ARMORYZE
  • Home
  • Solutions
    • Zero Trust Security
    • Cloud Security
    • Web Application & API Protection
    • SIEM Logging & Monitoring
    • Risk Based Vulnerability Management
  • Services
    • Cyber Essentials & Cyber Essentials Plus Certification
    • IASME Cyber Assurance Certification
    • ISO27001 Certification
    • Penetration Testing
    • Cloud Security Assessment
    • Managed Detection & Response
    • Managed Security Services
    • Managed Compliance Services
  • Company
    • About Us
    • Customer Success Story
    • Free Resources >
      • Whitepaper - How To Prioritize Risk Across the Attack Surface
      • The Ultimate Guide to Achieving Cyber Essentials Plus Certification
      • ISO 27001 Implementation Checklist
      • Whitepaper - What is Credential Stuffing? How To Prevent Credential Stuffing Attacks.
      • eBook: Effective Security Strategies for Devops & Application Services
      • eBook - How To Build A Next Generation SOC
      • Free Cyber Security Assessment & Consultation
    • Free Trial >
      • Armoryze USM Anywhere - Free Trial
    • Careers >
      • Account Manager
      • Business Development Manager
      • Cyber Security Engineer
    • Contact Us
    • Blog
    • Privacy-Policy
  • SHOP
    • Cyber Essentials Certification
    • Cyber Essentials Certification with Expert Assistance
    • Cyber Essentials Plus Certification

Google Chrome zero-day security FLAW is actively being abused. Update now!

8/2/2021

0 Comments

 
Picture
Google has confirmed that it is aware of reports that a zero-day Chrome browser exploit exists in the wild.  A zero-day vulnerability remains a relatively rare event in cybersecurity terms, and as such is both a valuable and dangerous thing in the hands of threat actors. The term relates to a vulnerability that is actively exploited by hackers before it has been discovered by either the product vendor or the threat intelligence community. Only at the point of discovery, day zero, can mitigation efforts begin. This leaves the threat window wide open, often for weeks or months, to the attackers with that head start. 
​
Chrome 88 fixes a zero-day vulnerability known as CVE-2021-21148. It was reported by security researcher Mattias Buelens back on Jan. 24, but Google discovered it was being exploited by hackers before the vulnerability could be patched out of the browser.

​The exploit allowed Chrome users to be targeted and malicious code run on their systems thanks to a memory corruption problem in Google's V8 JavaScript engine, which forms part of the Chrome browser. Although Google hasn't confirmed it, the exploit is thought to be what allowed security researchers to be targeted by North Korean hackers on social media last month. Microsoft Threat Intelligence Center attributed the targeted campaign to ZINC, "a DPRK-affiliated and state-sponsored group."

Our security team is recommending both end users and IT administrators to apply the necessary Chrome updates as soon as possible. These updates are for Windows, Mac and Linux versions of the Chrome browser, and those browsers such as Edge which are built using the same Chromium platform, will be rolling out "over the coming days and weeks," according to Google. The patched Chrome version to look out for is 88.0.4324.

Automatic updating ensures that Chrome is updated to the latest version once the browser is restarted. Of course, not everyone will have automatic updates enabled, and not all of those who do will reboot Chrome on a regular basis. 
 
0 Comments

Your comment will be posted after it is approved.


Leave a Reply.

    Book Free - Cyber Security Assessment & Consultation!
    BOOK NOW

      Free - Sign up for email cyber security news & updates!​
    REGISTER ME NOW

    Follow Us and Share on Social Media. Join the Community to fight cyber crime.
    Picture
    Picture
© 2023 Armoryze Consultancy Services, All Rights Reserved
Picture
  • Home
  • Solutions
    • Zero Trust Security
    • Cloud Security
    • Web Application & API Protection
    • SIEM Logging & Monitoring
    • Risk Based Vulnerability Management
  • Services
    • Cyber Essentials & Cyber Essentials Plus Certification
    • IASME Cyber Assurance Certification
    • ISO27001 Certification
    • Penetration Testing
    • Cloud Security Assessment
    • Managed Detection & Response
    • Managed Security Services
    • Managed Compliance Services
  • Company
    • About Us
    • Customer Success Story
    • Free Resources >
      • Whitepaper - How To Prioritize Risk Across the Attack Surface
      • The Ultimate Guide to Achieving Cyber Essentials Plus Certification
      • ISO 27001 Implementation Checklist
      • Whitepaper - What is Credential Stuffing? How To Prevent Credential Stuffing Attacks.
      • eBook: Effective Security Strategies for Devops & Application Services
      • eBook - How To Build A Next Generation SOC
      • Free Cyber Security Assessment & Consultation
    • Free Trial >
      • Armoryze USM Anywhere - Free Trial
    • Careers >
      • Account Manager
      • Business Development Manager
      • Cyber Security Engineer
    • Contact Us
    • Blog
    • Privacy-Policy
  • SHOP
    • Cyber Essentials Certification
    • Cyber Essentials Certification with Expert Assistance
    • Cyber Essentials Plus Certification