Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Google Patches Chrome Zero-Day Vulnerabilities in Skia and V8

Google Patches Chrome Zero-Day Vulnerabilities in Skia and V8

Posted on March 13, 2026 By CWS

Google has released crucial security updates for its Chrome web browser to address two critical zero-day vulnerabilities, marking a significant move to enhance user safety. These vulnerabilities, identified as CVE-2026-3909 and CVE-2026-3910, have been actively exploited in the wild, prompting swift action from Google.

Details of the Vulnerabilities

The first vulnerability, CVE-2026-3909, with a CVSS score of 8.8, is an out-of-bounds write issue in the Skia 2D graphics library. This flaw allows remote attackers to access memory beyond the intended bounds via a specially crafted HTML page. The second, CVE-2026-3910, also scored at 8.8, concerns an inappropriate implementation within the V8 JavaScript and WebAssembly engine, enabling attackers to execute arbitrary code within a sandbox when exploiting a manipulated HTML page.

Discovery and Response

Both vulnerabilities were discovered and reported internally by Google on March 10, 2026. In line with standard procedure, Google has withheld specific details of the exploits to prevent further malicious activity by threat actors. The company has acknowledged the existence of these exploits in the wild, emphasizing the urgency for users to update their browsers.

This development follows Google’s recent efforts to address other high-severity issues, such as a use-after-free bug in Chrome’s CSS component, which was similarly patched in the last month. Since the beginning of the year, Google has addressed three actively exploited zero-day vulnerabilities in Chrome, highlighting an ongoing commitment to cybersecurity.

Recommended Actions for Users

To ensure maximum security, Google advises users to update their Chrome browsers to versions 146.0.7680.75/76 for Windows and Apple macOS, and 146.0.7680.75 for Linux. Users can check for updates by navigating to More > Help > About Google Chrome and selecting Relaunch. This action is crucial to safeguard against potential exploits.

Additionally, users of other browsers built on Chromium, such as Microsoft Edge, Brave, Opera, and Vivaldi, are also urged to apply these updates as they become available. Staying current with security patches is essential in mitigating risks posed by these vulnerabilities.

As cyber threats continue to evolve, proactive measures like timely updates remain vital in protecting users from emerging security risks. Google’s rapid response to these threats underscores the importance of maintaining vigilance in the digital landscape.

The Hacker News Tags:browser vulnerabilities, CVE-2026-3909, CVE-2026-3910, Cybersecurity, Google Chrome, high-severity vulnerabilities, Patches, security updates, Skia, V8, web security, zero-day

Post navigation

Previous Post: Salesforce Issues Alert on ShinyHunters Threat to Experience Cloud
Next Post: Onyx Security Secures $40 Million to Enhance AI Control

Related Posts

A Browser Extension Risk Guide After the ShadyPanda Campaign A Browser Extension Risk Guide After the ShadyPanda Campaign The Hacker News
TamperedChef Malware Spreads via Fake Software Installers in Ongoing Global Campaign TamperedChef Malware Spreads via Fake Software Installers in Ongoing Global Campaign The Hacker News
Why You Should Swap Passwords for Passphrases Why You Should Swap Passwords for Passphrases The Hacker News
Google Uncovers PROMPTFLUX Malware That Uses Gemini AI to Rewrite Its Code Hourly Google Uncovers PROMPTFLUX Malware That Uses Gemini AI to Rewrite Its Code Hourly The Hacker News
CISO’s Expert Guide To AI Supply Chain Attacks CISO’s Expert Guide To AI Supply Chain Attacks The Hacker News
Researchers Expose TA585’s MonsterV2 Malware Capabilities and Attack Chain Researchers Expose TA585’s MonsterV2 Malware Capabilities and Attack Chain The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Google Awards $17 Million in 2025 Bug Bounty Payouts
  • Linux AppArmor Vulnerabilities Risk Root Escalation
  • Critical Security Update Addresses Veeam RCE Vulnerabilities
  • Onyx Security Secures $40 Million to Enhance AI Control
  • Google Patches Chrome Zero-Day Vulnerabilities in Skia and V8

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Google Awards $17 Million in 2025 Bug Bounty Payouts
  • Linux AppArmor Vulnerabilities Risk Root Escalation
  • Critical Security Update Addresses Veeam RCE Vulnerabilities
  • Onyx Security Secures $40 Million to Enhance AI Control
  • Google Patches Chrome Zero-Day Vulnerabilities in Skia and V8

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News