Google Releases Urgent Chrome Update to Patch Actively Exploited Zero-Day Flaw

Google on Thursday shipped emergency patches to address two security issues in its Chrome web browser, one of which it says is being actively exploited in the wild.

Clément Lecigne of Google’s Threat Analysis Group has been credited with reporting the flaw on April 13, 2022.

As is typically the case with actively exploited zero-day flaws, the company acknowledged it’s “Aware that an exploit for CVE-2022-1364 exists in the wild.” Additional details about the flaw and the identity of the threat actors have been withheld to prevent further abuse.

With the latest fix, Google has patched a total of three zero-day vulnerabilities in Chrome since the start of the year.

It’s also the second type confusion-related bug in V8 to be squashed in less than a month -.

Users are recommended to update to version 100.0.4896.127 for Windows, Mac and Linux to thwart potential threats.

Partagez cet article sur les réseaux sociaux:

Subscribe to Our Newsletter!
Stay on top of cybersecurity risks, evolving threats and industry news.
This field is for validation purposes and should be left unchanged.

Les Dernières Nouvelles de Cybersécurité

Qu’il s’agisse de cyberattaques majeures, de vulnérabilités critiques récemment découvertes ou de bonnes pratiques de sécurité, lisez le ici en premier:

Tell us about your needs.
Get an answer the same business day.

Tell us about your needs.
Get an answer the same business day.

Fill out the form below and get an answer from our experts within 1 business day.

Got an urgent request? Call us at 1-877-805-7475 or Book a meeting.

PCI-DSS

What happens next:

  • We reach out to learn about your objectives
  • We work together to define your project's scope
  • You get an all-inclusive, no engagement proposal

This field is for validation purposes and should be left unchanged.
Scroll to Top

BOOK A MEETING

Enter Your
Corporate Email

This field is for validation purposes and should be left unchanged.
This site is registered on wpml.org as a development site.