Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Critical Chrome Update Fixes High-Severity Vulnerabilities

Critical Chrome Update Fixes High-Severity Vulnerabilities

Posted on February 4, 2026 By CWS

Key Points:

  • Google has released a crucial update for Chrome to tackle two high-risk vulnerabilities.
  • The update is crucial for preventing arbitrary code execution and denial-of-service attacks.
  • Users are advised to update their Chrome browsers immediately.

Google’s Urgent Security Update

In a significant security move, Google has deployed an update for the Chrome Stable channel to address two critical vulnerabilities that could allow attackers to execute arbitrary code and cause system crashes. The update, which elevates the browser version to 144.0.7559.132/.133 for Windows and macOS, and 144.0.7559.132 for Linux, aims to safeguard users from potential threats.

The tech giant confirmed that the update distribution will take place over the upcoming days and weeks. These security patches are focused on rectifying memory corruption issues within the browser’s JavaScript and video processing components.

Understanding the Vulnerabilities

The recent update addresses two specific vulnerabilities, both marked as “High” severity. Exploiting these vulnerabilities typically requires a user to navigate to a specially constructed webpage, triggering the exploit within Chrome’s renderer process.

CVE-2026-1862: Type Confusion in V8
This vulnerability exists in V8, Google’s open-source engine for JavaScript and WebAssembly. Type Confusion arises when the engine misinterprets a memory resource type, such as treating an integer as a pointer, leading to potential memory manipulation by attackers. This flaw was identified by researcher Chaoyuan Peng.

CVE-2026-1861: Heap Buffer Overflow in libvpx
The second flaw is in libvpx, a library for VP8 and VP9 video formats. An overflow can occur when excessive data is written to a memory buffer, potentially overwriting adjacent memory. This can result in a denial-of-service (DoS) or be combined with other exploits for arbitrary code execution.

Implications and Recommendations

Although Google has not disclosed whether these vulnerabilities are actively exploited, they have restricted further details until a substantial number of users have updated their browsers, highlighting the potential for weaponization.

It is strongly recommended for both enterprise administrators and individual users to update their Chrome browsers without delay. To ensure the update is installed, users should navigate to Menu > Help > About Google Chrome and confirm the browser version is 144.0.7559.132 or later.

Conclusion

With the release of this critical update, Google continues to prioritize user security by addressing these high-severity vulnerabilities. Prompt action from users to update their browsers is essential to mitigate potential risks and safeguard against exploits. For ongoing updates in cybersecurity, follow us on Google News, LinkedIn, and X.

Cyber Security News Tags:arbitrary code execution, browser update, Chrome security, Cybersecurity, denial of service, Google update, libvpx, security patch, V8 engine, Vulnerabilities

Post navigation

Previous Post: Vulnerability Exposes Data Leaks in Moltbook AI Network
Next Post: Python Infostealers Expanding to macOS via Fake Ads

Related Posts

Sidewinder Hacker Group Weaponizing LNK File to Execute Malicious Scripts Sidewinder Hacker Group Weaponizing LNK File to Execute Malicious Scripts Cyber Security News
Cisco Unified Contact Center Express Vulnerabilities Let Remote Attacker Execute Malicious Code Cisco Unified Contact Center Express Vulnerabilities Let Remote Attacker Execute Malicious Code Cyber Security News
PoC Released for Linux Privilege Escalation Vulnerability via udisksd and libblockdev PoC Released for Linux Privilege Escalation Vulnerability via udisksd and libblockdev Cyber Security News
Cloudflare Discloses Technical Details Behind Massive Outage that Breaks the Internet Cloudflare Discloses Technical Details Behind Massive Outage that Breaks the Internet Cyber Security News
SonicWall Confirms No New SSLVPN 0-Day Ransomware Attack Linked to Old Vulnerability SonicWall Confirms No New SSLVPN 0-Day Ransomware Attack Linked to Old Vulnerability Cyber Security News
PoC Exploits for CitrixBleed2 Flaw Released – Attackers Can Exfiltrate 127 Bytes Per Request PoC Exploits for CitrixBleed2 Flaw Released – Attackers Can Exfiltrate 127 Bytes Per Request Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Orchid Security Enhances Enterprise Identity Observability
  • Active Directory Breach: Hackers Target NTDS.dit File
  • Critical Docker AI Flaw Enables RCE and Data Breaches
  • One Identity Appoints Gihan Munasinghe as New CTO
  • React2Shell Vulnerability Sparks 1.4 Million Exploit Attempts

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Orchid Security Enhances Enterprise Identity Observability
  • Active Directory Breach: Hackers Target NTDS.dit File
  • Critical Docker AI Flaw Enables RCE and Data Breaches
  • One Identity Appoints Gihan Munasinghe as New CTO
  • React2Shell Vulnerability Sparks 1.4 Million Exploit Attempts

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark