Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Chrome Security Update Patches Background Fetch API Vulnerability

Chrome Security Update Patches Background Fetch API Vulnerability

Posted on January 28, 2026January 28, 2026 By CWS

Chrome variations 144.0.7559.109 and 144.0.7559.110 have been launched to the secure channel, addressing a essential safety vulnerability within the Background Fetch API.

The replace is rolling out throughout Home windows, Mac, and Linux techniques over the approaching days and weeks, making it important for customers to make sure their browsers are totally up to date.

The safety repair facilities on CVE-2026-1504, a Excessive-severity vulnerability affecting the Background Fetch API implementation.

This vulnerability was recognized as an inappropriate implementation that risk actors may doubtlessly exploit.

CVE IDVulnerabilityCVSS ScoreComponentReporterBountyStatusCVE-2026-1504Inappropriate implementation in Background Fetch API7.5Background Fetch APILuan Herrera (@lbherrera_)$3,000Fixed in 144.0.7559.109/.110

The problem was found and reported by safety researcher Luan Herrera on January 9, 2026, and has been awarded a $3,000 bug bounty from Google’s Vulnerability Reward Program.

The Background Fetch API is an internet customary that enables net purposes to obtain massive recordsdata within the background, even when the consumer has closed the browser tab or navigated away from the web site.

This implementation’s vulnerability may allow malicious actors to govern background fetch operations. Nonetheless, particular particulars of the exploitation stay restricted till nearly all of customers obtain the patch.

This replace represents Chrome’s ongoing dedication to safety, constructing on the browser’s multi-layered protection mechanisms.

Google employs superior detection instruments, together with AddressSanitizer, MemorySanitizer, UndefinedBehaviorSanitizer, Management Movement Integrity, libFuzzer, and AFL, to determine and forestall safety points from reaching the secure channel.

The Chrome 144.0.7559 replace started rolling out instantly. Nonetheless, it is going to be distributed progressively over a number of weeks to make sure system stability and permit for correct monitoring.

Customers can manually set off the replace by accessing Chrome settings and checking for updates.

Home windows and Mac customers ought to search for model 144.0.7559.109 or .110, whereas Linux customers will see 144.0.7559.109.

Safety consultants advocate that enterprise and particular person customers prioritize this replace, notably those that depend on net purposes using the Background Fetch API.

Organizations managing massive Chrome deployments ought to monitor the rollout and validate software compatibility through the replace window.

A complete checklist of all adjustments included on this construct is offered within the official Chrome commit log.

Customers experiencing points ought to report them by the bug reporting system or make the most of the Chrome neighborhood assist discussion board for assist.

Google continues to work with safety researchers worldwide to strengthen Chrome’s safety posture and forestall vulnerabilities from affecting customers.

Observe us on Google Information, LinkedIn, and X for every day cybersecurity updates. Contact us to characteristic your tales.

Cyber Security News Tags:API, Background, Chrome, Fetch, Patches, Security, Update, Vulnerability

Post navigation

Previous Post: Password Reuse in Disguise: An Often-Missed Risky Workaround
Next Post: Mustang Panda Deploys Updated COOLCLIENT Backdoor in Government Cyber Attacks

Related Posts

Linux Kernel’s KSMBD Subsystem Vulnerability Let Remote Attackers Exhaust Server Resources Linux Kernel’s KSMBD Subsystem Vulnerability Let Remote Attackers Exhaust Server Resources Cyber Security News
New FortiWeb 0-Day Code Execution Vulnerability Exploited in the Wild New FortiWeb 0-Day Code Execution Vulnerability Exploited in the Wild Cyber Security News
AI Red Teaming Tool “Red AI Range” Discovers, Analyze, and Mitigate  Vulnerabilities AI Red Teaming Tool “Red AI Range” Discovers, Analyze, and Mitigate  Vulnerabilities Cyber Security News
Leveraging OSINT Tools for Enhanced Cybersecurity Threat Intelligence Leveraging OSINT Tools for Enhanced Cybersecurity Threat Intelligence Cyber Security News
Windows Common Log File System 0-Day Vulnerability Actively Exploited in the Wild Windows Common Log File System 0-Day Vulnerability Actively Exploited in the Wild Cyber Security News
Prometei Botnet Attacking Linux Servers to Mine Cryptocurrency Prometei Botnet Attacking Linux Servers to Mine Cryptocurrency Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages
  • DragonForce Ransomware Group’s Expanding Cartel Operations
  • North Korean Hackers Exploit AI for Enhanced Cyber Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages
  • DragonForce Ransomware Group’s Expanding Cartel Operations
  • North Korean Hackers Exploit AI for Enhanced Cyber Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News