><span class="invisible">3538113</span></a></p><p><a href="https://social.lansky.name/tags/chrome" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>chrome</span></a></p>
Avoid the Hack! :donor:<p>A little late, but Week 13 of the <a href="https://infosec.exchange/tags/Privacy" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Privacy</span></a> Roundup is here. I'm just going to blame it on this cold. :blobcatsneeze: </p><p>This edition features:</p><p>- <a href="https://infosec.exchange/tags/Signalgate" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Signalgate</span></a> <a href="https://infosec.exchange/tags/signal" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>signal</span></a><br>- 23andMe's bankruptcy - what's it mean for user genetic data?<br>- A man banned for life from a venue... based on data collected about him<br>- Sandbox escapes for <a href="https://infosec.exchange/tags/Firefox" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Firefox</span></a> and <a href="https://infosec.exchange/tags/Chrome" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Chrome</span></a> exploited in the wild (updates available)</p><p>... and more!</p><p><a href="https://infosec.exchange/tags/privacymatters" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>privacymatters</span></a> <a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a> <a href="https://infosec.exchange/tags/23andme" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>23andme</span></a> </p><p><a href="https://avoidthehack.com/privacy-week13-2025" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">avoidthehack.com/privacy-week1</span><span class="invisible">3-2025</span></a></p>
Lianna (on Mastodon)<p>Websites that employ malware like <a href="https://mastodon.gamedev.place/tags/Cloudflare" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cloudflare</span></a> or <a href="https://mastodon.gamedev.place/tags/Imperva" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Imperva</span></a> to block <a href="https://mastodon.gamedev.place/tags/GNU" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>GNU</span></a> or <a href="https://mastodon.gamedev.place/tags/Linux" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Linux</span></a> users, users of non-<a href="https://mastodon.gamedev.place/tags/Firefox" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Firefox</span></a> or <a href="https://mastodon.gamedev.place/tags/Chrome" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Chrome</span></a> browsers, are one of the internet's many cancers. Especially with threatening language like this</p><p>😕</p><p>(Edit: added alt text transcription)</p>
Cybernews<p>After reports of hackers exploiting a Chrome zero-day, Mozilla released a similar fix for its browser, and Tor urges users to update "immediately."</p><p><a href="https://infosec.exchange/tags/Chrome" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Chrome</span></a> <a href="https://infosec.exchange/tags/Mozilla" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Mozilla</span></a> <a href="https://infosec.exchange/tags/hackers" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hackers</span></a> <a href="https://infosec.exchange/tags/browser" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>browser</span></a> <a href="https://infosec.exchange/tags/Tor" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Tor</span></a> <a href="https://infosec.exchange/tags/update" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>update</span></a> </p><p><a href="https://cnews.link/tor-firefox-on-windows-affected-by-critical-vulnerability-1/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">cnews.link/tor-firefox-on-wind</span><span class="invisible">ows-affected-by-critical-vulnerability-1/</span></a></p>
heise Security<p>Firefox: Mozilla schließt kritische Sandbox-Lücke in Windows-Version</p><p>Updates für Firefox schließen eine Sandbox-Lücke unter Windows. Sie ähnelt derjenigen, die in Google Chrome angegriffen wird.</p><p><a href="https://www.heise.de/news/Firefox-Mozilla-schliesst-kritische-Sandbox-Luecke-in-Windows-Version-10331842.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">heise.de/news/Firefox-Mozilla-</span><span class="invisible">schliesst-kritische-Sandbox-Luecke-in-Windows-Version-10331842.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon</span></a></p><p><a href="https://social.heise.de/tags/Chrome" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Chrome</span></a> <a href="https://social.heise.de/tags/Firefox" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Firefox</span></a> <a href="https://social.heise.de/tags/IT" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>IT</span></a> <a href="https://social.heise.de/tags/Mozilla" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Mozilla</span></a> <a href="https://social.heise.de/tags/Security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Security</span></a> <a href="https://social.heise.de/tags/Sicherheitsl%C3%BCcken" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Sicherheitslücken</span></a> <a href="https://social.heise.de/tags/news" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>news</span></a></p>
Ludovic :Firefox: :FreeBSD:<p>La trahison qui a donné naissance à Google Chrome - YouTube<br><a href="https://www.youtube.com/watch?v=qGG_EpiZrFk" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">youtube.com/watch?v=qGG_EpiZrF</span><span class="invisible">k</span></a><br><a href="https://piaille.fr/tags/firefox" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>firefox</span></a> <a href="https://piaille.fr/tags/chrome" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>chrome</span></a></p>
The New Oil<p><a href="https://mastodon.thenewoil.org/tags/Google" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Google</span></a> fixes <a href="https://mastodon.thenewoil.org/tags/Chrome" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Chrome</span></a> zero-day exploited in espionage campaign</p><p><a href="https://www.bleepingcomputer.com/news/security/google-fixes-chrome-zero-day-exploited-in-espionage-campaign/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">bleepingcomputer.com/news/secu</span><span class="invisible">rity/google-fixes-chrome-zero-day-exploited-in-espionage-campaign/</span></a></p><p><a href="https://mastodon.thenewoil.org/tags/cyberesecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cyberesecurity</span></a></p>
Jörg Kantel<p>Google korrigiert wieder kritische Sicherheitslücken in Chrome</p><p>Heute kommt die wöchentliche Mittwochs-Aktualisierung des Flaggschiffs unser aller Datenkrake tatsächlich am Mittwoch, weder die Datenkrake noch ich haben geschlampt: Google veröffentlicht das Update der Version 134 (134.0.6998.177/178) seines Browsers Chrome und schließt damit kritische Sicherheitslücken. <a href="https://kantel.github.io/posts/2025032601_chrome_update/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">kantel.github.io/posts/2025032</span><span class="invisible">601_chrome_update/</span></a> <a href="https://mastodon.social/tags/Google" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Google</span></a> <a href="https://mastodon.social/tags/Chrome" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Chrome</span></a> <a href="https://mastodon.social/tags/Update" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Update</span></a> <a href="https://mastodon.social/tags/Security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Security</span></a></p>
Flaky<p>Anyone with ADHD (not diagnosed but on waiting list): I kinda need you lot's help with browsers. How do you cull the tab hoarding? I use Vivaldi and I keep hoarding tabs and it's getting annoying lol.</p><p>gonna tag both browser types for maximum reach.</p><p><a href="https://furry.engineer/tags/Browsers" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Browsers</span></a> <a href="https://furry.engineer/tags/Vivaldi" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Vivaldi</span></a> <a href="https://furry.engineer/tags/Chrome" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Chrome</span></a> <a href="https://furry.engineer/tags/Firefox" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Firefox</span></a> <a href="https://furry.engineer/tags/ADHD" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ADHD</span></a> <a href="https://furry.engineer/tags/AuDHD" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AuDHD</span></a></p>
OTX Bot<p>Operation ForumTroll exploits zero-days in Google Chrome</p><p>In March 2025, a sophisticated malware campaign exploited a zero-day vulnerability in Google Chrome to infect targets. The attack, dubbed Operation ForumTroll, used personalized phishing emails with short-lived links to deliver malware. Kaspersky detected the exploit, reported it to Google, and an update was released to fix the vulnerability (CVE-2025-2783). The campaign targeted media outlets, educational institutions, and government organizations in Russia, disguising itself as invitations to the 'Primakov Readings' forum. The attackers' goal appears to be espionage, and the sophistication of the malware suggests a state-sponsored APT group is behind the operation. The exploit chain involved sandbox escape and remote code execution, though only the former was fully analyzed.</p><p>Pulse ID: 67e33790837554926530dc06<br>Pulse Link: <a href="https://otx.alienvault.com/pulse/67e33790837554926530dc06" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">otx.alienvault.com/pulse/67e33</span><span class="invisible">790837554926530dc06</span></a> <br>Pulse Author: AlienVault<br>Created: 2025-03-25 23:09:04</p><p>Be advised, this data is unverified and should be considered preliminary. Always do further verification.</p><p><a href="https://social.raytec.co/tags/Chrome" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Chrome</span></a> <a href="https://social.raytec.co/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberSecurity</span></a> <a href="https://social.raytec.co/tags/ELF" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ELF</span></a> <a href="https://social.raytec.co/tags/Education" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Education</span></a> <a href="https://social.raytec.co/tags/Email" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Email</span></a> <a href="https://social.raytec.co/tags/Espionage" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Espionage</span></a> <a href="https://social.raytec.co/tags/Google" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Google</span></a> <a href="https://social.raytec.co/tags/Government" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Government</span></a> <a href="https://social.raytec.co/tags/InfoSec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>InfoSec</span></a> <a href="https://social.raytec.co/tags/Kaspersky" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Kaspersky</span></a> <a href="https://social.raytec.co/tags/Malware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Malware</span></a> <a href="https://social.raytec.co/tags/OTX" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OTX</span></a> <a href="https://social.raytec.co/tags/OpenThreatExchange" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OpenThreatExchange</span></a> <a href="https://social.raytec.co/tags/Phishing" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Phishing</span></a> <a href="https://social.raytec.co/tags/RAT" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>RAT</span></a> <a href="https://social.raytec.co/tags/RemoteCodeExecution" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>RemoteCodeExecution</span></a> <a href="https://social.raytec.co/tags/Russia" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Russia</span></a> <a href="https://social.raytec.co/tags/Troll" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Troll</span></a> <a href="https://social.raytec.co/tags/Vulnerability" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Vulnerability</span></a> <a href="https://social.raytec.co/tags/ZeroDay" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ZeroDay</span></a> <a href="https://social.raytec.co/tags/bot" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>bot</span></a> <a href="https://social.raytec.co/tags/AlienVault" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AlienVault</span></a></p>
IT News<p>Google Patches Chrome Sandbox Escape Zero-Day Caught By Kaspersky - wiredmikey shares a report from SecurityWeek: Google late Tuesday rushed out a pat... - <a href="https://slashdot.org/story/25/03/26/0143210/google-patches-chrome-sandbox-escape-zero-day-caught-by-kaspersky?utm_source=rss1.0mainlinkanon&amp;utm_medium=feed" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">slashdot.org/story/25/03/26/01</span><span class="invisible">43210/google-patches-chrome-sandbox-escape-zero-day-caught-by-kaspersky?utm_source=rss1.0mainlinkanon&amp;utm_medium=feed</span></a> <a href="https://schleuss.online/tags/chrome" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>chrome</span></a></p>
securityaffairs<p><a href="https://infosec.exchange/tags/Google" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Google</span></a> fixed the first actively exploited <a href="https://infosec.exchange/tags/Chrome" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Chrome</span></a> zero-day since the start of the year<br><a href="https://securityaffairs.com/175862/hacking/google-fixed-first-chrome-zero-day-in-2025.html" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">securityaffairs.com/175862/hac</span><span class="invisible">king/google-fixed-first-chrome-zero-day-in-2025.html</span></a><br><a href="https://infosec.exchange/tags/securityaffairs" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>securityaffairs</span></a> <a href="https://infosec.exchange/tags/hacking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hacking</span></a></p>