Google has updated its Chrome browser, addressing critical vulnerabilities that posed potential risks to millions of users worldwide.
The latest Stable channel update, version 130.0.6723.91/.92 for Windows and Mac and 130.0.6723.91 for Linux will be rolled out over the coming days and weeks.
This update extends to the Extended Stable channel with version 130.0.6723.92 for Windows and Mac.
Protecting Your Networks & Endpoints With UnderDefense MDR – Request Free Demo
The update includes two crucial security fixes, underscoring Google’s commitment to maintaining a secure browsing environment.
Notably, these fixes were contributed by external researchers, highlighting the collaborative efforts in the cybersecurity community.
Google continues prioritizing user safety by restricting access to bug details and links until most users have received the updates.
This cautious approach ensures that potential exploits remain undisclosed until systems are adequately protected.
Moreover, Google remains vigilant about vulnerabilities in third-party libraries that other projects depend on but may not have addressed.
By maintaining these restrictions, Google helps safeguard Chrome users and the broader software ecosystem.
Google acknowledges and appreciates the invaluable contributions of security researchers who collaborate during the development cycle to prevent security bugs from reaching the stable channel. Their efforts play a crucial role in enhancing Chrome’s security framework.
Google provides resources and forums for assistance and community support for users interested in exploring different release channels or reporting new issues.
Users are encouraged to file bug reports if they encounter new issues and engage with the community help forum for guidance on common problems.
Run private, Real-time Malware Analysis in both Windows & Linux VMs. Get a 14-day free trial with ANY.RUN!
Recent research has revealed that a Russian advanced persistent threat (APT) group, tracked as "GruesomeLarch"…
Microsoft's Digital Crimes Unit (DCU) has disrupted a significant phishing-as-a-service (PhaaS) operation run by Egypt-based…
The Russian threat group TAG-110, linked to BlueDelta (APT28), is actively targeting organizations in Central…
Earth Kasha, a threat actor linked to APT10, has expanded its targeting scope to India,…
Raspberry Robin, a stealthy malware discovered in 2021, leverages advanced obfuscation techniques to evade detection…
Critical infrastructure, the lifeblood of modern society, is under increasing threat as a new report…