Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Urgent Chrome Update Fixes Critical Security Flaws

Urgent Chrome Update Fixes Critical Security Flaws

Posted on March 5, 2026 By CWS

Google has issued a vital security update for its Chrome browser, advancing the Stable channel to version 145.0.7632.159/160 on Windows and Mac, and 145.0.7632.159 on Linux. This update addresses ten security vulnerabilities, including three classified as Critical. The rollout will occur over the coming days and weeks.

Significance of the Update

The release follows responsible disclosures from independent security researchers and Google’s internal team, with bug bounties reaching up to $33,000 for a single flaw. Users are advised to update their browsers promptly, as detailed information on these bugs will remain restricted until most users have received the fix.

The three critical vulnerabilities include an integer overflow issue in the ANGLE graphics layer, an object lifecycle problem in PowerVR, and another integer overflow in the Skia graphics engine. These were reported by researchers cinzinga, Zhihua Yao of KunLun Lab, and Symeon Paraschoudis, earning significant bounties.

Details of Vulnerabilities

The remaining seven vulnerabilities have been rated as High severity and impact various Chrome subsystems, such as V8, WebAssembly, CSS, and Navigation. These issues highlight the extensive attack surface that modern browsers present, as noted by Google’s advisory.

Critical vulnerabilities like integer overflow and heap buffer overflow can be exploited for remote code execution or sandbox escapes. Google’s development pipeline utilizes several automated detection tools to catch these memory safety issues before they reach users.

Recommended Actions for Users

Google advises users to update Chrome immediately by navigating to Settings → Help → About Google Chrome. Enterprise administrators should enforce this update across managed endpoints. Users are also encouraged to monitor the Chrome Security Page for full CVE disclosures post-rollout.

Although there is no evidence of active exploitation for these vulnerabilities at present, the Critical ratings emphasize the necessity for prompt patching by all Chrome users.

Stay informed by following us on Google News, LinkedIn, and X for daily cybersecurity updates. Contact us to feature your stories.

Cyber Security News Tags:browser security, browser update, bug bounty, Chrome update, critical flaws, CVE, Cybersecurity, Google, security vulnerabilities, tech news

Post navigation

Previous Post: Coruna Exploit Kit Targets iOS in Global Attacks
Next Post: Europol Dismantles Major Phishing Service Linked to 64,000 Attacks

Related Posts

Threat Actors Weaponize LNK Files With New REMCOS Variant That Bypasses AV Engines Threat Actors Weaponize LNK Files With New REMCOS Variant That Bypasses AV Engines Cyber Security News
ESPHome Web Server Authentication Bypass Vulnerability Exposes Smart Devices ESPHome Web Server Authentication Bypass Vulnerability Exposes Smart Devices Cyber Security News
Chinese Hackers Exploit SharePoint Vulnerabilities to Deploy Toolsets Includes Backdoor, Ransomware and Loaders Chinese Hackers Exploit SharePoint Vulnerabilities to Deploy Toolsets Includes Backdoor, Ransomware and Loaders Cyber Security News
Reddit Faces £14.47 Million Fine for Child Data Breach Reddit Faces £14.47 Million Fine for Child Data Breach Cyber Security News
Hundreds of Thousands of Users Grok Chats Exposed in Google Search Results Hundreds of Thousands of Users Grok Chats Exposed in Google Search Results Cyber Security News
Threat Actors are Actively Exploiting Vulnerabilities in Open-Source Ecosystem to Propagate Malicious Code Threat Actors are Actively Exploiting Vulnerabilities in Open-Source Ecosystem to Propagate Malicious Code Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Russian Cyber Campaign Targets Ukraine with New Malware
  • Phishing Alert Targets LastPass Users for Vault Access
  • International Operation Shuts Down LeakBase Cybercrime Forum
  • Critical Cisco Firewall Vulnerability Requires Immediate Fix
  • FBI and Europol Dismantle Cybercrime Forum LeakBase

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Russian Cyber Campaign Targets Ukraine with New Malware
  • Phishing Alert Targets LastPass Users for Vault Access
  • International Operation Shuts Down LeakBase Cybercrime Forum
  • Critical Cisco Firewall Vulnerability Requires Immediate Fix
  • FBI and Europol Dismantle Cybercrime Forum LeakBase

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News