Day 299 – Browser Zero-Days, Workspace Exposure, Data Breaches & North Korean Crypto Ops

Intro Snapshot

Today’s batch brings us back to core vulnerabilities and data-economics: browser zero‐day exploits targeting large populations, enterprise workspace exposure, major marketing/data breaches, and the monetisation of crypto theft by state-linked actors. The undercurrent: trust layers (browser, workspace, data platforms) are under collective siege.

1) Chrome zero-day exploited to deliver malware

Full URL: https://thehackernews.com/2025/10/chrome-zero-day-exploited-to-deliver.html

A newly patched zero-day in Google Chrome was observed being used in the wild to deliver malware via drive‐by visits. This is a reminder that browsers remain primary infection vectors, especially when sandbox escape flaws are involved.

2) Is your Google Workspace as secure as it could be?

Full URL: https://thehackernews.com/2025/10/is-your-google-workspace-as-secure-as.html

An article assessing security posture around Google Workspace environments—highlighting risks like mis-configured sharing settings, overly broad scopes, insufficient audit logs, and weak governance in SaaS environments.

3) 40 billion records exposed from marketing & email data platform

Full URL: https://www.securitymagazine.com/articles/101978-40b-records-exposed-from-marketing-and-email-data-platform

A massive exposure event where a marketing/email data platform leaked data tied to ~40 billion records (individuals, profiles, transactional tags). Highlights the scale and commercialisation of data risk.

4) BlueNoroff expands crypto-heists with global reach

Full URL: https://www.darkreading.com/threat-intelligence/north-korea-bluenoroff-expands-crypto-heists

North Korean–linked cryptocrime group BlueNoroff is expanding its operations—moving beyond earlier targets (macOS, crypto exchanges) into Windows, fintech execs, Web3 developers and leveraging generative-AI toolchains. 

5) New Teefail side-channel attack exposed

Full URL: https://thehackernews.com/2025/10/new-teefail-side-channel-attack.html

Researchers disclosed a novel side-channel attack dubbed “Teefail” which exploits TrustZone/TEE (Trusted Execution Environment) isolation flaws to exfiltrate data from devices once thought secure—even with hardware security features.

Key Takeaways

Browser vulnerabilities remain high-impact. Zero-days like the Chrome one continue to serve as broad gateway tools for attackers. SaaS configuration is a major exposure point. Google Workspace examples show that even widely adopted platforms are vulnerable through mis-use. Big data breaches are massive and normalised. A 40 billion-record exposure underlines how data scale magnifies risk. Crypto-theft is industrialised by state actors. BlueNoroff’s evolving tactics show advanced persistent financial threat models. Hardware/TEE side‐channels are real. Teefail demonstrates that even trusted hardware features can be subverted; attackers continue to push into verticals once considered safe.