惯性聚合 高效追踪和阅读你感兴趣的博客、新闻、科技资讯
阅读原文 在惯性聚合中打开

推荐订阅源

宝玉的分享
宝玉的分享
WordPress大学
WordPress大学
博客园 - 司徒正美
美团技术团队
酷 壳 – CoolShell
酷 壳 – CoolShell
奇客Solidot–传递最新科技情报
奇客Solidot–传递最新科技情报
小众软件
小众软件
量子位
阮一峰的网络日志
阮一峰的网络日志
Apple Machine Learning Research
Apple Machine Learning Research
有赞技术团队
有赞技术团队
博客园 - 【当耐特】
博客园 - Franky
Jina AI
Jina AI
人人都是产品经理
人人都是产品经理
cs.CV updates on arXiv.org
cs.CV updates on arXiv.org
T
Threat Research - Cisco Blogs
D
Darknet – Hacking Tools, Hacker News & Cyber Security
F
Fox-IT International blog
T
ThreatConnect
A
Arctic Wolf
让小产品的独立变现更简单 - ezindie.com
让小产品的独立变现更简单 - ezindie.com
Last Week in AI
Last Week in AI
C
CERT Recently Published Vulnerability Notes
P
Palo Alto Networks Blog
李成银的技术随笔
Project Zero
Project Zero
Threat Intelligence Blog | Flashpoint
Threat Intelligence Blog | Flashpoint
The Register - Security
The Register - Security
F
Full Disclosure
H
Hacker News: Front Page
雷峰网
雷峰网
cs.AI updates on arXiv.org
cs.AI updates on arXiv.org
S
SegmentFault 最新的问题
S
Schneier on Security
T
Tor Project blog
博客园_首页
月光博客
月光博客
大猫的无限游戏
大猫的无限游戏
博客园 - 聂微东
S
Securelist
C
Comments on: Blog
cs.CL updates on arXiv.org
cs.CL updates on arXiv.org
钛媒体:引领未来商业与生活新知
钛媒体:引领未来商业与生活新知
Attack and Defense Labs
Attack and Defense Labs
IT之家
IT之家
博客园 - 叶小钗
J
Java Code Geeks
freeCodeCamp Programming Tutorials: Python, JavaScript, Git & More
CTFtime.org: upcoming CTF events
CTFtime.org: upcoming CTF events

Google adds end-to-end Gmail encryption to Android, iOS devices for enterprises | CSO Online

FBI warns of Kali Oauth stealers Police take down VPN service (this time with a good reason) Microsoft says it's making AI 'safe for work' in your browser Why your AI strategy stops where the PLC starts: Hard lessons from the OT frontlines Identity as the primary attack surface: What modern breaches are really exploiting Google folds CodeMender into agent ecosystem amid push for AI-led AppSec Critical vulnerability in Cisco Secure Workload rated at maximum severity Microsoft patches two zero-day flaws in Defender Unpatched ChromaDB flaw leaves servers open to remote code execution Microsoft releases open-source tools to operationalize AI agent safety AI becoming an SOC imperative for curtailing emerging cyber threats Microsoft is working on a patch for 'YellowKey' attack on Bitlocker, offers temporary fix Drupal admins rushing to patch maximum severity SQL injection vulnerability GitHub admits major source code leak after 3,800 internal repositories breached SHub Reaper impersonates Apple, Google, and Microsoft in one MacOS attack chain Why some security fixes never reach your vulnerability dashboard Microsoft disrupts malware code-signing service used by ransomware gangs Contractor’s public GitHub account exposed GovCloud and CISA credentials AntV data visualization tool the latest to be hit by ongoing npm supply chain attacks GitHub scales back bug bounties, reminds users security is their responsibility too Internet Explorer may be dead, but its ghost still runs malware 7 tips for accelerating cyber incident recovery SIEM-Kaufratgeber Schwachstellen managen: Die besten Vulnerability-Management-Tools Security-Infotainment: Die besten Hacker-Dokus Microsoft May security patch fails for some due to boot partition size glitch AI cyberattackers are getting better faster New image-based prompt injection attack targets multimodal AI models ‘Patched’ Windows bug resurfaces 6 years later as working SYSTEM-level exploit AI coding is fueling a secrets-sprawl crisis few CISOs are containing Why the best security investment a board can make in 2026 isn’t another tool Expired domain leads to supply chain attack on node-ipc npm package Exchange Server zero-day vulnerability can be triggered by opening a malicious email Cisco warns of an actively exploited SD-WAN flaw with max severity Autonomous systems are finally working. Security is next EU’s Cyber Resiliency Act will put IT leaders to the test The economics of ransomware 3.0 AI agent finds 18-year-old remote code execution flaw in Nginx Meet Fragnesia, the third Linux kernel vulnerability in a month FlowerStorm phishing gang adopts virtual-machine obfuscation to evade email defenses PraisonAI vulnerability gets scanned within 4 hours of disclosure What CISOs need to land a board role Fired employee sought AI help to hide deletion of hosting firm’s customer data Fortinet fixes two critical RCE flaws in FortiAuthenticator and FortiSandbox What happens when China’s AI catches up to Mythos? Microsoft’s new AI system finds 16 Windows flaws, including four critical RCEs Palo Alto bets on identity security for autonomous AI with Idira launch ClickFix finds a backup plan in PySoxy proxy chains CISA’s AI SBOM guidance pushes software supply-chain oversight into new territory 2026 CSO Award winners showcase business-enabling cyber innovation Google entdeckt erstmals KI-basierten Zero-Day-Exploit Der Kaufratgeber für Breach & Attack Simulation Tools May Patch Tuesday roundup: Critical holes in Windows Netlogon, DNS, and SAP S/4HANA Mistral AI SDK, TanStack Router hit in npm software supply chain attack OpenAI introduces Daybreak cyber platform, takes on Anthropic Mythos Fake Claude Code takes the IElevator to your browser secrets cPanel flaw exposes enterprises to hosting supply-chain risks Developer workstations are the new beachhead CISOs step into the AI spotlight Why patching SLAs should be the floor, not the strategy Cybersicherheitsvorschriften: So erfüllen Sie Ihre Compliance-Anforderungen Customer Identity & Access Management: Die besten CIAM-Tools Linux kernel maintainers suggest a ‘kill switch’ to protect systems until a zero-day vulnerability is patched Entries now open for the 2026 CSO30 Australia Awards Lyrie.ai Joins First Batch of Anthropic’s Cyber Verification Program Google discovers weaponized zero-day exploits created with AI Malicious Hugging Face model masquerading as OpenAI release hits 244K downloads New ‘Dirty Frag’ exploit targets Linux kernel for root access AI security is repeating endpoint security's biggest mistake 8 guiding principles for reskilling the SOC for agentic AI 1,800+ MCP servers exposed without authentication: How zero trust can secure the AI agent revolution Five new holes, one exploited, found in Ivanti Endpoint Manager Mobile Claude in Chrome is taking orders from the wrong extensions Your CTEM program is probably ignoring MCP. Here’s how to fix it Pen tests show AI security flaws far more severe than legacy software bugs Your refresh plan has a CVE blind spot Become a millionaire by bug hunting on Android 13 new critical holes in JavaScript sandbox allow execution of arbitrary code Ollama vulnerability highlights danger of AI frameworks with unrestricted access LinkedIn illegally blocking free accounts from seeing 'who's viewed your profile' data, group alleges Bots in translation: Can AI really fix SIEM rule sprawl across vendors? Critical Palo Alto Networks software bug hits exposed firewalls CISOs: Align cyber risk communication with boardroom psychology Ten years later, has the GDPR fulfilled its purpose? US government agency to safety test frontier AI models before release Iranian state-backed spies pose as ransomware slingers in false flag attacks New malware turns Linux systems into P2P attack networks Poisoned truth: The quiet security threat inside enterprise AI Train like you fight: Why cyber operations teams need no-notice drills Die besten DAST- & SAST-Tools Supply-chain attacks take aim at your AI coding agents Edge browser leaves passwords exposed in plain text, says researcher CISA mulls new three-day remediation deadline for critical flaws CISA pushes critical infrastructure operators to prepare to work in isolation Oracle will patch more often to counter AI cybersecurity threat AI finds 20-year-old bugs in PostgreSQL and MariaDB Stealthy malware abuses Microsoft Phone Link to siphon SMS OTPs from enterprise PCs CISOs step up to the security workforce challenge Why most zero-trust architectures fail at the traffic layer 10 Anzeichen für einen schlechten CSO
Google leaks details for Chromium bug that can turn browsers into bots
2026-05-23 · via Google adds end-to-end Gmail encryption to Android, iOS devices for enterprises | CSO Online

Chromium — the open-source browser that underpins Google Chrome, Microsoft Edge, and Opera, among others — contains an unpatched vulnerability that attackers can exploit to execute JavaScript code persistently across browser restarts. As a result, the flaw can be used to hijack users’ browsers for distributed denial-of-service attacks, run crypto miners, and more.

The vulnerability was reported over three years ago by independent researcher Lyra Rebane and remained unfixed, or at least parts of it. The bug report was made public this week but was then closed again after Rebane reported on Mastodon that the flaw is still not properly fixed.

The bug tracker entry that contains the technical details was accessible long enough to be archived by users, and a copy can be easily found online even though the original entry is now set to private again.

The flaw abuses the Service Worker feature and the Background Fetch API, which allows websites to initiate downloads in the background, such as a video. This feature was introduced in 2018 and Google said at the time:

“If the user closes pages to your site after step 1, that’s ok, the download will continue. Because the fetch is highly visible and easily abortable, there isn’t the privacy concern of a way-too-long background sync task. Because the service worker isn’t constantly running, there isn’t the concern that it could abuse the system, such as mining bitcoin in the background.”

Rabane found that neither of those promises are true, at least not on all platforms and not on all Chromium-based browsers. For example, in the stable Google Chrome version at the time, in December 2022, the download was visible in the download bar, but in the canary version that introduced a new UI, the download seemed like a glitch being stuck at 0B and not showing the source.

On Microsoft Edge, the Download dropdown menu appeared but nothing was shown on it. In the most recent version, the background download is completely invisible and will continue even when the browser is closed.

“Generally a Service Worker has a limited lifespan, but the PoC [proof-of-concept exploit] bypasses that by creating and aborting background fetches every 20 seconds once the Service Worker is active,” Rabane wrote in her vulnerability report. “If the background fetch is created and aborted fast enough, it won’t show up in the browser UI at all, but will still keep the Service Worker active.”

From the comments in the bug entry, the UI aspects were fixed at some point in January 2023. However, the ability to keep the service worker alive indefinitely by toggling between events would have required a deeper fix, including changing the specification for the API to introduce a hard time limit for quitting the service worker.

The things a malicious website could do via a persistent service worker are limited, but they can be serious, including persistent user tracking, as service workers have access to browser open timestamps, IP addresses, and User-Agent info.

The exploit can also be used to execute remote JavaScript payloads, which can be leveraged in a variety of ways, including to execute potential exploits for future bugs, side-channel attacks, or WebAssemply payloads like crypto miners. It’s also possible to trigger requests to other websites, which could be abused in a distributed denial-of-service scenario if a compromised website is used to hijack thousands of browsers in this way.

SUBSCRIBE TO OUR NEWSLETTER

From our editors straight to your inbox

Get started by entering your email address below.