![]() Read on to find out more about these browsers. All Chromium-based companies are following Google’s lead and rolling out emergency updates.Want to switch away from Google? But, looking for something potentially better than Google Chrome (and similar) for your Linux system?įortunately, there are multiple Google Chrome alternatives that you can try.Įach of them brings something interesting to the table, while also keeping the fantastic compatibility Chrome is known for. With the concern around the security exploitations, the US cybersecurity and infrastructure security agency ordered all federal agencies to patch immediately. ![]() Google has admitted there were 16 Zero-day attacks performed in 2021 alone and also revealed 12th and 13th caused so much damage. At the time of publishing this report, all companies marked the threat as ”High”. Google currently limits information about exploits so that users take the time to update and ask users to update chrome version. That confirms all Chromium-based browsers on the risk list such as Amazon Silk, Brave, Opera, Samsung Internet. Microsoft is also aware of that and rolled out a new emergency update on its Security Center. Microsoft Edge is a chromium-based browser and since the vulnerability issued on Chromium open-source software, Edge is running on warning too. “Google is aware that an exploit for CVE-2022-1096 exists in the wild, this means every chrome user is vulnerable” admitted Google. Chromium’s V8 program is responsible for running java scripts which means if the attackers found any vulnerability they could place any background software as they want. ![]() Zero-day attack is a dangerous form of attack, which means hackers are aware of the vulnerability before Google can fix the problem. ![]() With that in mind, Google issued a warning on its official blog, that Chrome on Windows, macOS, and Linux is vulnerable to a new ‘zero-day’ hack. Google also confirmed that the number of Zero-day attacks is increasing. With over 3 billion users, Chrome/Chromium is the most targeted software in the world today. ![]() Hacking attacks and exploits are a constant game of cat and mouse between developers and hackers. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |