📢 Gate Square #MBG Posting Challenge# is Live— Post for MBG Rewards!
Want a share of 1,000 MBG? Get involved now—show your insights and real participation to become an MBG promoter!
💰 20 top posts will each win 50 MBG!
How to Participate:
1️⃣ Research the MBG project
Share your in-depth views on MBG’s fundamentals, community governance, development goals, and tokenomics, etc.
2️⃣ Join and share your real experience
Take part in MBG activities (CandyDrop, Launchpool, or spot trading), and post your screenshots, earnings, or step-by-step tutorials. Content can include profits, beginner-friendl
Google Chrome Patches Zero-Day GPU Bug Exploited In The Wild
HomeNews* Google released patches for six security flaws in Chrome, including one critical zero-day vulnerability actively exploited.
The ANGLE (Almost Native Graphics Layer Engine) component acts as a bridge between Chrome’s rendering processes and a computer’s graphics drivers. This vulnerability allows attackers to use a specially crafted website to break out of the browser’s restricted environment. “An exploit for CVE-2025-6558 exists in the wild,” Google confirmed in an official post, suggesting possible targeting by advanced attackers.
The company resolved a similar zero-day, CVE-2025-6554, two weeks earlier, also reported by Lecigne. In total, Google has patched five Chrome zero-day bugs so far this year, including CVE-2025-2783, CVE-2025-4664, CVE-2025-5419, and CVE-2025-6554.
Google recommends that users update their browsers to versions 138.0.7204.157 or .158 for Windows and macOS, and 138.0.7204.157 for Linux. Users should go to More > Help > About Google Chrome and select Relaunch to ensure the latest updates are installed. The fixes also apply to other Chromium-based browsers, such as Microsoft Edge, Brave, Opera, and Vivaldi when updates become available.
Security experts caution that vulnerabilities in browser graphics components often reappear in targeted attacks. They advise users to remain vigilant for further browser updates and security patches.
Previous Articles: