Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

AitM phishing uses Cloudflare turnstile bypass to target TikTok business accounts

Bearlyfy attacks over 70 Russian companies with custom GenieLocker ransomware

Why the water sector needs to rethink its values

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » New ‘brazen’ exploit instantly crashes Chromium browser with a single malicious URL
Identity

New ‘brazen’ exploit instantly crashes Chromium browser with a single malicious URL

By October 30, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

October 30, 2025Ravi LakshmananBrowser security/vulnerabilities

A serious vulnerability disclosed in Chromium’s Blink rendering engine could cause many Chromium-based browsers to crash within seconds.

Security researcher Jose Pino, who detailed the flaw, code-named it “Brash.”

“By exploiting an architectural flaw in how certain DOM operations are managed, any Chromium browser can collapse in 15 to 60 seconds,” Pino said of the technical details of the flaw.

The core of Brash lies in the lack of rate limiting on updates to the “document.title” API, resulting in millions of possible attacks. [document object model] Mutations per second not only crashes the web browser but also reduces system performance as CPU resources are allocated to this process.

DFIR retainer service

The attack unfolds in three steps –

Hash generation or preparation phase. To maximize the impact of the attack, the attacker preloads into memory 100 unique hex strings of 512 characters that act as seeds for browser tab title changes at each interval. Burst injection phase. A burst of 3 consecutive document.title updates is performed, injecting approximately 24 million updates per second with default settings (burst: 8000, interval: 1 ms). UI thread saturation phase. Many updates saturate the browser’s main thread, causing the browser to become unresponsive and requiring a force close.

“A key feature that makes Brush more dangerous is that it can be programmed to run at specific moments,” Pino said. “An attacker can inject code with a temporary trigger and remain dormant until a precise, predetermined time.”

“This dynamic timing capability transforms Brash from a destructive tool to a time-precise weapon. Attackers control not only the ‘what’ and ‘where’ but also the ‘when’ with millisecond precision.”

CIS build kit

This also means that this attack could act like a logic bomb configured to detonate at a specific time or after a certain amount of time, while avoiding initial inspection or detection. In a hypothetical attack scenario, simply clicking on a specially crafted URL would trigger an action and cause unintended consequences.

This vulnerability affects Google Chrome and all web browsers running on Chromium, including Microsoft Edge, Brave, Opera, Vivaldi, Arc Browser, Dia Browser, OpenAI ChatGPT Atlas, and Perplexity Comet. Mozilla Firefox and Apple Safari are based on WebKit and are therefore immune to the attack, as are all third-party browsers on iOS.

Hacker News has reached out to Google for further comment on its findings and plans for a fix. I will update the article if I receive a response.


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous Article‘Chemical brain’ may result from damage to the brain’s drainage system
Next Article The next Carrington-level solar superstorm could wipe out ‘all the satellites’, new simulation reveals

Related Posts

AitM phishing uses Cloudflare turnstile bypass to target TikTok business accounts

March 27, 2026

Bearlyfy attacks over 70 Russian companies with custom GenieLocker ransomware

March 27, 2026

LangChain, LangGraph flaw exposes files, secrets, and databases of widely used AI framework

March 27, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

AitM phishing uses Cloudflare turnstile bypass to target TikTok business accounts

Bearlyfy attacks over 70 Russian companies with custom GenieLocker ransomware

Why the water sector needs to rethink its values

Proton ceramic cell for large-scale high temperature electrolysis

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Castilla-La Mancha Ignites Innovation: fiveclmsummit Redefines Tech Future

Local Power, Health Innovation: Alcolea de Calatrava Boosts FiveCLM PoC with Community Engagement

The Future of Digital Twins in Healthcare: From Virtual Replicas to Personalized Medical Models

Human Digital Twins: The Next Tech Frontier Set to Transform Healthcare and Beyond

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2026 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.