Sunday, April 14, 2024

Google Chrome 122 Update Addresses Critical Security Vulnerabilities

Google has recently unveiled Chrome 122, a significant milestone for the widely used web browser.

The most recent release, compatible with Windows, Mac, and Linux operating systems, includes a set of crucial security patches and novel functionalities that enrich the user’s experience and guarantee their safety.

Chrome version 122 addresses critical vulnerabilities and raises the bar for browser security standards.

It introduces advanced security features designed to prevent attackers from exploiting vulnerabilities in the browser, ensuring a more secure browsing experience for users.

Live Account Takeover Attack Simulation

How do Hackers Bypass 2FA?

Live attack simulation Webinar demonstrates various ways in which account takeover can happen and practices to protect your websites and APIs against ATO attacks.

Google Chrome 122 Critical Security Fixes

Chrome version 122 comes with significant security enhancements. This update addresses 12 security vulnerabilities, some classified as highly critical.

  • CVE-2024-1669: Out-of-bounds memory access in Blink.
  • CVE-2024-1670: Use after free in Mojo.
  • CVE-2024-1671: Inappropriate implementation in Site Isolation.
  • CVE-2024-1672: Inappropriate implementation in Content Security Policy.
  • CVE-2024-1673: Use after free in Accessibility.
  • CVE-2024-1674: Inappropriate implementation in Navigation.
  • CVE-2024-1675: Need for more policy enforcement in Download.
  • CVE-2024-1676: Inappropriate implementation in Navigation.

The security updates implemented involved fixing various vulnerabilities, such as out-of-bounds memory access in Blink and addressing use-after-free errors in Mojo and Accessibility, along with other similar issues.

Google has acknowledged the researchers who discovered the vulnerabilities, showing their commitment to working closely with the cybersecurity community to enhance Chrome’s security.

Chrome version 122 has advanced security features and significant enhancements over its predecessors.

The latest version is available globally across all major operating systems, including Windows, Mac, and Linux.

The update will be gradually rolled out to users over the next few days or weeks, depending on their location and device.

You can block malware, including Trojans, ransomware, spyware, rootkits, worms, and zero-day exploits, with Perimeter81 malware protection. All are extremely harmful, can wreak havoc, and damage your network.


Latest articles

Alert! Palo Alto RCE Zero-day Vulnerability Actively Exploited in the Wild

In a recent security bulletin, Palo Alto Networks disclosed a critical vulnerability in its...

6-year-old Lighttpd Flaw Impacts Intel And Lenovo Servers

The software supply chain is filled with various challenges, such as untracked security vulnerabilities...

Hackers Employ Deepfake Technology To Impersonate as LastPass CEO

A LastPass employee recently became the target of an attempted fraud involving sophisticated audio...

Sisence Data Breach, CISA Urges To Reset Login Credentials

In response to a recent data breach at Sisense, a provider of data analytics...

DuckDuckGo Launches Privacy Pro: 3-in-1 service With VPN

DuckDuckGo has launched Privacy Pro, a new subscription service that promises to enhance user...

Cyber Attack Surge by 28%:Education Sector at High Risk

In Q1 2024, Check Point Research (CPR) witnessed a notable increase in the average...

Midnight Blizzard’s Microsoft Corporate Email Hack Threatens Federal Agencies: CISA Warns

The Cybersecurity and Infrastructure Security Agency (CISA) has issued an emergency directive concerning a...
Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Top 3 SME Attack Vectors

Securing the Top 3 SME Attack Vectors

Cybercriminals are laying siege to small-to-medium enterprises (SMEs) across sectors. 73% of SMEs know they were breached in 2023. The real rate could be closer to 100%.

  • Stolen credentials
  • Phishing
  • Exploitation of vulnerabilities

Related Articles