Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Google Chrome Update: Critical Security Fixes Released

Google Chrome Update: Critical Security Fixes Released

Posted on February 12, 2026 By CWS

Google has announced a significant update for its Chrome browser, releasing version 145 for Windows, Mac, and Linux. This update addresses 11 security vulnerabilities, including several that could potentially allow attackers to execute harmful code on user machines.

High-Severity Vulnerabilities Patched

The latest update, which is set to be widely available in the coming weeks, focuses on several high-severity issues that require immediate user attention. Among these is the most critical flaw, identified as CVE-2026-2313, a use-after-free vulnerability in Chrome’s CSS component. This flaw was reported by researchers from HexHive and the University of St. Andrews in December 2025, earning them an $8,000 bounty for their discovery.

In addition to CVE-2026-2313, Google has also addressed two other high-severity vulnerabilities: CVE-2026-2314, a heap buffer overflow within the Codecs, and CVE-2026-2315, an inappropriate implementation within WebGPU. Both of these issues were discovered internally by Google’s security team and could be exploited to execute arbitrary code.

Medium and Low-Severity Issues Resolved

The update also includes fixes for seven medium-severity vulnerabilities. These include issues such as insufficient policy enforcement in frames, race conditions within DevTools, and inappropriate implementations in various components like Animation, PictureInPicture, and File input. These vulnerabilities could potentially allow attackers to bypass security measures or alter browser behavior.

Additionally, two low-severity vulnerabilities in File input and Downloads have been patched. While these pose less risk, addressing them is part of Google’s ongoing efforts to ensure comprehensive browser security.

Google’s Commitment to Security

Google has awarded over $18,500 in bounties to security researchers who disclosed these vulnerabilities responsibly. The highest rewards were given to those who identified critical issues before they could be exploited in real-world scenarios.

Users are strongly encouraged to update their Chrome browsers immediately to version 145.0.7632.45 for Linux or 145.0.7632.45/46 for Windows and Mac. While Chrome typically updates automatically, users can manually verify the update by navigating to the “About Chrome” section in the settings menu.

Google continues to utilize advanced detection tools such as AddressSanitizer, MemorySanitizer, and libFuzzer during the development phase. These tools play a crucial role in identifying vulnerabilities, thus preventing many potential security issues from affecting end users.

Stay informed on the latest cybersecurity news by following us on Google News, LinkedIn, and X, or contact us to feature your own security stories.

Cyber Security News Tags:browser security, Chrome update, code execution, Cybersecurity, Google, Google Chrome, security vulnerabilities, software patch, tech news, vulnerability fix

Post navigation

Previous Post: Google Warns of Intensified Cyber Threats to Defense Sector
Next Post: Critical Flaw in WordPress Plugin Risks Site Security

Related Posts

Cybersecurity Professionals Charged for Deploying ALPHV BlackCat Ransomware Against US Companies Cybersecurity Professionals Charged for Deploying ALPHV BlackCat Ransomware Against US Companies Cyber Security News
Critical Chrome Zero-Day Vulnerability PoC Released Critical Chrome Zero-Day Vulnerability PoC Released Cyber Security News
GitLab Security Update – Patch for Multiple Vulnerabilities in Community and Enterprise Edition GitLab Security Update – Patch for Multiple Vulnerabilities in Community and Enterprise Edition Cyber Security News
React Native’s Metro Server Targeted by Hackers React Native’s Metro Server Targeted by Hackers Cyber Security News
New ‘Penguin’ Pig Butchering as a Service Selling PII, Stolen Accounts and Fraud Kits New ‘Penguin’ Pig Butchering as a Service Selling PII, Stolen Accounts and Fraud Kits Cyber Security News
APT28 Exploits Microsoft Office Flaw Targeting Europe APT28 Exploits Microsoft Office Flaw Targeting Europe Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Critical Vulnerability in MongoDB Risks Data Exposure
  • Windows Zero-Day Exploits: YellowKey and GreenPlasma Revealed
  • Fragnesia Linux Kernel Vulnerability Allows Root Access
  • NGINX Vulnerability Allows Remote Code Execution
  • Critical 18-Year NGINX Vulnerability Enables Remote Code Execution

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Critical Vulnerability in MongoDB Risks Data Exposure
  • Windows Zero-Day Exploits: YellowKey and GreenPlasma Revealed
  • Fragnesia Linux Kernel Vulnerability Allows Root Access
  • NGINX Vulnerability Allows Remote Code Execution
  • Critical 18-Year NGINX Vulnerability Enables Remote Code Execution

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark