Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Google Chrome Update: Critical Security Fixes Released

Google Chrome Update: Critical Security Fixes Released

Posted on February 12, 2026 By CWS

Google has announced a significant update for its Chrome browser, releasing version 145 for Windows, Mac, and Linux. This update addresses 11 security vulnerabilities, including several that could potentially allow attackers to execute harmful code on user machines.

High-Severity Vulnerabilities Patched

The latest update, which is set to be widely available in the coming weeks, focuses on several high-severity issues that require immediate user attention. Among these is the most critical flaw, identified as CVE-2026-2313, a use-after-free vulnerability in Chrome’s CSS component. This flaw was reported by researchers from HexHive and the University of St. Andrews in December 2025, earning them an $8,000 bounty for their discovery.

In addition to CVE-2026-2313, Google has also addressed two other high-severity vulnerabilities: CVE-2026-2314, a heap buffer overflow within the Codecs, and CVE-2026-2315, an inappropriate implementation within WebGPU. Both of these issues were discovered internally by Google’s security team and could be exploited to execute arbitrary code.

Medium and Low-Severity Issues Resolved

The update also includes fixes for seven medium-severity vulnerabilities. These include issues such as insufficient policy enforcement in frames, race conditions within DevTools, and inappropriate implementations in various components like Animation, PictureInPicture, and File input. These vulnerabilities could potentially allow attackers to bypass security measures or alter browser behavior.

Additionally, two low-severity vulnerabilities in File input and Downloads have been patched. While these pose less risk, addressing them is part of Google’s ongoing efforts to ensure comprehensive browser security.

Google’s Commitment to Security

Google has awarded over $18,500 in bounties to security researchers who disclosed these vulnerabilities responsibly. The highest rewards were given to those who identified critical issues before they could be exploited in real-world scenarios.

Users are strongly encouraged to update their Chrome browsers immediately to version 145.0.7632.45 for Linux or 145.0.7632.45/46 for Windows and Mac. While Chrome typically updates automatically, users can manually verify the update by navigating to the “About Chrome” section in the settings menu.

Google continues to utilize advanced detection tools such as AddressSanitizer, MemorySanitizer, and libFuzzer during the development phase. These tools play a crucial role in identifying vulnerabilities, thus preventing many potential security issues from affecting end users.

Stay informed on the latest cybersecurity news by following us on Google News, LinkedIn, and X, or contact us to feature your own security stories.

Cyber Security News Tags:browser security, Chrome update, code execution, Cybersecurity, Google, Google Chrome, security vulnerabilities, software patch, tech news, vulnerability fix

Post navigation

Previous Post: Google Warns of Intensified Cyber Threats to Defense Sector
Next Post: Critical Flaw in WordPress Plugin Risks Site Security

Related Posts

Microsoft, Cisco, Fortinet Security Updates and Cyber Attacks Microsoft, Cisco, Fortinet Security Updates and Cyber Attacks Cyber Security News
New Spear-Phishing Attack Targeting Financial Executives by Deploying NetBird Malware New Spear-Phishing Attack Targeting Financial Executives by Deploying NetBird Malware Cyber Security News
CISA Warns of Windows Cloud Files Mini Filter 0-Day Vulnerability Exploited in Attacks CISA Warns of Windows Cloud Files Mini Filter 0-Day Vulnerability Exploited in Attacks Cyber Security News
New ToneShell Backdoor With New Features Leverage Task Scheduler COM Service for Persistence New ToneShell Backdoor With New Features Leverage Task Scheduler COM Service for Persistence Cyber Security News
Researchers Expose Scattered Spider’s Tools, Techniques and Key Indicators Researchers Expose Scattered Spider’s Tools, Techniques and Key Indicators Cyber Security News
Operation DreamJob Attacking Manufacturing Industries Using Job-related WhatsApp Web Message Operation DreamJob Attacking Manufacturing Industries Using Job-related WhatsApp Web Message Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages
  • DragonForce Ransomware Group’s Expanding Cartel Operations
  • North Korean Hackers Exploit AI for Enhanced Cyber Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages
  • DragonForce Ransomware Group’s Expanding Cartel Operations
  • North Korean Hackers Exploit AI for Enhanced Cyber Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News