Secure AF - A Cybersecurity Podcast
Think like a hacker. Defend like a pro.
Welcome to the Secure AF Cybersecurity Podcast — your tactical edge in the ever-evolving cyber battlefield. Hosted by industry veterans including Donovan Farrow and Jonathan Kimmitt, this podcast dives deep into real-world infosec challenges, red team tactics, blue team strategies, and the latest tools shaping the cybersecurity landscape.
Whether you're a seasoned pentester, a SOC analyst, or just breaking into the field, you'll find actionable insights, expert interviews, and unfiltered discussions with Alias team members and top-tier guests from across the cybersecurity spectrum.
Stay sharp. Stay informed. Stay Secure AF.
Secure AF - A Cybersecurity Podcast
Google Chrome Zero-Days Under Active Attack – What SOCs Need to Do Now
Use Left/Right to seek, Home/End to jump to start or end. Hold shift to jump forward or backward.
Got a question or comment? Message us here!
Chrome just became the attack surface of the week.
We’re breaking down the latest zero-day exploits, what attackers are doing with them, and how SOC teams can respond before it turns into something bigger.
Watch full episodes at youtube.com/@aliascybersecurity.
Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.
Good morning, good afternoon, or good evening, whenever you may be, and welcome to another episode of the SOC Brief. This is your go-to podcast for staying ahead of the ever-evolving world of cybersecurity threats. I'm your host Andrew, and today we're going to discuss a fresh double zero day situation that's hitting one of the most widely used pieces of software on the planet. That would be Google Chrome. So these two actively exploited vulnerabilities are forcing an emergency security update for over 3.5 billion users. In this episode, we'll discuss what these flaws are, how attackers are abusing them, why this is something every SOC needs to be aware of, and the steps you should take right now to protect your environment. So Google confirmed on March 15th of this year, so uh maybe a couple weeks ago, that two zero-day vulnerabilities listed as CVE 2026-3909 and CVE 2026-3910 are being exploited in the wild. They did release an emergency update outside of their normal release cycle, and CISA has urged all organizations to update as soon as possible. These are high severity flaws that could allow attackers to execute arbitrary code or gain unauthorized access when users visit malicious web pages. And somewhat obviously, Chrome is a popular target because it's installed on virtually every corporate endpoint. A successful exploit can give attackers a foothold on user machines, steal credentials, drop malware, or move laterally across a network. We're seeing targeted campaigns already hitting government, finance, and enterprise organizations. And Google had to push an out-of-band patch because attackers were immediately using these exploits in attacks. This is trending to be the new normal, so zero days are being weaponized within hours or days of discovery, and SOCS are really left-playing catch-up if patching isn't treated as a critical process within the organization. For SOCs themselves, detections are going to start with monitoring for unusual Chrome processes that are spawning child applications. You can also look for unexpected network connections from the browser or signs of memory corruption. And all of these IOCs and the known IOCs with this, Google and Syssa have shared. This includes specific web page patterns and exploit artifacts. So you can go look up those as well. And when it comes to trying to protect against any kind of active thrusts that are happening right now, you can block or quarantine the high-risk web traffic at your gateways where possible. Enforce Chrome's built-in security features like safe browsing and their enhanced protection, and use endpoint controls to block outdated versions in your environment. For hunting within your environment, search your EDR logs for a recent Chrome activity that looks suspicious. Those will be things like unusual memory access, child process creation, or outbound connections to unknown domains. You can integrate your threat intelligence feeds for the latest Chrome exploit indicators. And again, SISA has added those to the known exploited vulnerabilities catalog, so you can go find them there. And it's important to get the word out within your organization here. So make sure you're informing other teams and colleagues within your organization and that you guys are taking steps to force updates on all of the endpoints. Whether you're doing that via a GPO, an endpoint management tool, or going from device to device to manually update, make sure it's being done and documented. The bottom line here is that attackers have no issue treating everyday tools and applications we all use as their primary targets. SOCs have to treat patching as a critical control and go actively hunt for anomalous browser behavior. Those are steps that are critical to stop attacks before they can gain a foothold or escalate into a serious incident. And here's some closing thoughts and a call to action here. Google's emergency Chrome update is a clear reminder that even the most common software can become a vector for serious compromise when zero days are in play. Patching systems quickly and communicating these threats within your organization are critical to be ahead of the attackers. Stay on top of patching because 2026 is moving fast. This week, verify Chrome is updated across your organization and run one quick hunt for anomalous browser activity. And again, I know I harp it all the time, but patching is so critical. Have a patch process, do it regularly, document it, and you'll be able to stay ahead of a lot of threats that are coming out there. And that's a wrap for this episode of the Sock Brief. Do you have questions or have your own browser zero day stories? Hit us up on social media or via our website. Keep your eyes open, keep sharpening those skills, and we'll talk soon. As always, stay secure out there. Bye.
Podcasts we love
Check out these other fine podcasts recommended by us, not an algorithm.