Google Update- Google issued emergency for 350 crore users, do this work immediately
Friends, in today’s modern era, there would hardly be anyone who does not use Google Chrome, which provides us with many types of services. Recently, Google Chrome users have received an important security alert. Two dangerous ‘zero-day’ vulnerabilities have been found in browsers, and experts are warning that hackers are already trying to take advantage of them.
Google has confirmed the issue and has issued an emergency security update to keep users safe. According to reports, if about 3.5 billion Chrome users do not update their browser on time, they may become vulnerable to this threat. Let us know complete details about it
‘Zero-day’ vulnerabilities found in Chrome
Two critical security vulnerabilities have been identified in Chrome — CVE-2026-3909 and CVE-2026-3910. These are categorized as ‘zero-day’ vulnerabilities; This means that attackers can exploit these vulnerabilities before developers fully understand or fix them.
Both of these flaws are considered ‘high severity’ (very serious) because they affect core parts of the browser. If attackers take advantage of these, they can run malicious code on users’ systems or gain unauthorized access to their sensitive information.
How can hackers take advantage of these vulnerabilities?
The first vulnerability, CVE-2026-3909, is related to Chrome’s graphics library system named ‘Skia’. Attackers could exploit this vulnerability by sending users to a malicious website.
The second vulnerability, CVE-2026-3910, exists in Chrome’s JavaScript engine, known as the ‘V8 JavaScript Engine’. Through a specially crafted HTML page, attackers can execute code directly within the browser.
Google का ‘Vulnerability Reward Program’
To further strengthen the security of the browser, Google runs a ‘Vulnerability Reward Program’ around the world, under which security researchers are rewarded for finding flaws. Over the past 15 years, the company has paid those researchers approximately $81.6 million
Comments are closed.