Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Critical Chrome Update Fixes High-Severity Vulnerabilities

Critical Chrome Update Fixes High-Severity Vulnerabilities

Posted on February 4, 2026 By CWS

Key Points:

  • Google has released a crucial update for Chrome to tackle two high-risk vulnerabilities.
  • The update is crucial for preventing arbitrary code execution and denial-of-service attacks.
  • Users are advised to update their Chrome browsers immediately.

Google’s Urgent Security Update

In a significant security move, Google has deployed an update for the Chrome Stable channel to address two critical vulnerabilities that could allow attackers to execute arbitrary code and cause system crashes. The update, which elevates the browser version to 144.0.7559.132/.133 for Windows and macOS, and 144.0.7559.132 for Linux, aims to safeguard users from potential threats.

The tech giant confirmed that the update distribution will take place over the upcoming days and weeks. These security patches are focused on rectifying memory corruption issues within the browser’s JavaScript and video processing components.

Understanding the Vulnerabilities

The recent update addresses two specific vulnerabilities, both marked as “High” severity. Exploiting these vulnerabilities typically requires a user to navigate to a specially constructed webpage, triggering the exploit within Chrome’s renderer process.

CVE-2026-1862: Type Confusion in V8
This vulnerability exists in V8, Google’s open-source engine for JavaScript and WebAssembly. Type Confusion arises when the engine misinterprets a memory resource type, such as treating an integer as a pointer, leading to potential memory manipulation by attackers. This flaw was identified by researcher Chaoyuan Peng.

CVE-2026-1861: Heap Buffer Overflow in libvpx
The second flaw is in libvpx, a library for VP8 and VP9 video formats. An overflow can occur when excessive data is written to a memory buffer, potentially overwriting adjacent memory. This can result in a denial-of-service (DoS) or be combined with other exploits for arbitrary code execution.

Implications and Recommendations

Although Google has not disclosed whether these vulnerabilities are actively exploited, they have restricted further details until a substantial number of users have updated their browsers, highlighting the potential for weaponization.

It is strongly recommended for both enterprise administrators and individual users to update their Chrome browsers without delay. To ensure the update is installed, users should navigate to Menu > Help > About Google Chrome and confirm the browser version is 144.0.7559.132 or later.

Conclusion

With the release of this critical update, Google continues to prioritize user security by addressing these high-severity vulnerabilities. Prompt action from users to update their browsers is essential to mitigate potential risks and safeguard against exploits. For ongoing updates in cybersecurity, follow us on Google News, LinkedIn, and X.

Cyber Security News Tags:arbitrary code execution, browser update, Chrome security, Cybersecurity, denial of service, Google update, libvpx, security patch, V8 engine, Vulnerabilities

Post navigation

Previous Post: Vulnerability Exposes Data Leaks in Moltbook AI Network
Next Post: Python Infostealers Expanding to macOS via Fake Ads

Related Posts

Telecommunications Companies in Spain Experiencing Downtime Telecommunications Companies in Spain Experiencing Downtime Cyber Security News
Hacktivist Groups Attacks on Critical ICS Systems to Steal Sensitive Data Hacktivist Groups Attacks on Critical ICS Systems to Steal Sensitive Data Cyber Security News
UAT-7290 Hackers Attacking Critical Infrastructure Entities in South Asia UAT-7290 Hackers Attacking Critical Infrastructure Entities in South Asia Cyber Security News
Threat Actors Attacking Fans and Teams of Belgian Grand Prix With Phishing Campaigns Threat Actors Attacking Fans and Teams of Belgian Grand Prix With Phishing Campaigns Cyber Security News
Chrome 143 Released With Fix for 13 Vulnerabilities that Enables Arbitrary Code Execution Chrome 143 Released With Fix for 13 Vulnerabilities that Enables Arbitrary Code Execution Cyber Security News
NAKIVO v11.2 Enhances Replication and vSphere Support NAKIVO v11.2 Enhances Replication and vSphere Support Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Secrets Sprawl Expands in 2026: Key Insights for CISOs
  • Urgent Patches Address Critical Grafana Security Flaws
  • Telnyx Python SDK Faces Supply Chain Attack
  • Russian Toolkit Exploits RDP via Malicious LNK Files
  • Browser Extensions Pose AI Data Theft Risk

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Secrets Sprawl Expands in 2026: Key Insights for CISOs
  • Urgent Patches Address Critical Grafana Security Flaws
  • Telnyx Python SDK Faces Supply Chain Attack
  • Russian Toolkit Exploits RDP via Malicious LNK Files
  • Browser Extensions Pose AI Data Theft Risk

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark