Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Google Patches Chrome Zero-Day Vulnerabilities in Skia and V8

Google Patches Chrome Zero-Day Vulnerabilities in Skia and V8

Posted on March 13, 2026 By CWS

Google has released crucial security updates for its Chrome web browser to address two critical zero-day vulnerabilities, marking a significant move to enhance user safety. These vulnerabilities, identified as CVE-2026-3909 and CVE-2026-3910, have been actively exploited in the wild, prompting swift action from Google.

Details of the Vulnerabilities

The first vulnerability, CVE-2026-3909, with a CVSS score of 8.8, is an out-of-bounds write issue in the Skia 2D graphics library. This flaw allows remote attackers to access memory beyond the intended bounds via a specially crafted HTML page. The second, CVE-2026-3910, also scored at 8.8, concerns an inappropriate implementation within the V8 JavaScript and WebAssembly engine, enabling attackers to execute arbitrary code within a sandbox when exploiting a manipulated HTML page.

Discovery and Response

Both vulnerabilities were discovered and reported internally by Google on March 10, 2026. In line with standard procedure, Google has withheld specific details of the exploits to prevent further malicious activity by threat actors. The company has acknowledged the existence of these exploits in the wild, emphasizing the urgency for users to update their browsers.

This development follows Google’s recent efforts to address other high-severity issues, such as a use-after-free bug in Chrome’s CSS component, which was similarly patched in the last month. Since the beginning of the year, Google has addressed three actively exploited zero-day vulnerabilities in Chrome, highlighting an ongoing commitment to cybersecurity.

Recommended Actions for Users

To ensure maximum security, Google advises users to update their Chrome browsers to versions 146.0.7680.75/76 for Windows and Apple macOS, and 146.0.7680.75 for Linux. Users can check for updates by navigating to More > Help > About Google Chrome and selecting Relaunch. This action is crucial to safeguard against potential exploits.

Additionally, users of other browsers built on Chromium, such as Microsoft Edge, Brave, Opera, and Vivaldi, are also urged to apply these updates as they become available. Staying current with security patches is essential in mitigating risks posed by these vulnerabilities.

As cyber threats continue to evolve, proactive measures like timely updates remain vital in protecting users from emerging security risks. Google’s rapid response to these threats underscores the importance of maintaining vigilance in the digital landscape.

The Hacker News Tags:browser vulnerabilities, CVE-2026-3909, CVE-2026-3910, Cybersecurity, Google Chrome, high-severity vulnerabilities, Patches, security updates, Skia, V8, web security, zero-day

Post navigation

Previous Post: Salesforce Issues Alert on ShinyHunters Threat to Experience Cloud
Next Post: Onyx Security Secures $40 Million to Enhance AI Control

Related Posts

Fortinet Warns About FortiSIEM Vulnerability (CVE-2025-25256) With In-the-Wild Exploit Code Fortinet Warns About FortiSIEM Vulnerability (CVE-2025-25256) With In-the-Wild Exploit Code The Hacker News
Europol Dismantles SIM Farm Network Powering 49 Million Fake Accounts Worldwide Europol Dismantles SIM Farm Network Powering 49 Million Fake Accounts Worldwide The Hacker News
New Sni5Gect Attack Crashes Phones and Downgrades 5G to 4G without Rogue Base Station New Sni5Gect Attack Crashes Phones and Downgrades 5G to 4G without Rogue Base Station The Hacker News
Why Your Security Culture is Critical to Mitigating Cyber Risk Why Your Security Culture is Critical to Mitigating Cyber Risk The Hacker News
Citrix Urges Immediate Patching of Critical NetScaler Flaws Citrix Urges Immediate Patching of Critical NetScaler Flaws The Hacker News
New WireTap Attack Extracts Intel SGX ECDSA Key via DDR4 Memory-Bus Interposer New WireTap Attack Extracts Intel SGX ECDSA Key via DDR4 Memory-Bus Interposer The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • North Korean Hackers Target Pharma Firms with Malware
  • EU Pushes Google to Share Anonymized User Data
  • Google Patches Critical Gemini CLI Vulnerability
  • ClickUp’s API Key Leak Exposes Fortune 500 Emails
  • New Fast16 Malware Uncovered: Cybersecurity Concerns Rise

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • North Korean Hackers Target Pharma Firms with Malware
  • EU Pushes Google to Share Anonymized User Data
  • Google Patches Critical Gemini CLI Vulnerability
  • ClickUp’s API Key Leak Exposes Fortune 500 Emails
  • New Fast16 Malware Uncovered: Cybersecurity Concerns Rise

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark