Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Critical Chrome Update Fixes High-Severity Vulnerabilities

Critical Chrome Update Fixes High-Severity Vulnerabilities

Posted on February 4, 2026 By CWS

Key Points:

  • Google has released a crucial update for Chrome to tackle two high-risk vulnerabilities.
  • The update is crucial for preventing arbitrary code execution and denial-of-service attacks.
  • Users are advised to update their Chrome browsers immediately.

Google’s Urgent Security Update

In a significant security move, Google has deployed an update for the Chrome Stable channel to address two critical vulnerabilities that could allow attackers to execute arbitrary code and cause system crashes. The update, which elevates the browser version to 144.0.7559.132/.133 for Windows and macOS, and 144.0.7559.132 for Linux, aims to safeguard users from potential threats.

The tech giant confirmed that the update distribution will take place over the upcoming days and weeks. These security patches are focused on rectifying memory corruption issues within the browser’s JavaScript and video processing components.

Understanding the Vulnerabilities

The recent update addresses two specific vulnerabilities, both marked as “High” severity. Exploiting these vulnerabilities typically requires a user to navigate to a specially constructed webpage, triggering the exploit within Chrome’s renderer process.

CVE-2026-1862: Type Confusion in V8
This vulnerability exists in V8, Google’s open-source engine for JavaScript and WebAssembly. Type Confusion arises when the engine misinterprets a memory resource type, such as treating an integer as a pointer, leading to potential memory manipulation by attackers. This flaw was identified by researcher Chaoyuan Peng.

CVE-2026-1861: Heap Buffer Overflow in libvpx
The second flaw is in libvpx, a library for VP8 and VP9 video formats. An overflow can occur when excessive data is written to a memory buffer, potentially overwriting adjacent memory. This can result in a denial-of-service (DoS) or be combined with other exploits for arbitrary code execution.

Implications and Recommendations

Although Google has not disclosed whether these vulnerabilities are actively exploited, they have restricted further details until a substantial number of users have updated their browsers, highlighting the potential for weaponization.

It is strongly recommended for both enterprise administrators and individual users to update their Chrome browsers without delay. To ensure the update is installed, users should navigate to Menu > Help > About Google Chrome and confirm the browser version is 144.0.7559.132 or later.

Conclusion

With the release of this critical update, Google continues to prioritize user security by addressing these high-severity vulnerabilities. Prompt action from users to update their browsers is essential to mitigate potential risks and safeguard against exploits. For ongoing updates in cybersecurity, follow us on Google News, LinkedIn, and X.

Cyber Security News Tags:arbitrary code execution, browser update, Chrome security, Cybersecurity, denial of service, Google update, libvpx, security patch, V8 engine, Vulnerabilities

Post navigation

Previous Post: Vulnerability Exposes Data Leaks in Moltbook AI Network
Next Post: Python Infostealers Expanding to macOS via Fake Ads

Related Posts

Hackers Using AI to Automate Vulnerability Discovery and Malware Generation Hackers Using AI to Automate Vulnerability Discovery and Malware Generation Cyber Security News
New Windows 11 KB5074109 Update Breaks Systems New Windows 11 KB5074109 Update Breaks Systems Cyber Security News
xRAT Malware Attacking Windows Users Disguised as Adult Game xRAT Malware Attacking Windows Users Disguised as Adult Game Cyber Security News
Microsoft Azure Cloud Disrupted by Undersea Cable Cuts in Red Sea Microsoft Azure Cloud Disrupted by Undersea Cable Cuts in Red Sea Cyber Security News
New CrushFTP 0-Day Vulnerability Exploited in the Wild to Gain Access to Servers New CrushFTP 0-Day Vulnerability Exploited in the Wild to Gain Access to Servers Cyber Security News
APT Hackers Attacking Indian Government Using GOGITTER tool and GITSHELLPAD Malware APT Hackers Attacking Indian Government Using GOGITTER tool and GITSHELLPAD Malware Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • One Identity Appoints Gihan Munasinghe as New CTO
  • React2Shell Vulnerability Sparks 1.4 Million Exploit Attempts
  • Critical SolarWinds Vulnerability Listed as Actively Exploited
  • Python Infostealers Expanding to macOS via Fake Ads
  • Critical Chrome Update Fixes High-Severity Vulnerabilities

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • One Identity Appoints Gihan Munasinghe as New CTO
  • React2Shell Vulnerability Sparks 1.4 Million Exploit Attempts
  • Critical SolarWinds Vulnerability Listed as Actively Exploited
  • Python Infostealers Expanding to macOS via Fake Ads
  • Critical Chrome Update Fixes High-Severity Vulnerabilities

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark