Google Chrome Patches the New Zero-Day Flaw and Here is What You Need to Do Now.

Google Chrome is the world’s #1 internet browser with a global market share of 64.91%. Chances are you and everyone you know are using Google Chrome which places you at a greater risk.


What can you do to protect yourself:

  1. Open your Google Chrome browser application.

  2. Click on the overflow menu icon in the upper-right corner next to your profile.

  3. In the drop-down menu hover over “Help”, then select the About Google Chrome” item.

  4. In the new window, you can find your current Google Chrome version.

  5. Confirm your Chrome is running 103.0.5060.114 for Windows and Chrome 103.0.5060.71 for Android.

What’s a zero-day attack and how does it impact you?

A zero-day attack is a previously unknown computer virus or other malware for which software developers have yet to find a fix and antivirus software is not yet available.

The current Google Chrome attack is a zero-day WebRTC flaw that is actively being exploited. impact of successful heap overflow exploitation can range from program crashes and arbitrary code execution to bypassing security solutions if code execution is achieved during the attack.

How keep your identity and data protected?

This zero-day attack is active and the attackers will pick up the pace. So far Google offers no insight into how one might detect it or defend against it other than by updating Google Chrome. Mor concerning news, this is the fourth Chrome zero-day fixed in 2022.

The previous three zero-day vulnerabilities found and patched in 2022 are:

  1. CVE-2022-1364 - April 14th

  2. CVE-2022-1096 - March 25th

  3. CVE-2022-0609 - February 14th

Stay vigilant and follow the latest malware tech news to ensure your Google Chrome and other hardware and software are up-to-date. One of your best tech sources is the Ambit IT blog. We also offer a full patch management solution to assure your whole system is protected and secure against every threat. Contact us today for a full analysis to ensure the safety of your business, identity, and data.

Previous
Previous

Increasing Threats Found Attacking Managed Service Providers (MSPs) & This is Your Defense Guideline.

Next
Next

Do you need help with IT? Probably more than you think.