Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Chrome Security Update Patches Background Fetch API Vulnerability

Posted on January 28, 2026January 28, 2026 By CWS

Chrome variations 144.0.7559.109 and 144.0.7559.110 have been launched to the secure channel, addressing a essential safety vulnerability within the Background Fetch API.

The replace is rolling out throughout Home windows, Mac, and Linux techniques over the approaching days and weeks, making it important for customers to make sure their browsers are totally up to date.

The safety repair facilities on CVE-2026-1504, a Excessive-severity vulnerability affecting the Background Fetch API implementation.

This vulnerability was recognized as an inappropriate implementation that risk actors may doubtlessly exploit.

CVE IDVulnerabilityCVSS ScoreComponentReporterBountyStatusCVE-2026-1504Inappropriate implementation in Background Fetch API7.5Background Fetch APILuan Herrera (@lbherrera_)$3,000Fixed in 144.0.7559.109/.110

The problem was found and reported by safety researcher Luan Herrera on January 9, 2026, and has been awarded a $3,000 bug bounty from Google’s Vulnerability Reward Program.

The Background Fetch API is an internet customary that enables net purposes to obtain massive recordsdata within the background, even when the consumer has closed the browser tab or navigated away from the web site.

This implementation’s vulnerability may allow malicious actors to govern background fetch operations. Nonetheless, particular particulars of the exploitation stay restricted till nearly all of customers obtain the patch.

This replace represents Chrome’s ongoing dedication to safety, constructing on the browser’s multi-layered protection mechanisms.

Google employs superior detection instruments, together with AddressSanitizer, MemorySanitizer, UndefinedBehaviorSanitizer, Management Movement Integrity, libFuzzer, and AFL, to determine and forestall safety points from reaching the secure channel.

The Chrome 144.0.7559 replace started rolling out instantly. Nonetheless, it is going to be distributed progressively over a number of weeks to make sure system stability and permit for correct monitoring.

Customers can manually set off the replace by accessing Chrome settings and checking for updates.

Home windows and Mac customers ought to search for model 144.0.7559.109 or .110, whereas Linux customers will see 144.0.7559.109.

Safety consultants advocate that enterprise and particular person customers prioritize this replace, notably those that depend on net purposes using the Background Fetch API.

Organizations managing massive Chrome deployments ought to monitor the rollout and validate software compatibility through the replace window.

A complete checklist of all adjustments included on this construct is offered within the official Chrome commit log.

Customers experiencing points ought to report them by the bug reporting system or make the most of the Chrome neighborhood assist discussion board for assist.

Google continues to work with safety researchers worldwide to strengthen Chrome’s safety posture and forestall vulnerabilities from affecting customers.

Observe us on Google Information, LinkedIn, and X for every day cybersecurity updates. Contact us to characteristic your tales.

Cyber Security News Tags:API, Background, Chrome, Fetch, Patches, Security, Update, Vulnerability

Post navigation

Previous Post: Password Reuse in Disguise: An Often-Missed Risky Workaround
Next Post: Two High-Severity n8n Flaws Allow Authenticated Remote Code Execution

Related Posts

Chinese State-Sponsored Hackers Attacking Telecommunications Infrastructure to Harvest Sensitive Data Cyber Security News
Hackers Weaponizing SVG Files With Malicious Embedded JavaScript to Execute Malware on Windows Systems Cyber Security News
New MacSync Stealer Malware Attacking macOS Users Using Digitally Signed Apps Cyber Security News
15 Best Remote Monitoring Tools Cyber Security News
New Mamona Ransomware Attack Windows Machines by Abusing Ping Commands Cyber Security News
New Multi-Stage Windows Malware Disables Microsoft Defender Before Dropping Malicious Payloads Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Why We Can’t Let AI Take the Wheel of Cyber Defense
  • SoundCloud Data Breach Exposes 29.8 Million Personal users Details
  • Two High-Severity n8n Flaws Allow Authenticated Remote Code Execution
  • Chrome Security Update Patches Background Fetch API Vulnerability
  • Password Reuse in Disguise: An Often-Missed Risky Workaround

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Why We Can’t Let AI Take the Wheel of Cyber Defense
  • SoundCloud Data Breach Exposes 29.8 Million Personal users Details
  • Two High-Severity n8n Flaws Allow Authenticated Remote Code Execution
  • Chrome Security Update Patches Background Fetch API Vulnerability
  • Password Reuse in Disguise: An Often-Missed Risky Workaround

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark