Skip to main content
COSMICBYTEZLABS
NewsSecurityHOWTOsToolsStudyTraining
ProjectsChecklistsAI RankingsNewsletterStatusTagsAbout
Subscribe

Press Enter to search or Esc to close

News
Security
HOWTOs
Tools
Study
Training
Projects
Checklists
AI Rankings
Newsletter
Status
Tags
About
RSS Feed
Reading List
Subscribe

Stay in the Loop

Get the latest security alerts, tutorials, and tech insights delivered to your inbox.

Subscribe NowFree forever. No spam.
COSMICBYTEZLABS

Your trusted source for IT intelligence, cybersecurity insights, and hands-on technical guides.

980+ Articles
124+ Guides

CONTENT

  • Latest News
  • Security Alerts
  • HOWTOs
  • Projects
  • Exam Prep

RESOURCES

  • Search
  • Browse Tags
  • Newsletter Archive
  • Reading List
  • RSS Feed

COMPANY

  • About Us
  • Contact
  • Privacy Policy
  • Terms of Service

© 2026 CosmicBytez Labs. All rights reserved.

System Status: Operational
  1. Home
  2. News
  3. Google Patches Actively Exploited Chrome Zero-Day
Google Patches Actively Exploited Chrome Zero-Day
NEWS

Google Patches Actively Exploited Chrome Zero-Day

Google has released an emergency Chrome update to fix a zero-day vulnerability being actively exploited in targeted attacks against journalists and activists.

Dylan H.

Security Engineer

January 24, 2026
2 min read

Google Patches Actively Exploited Chrome Zero-Day

Google has released an emergency security update for Chrome to address a zero-day vulnerability that's being actively exploited in the wild. The flaw is being used in targeted attacks against journalists and human rights activists.

Vulnerability Overview

  • CVE: CVE-2026-0412
  • CVSS Score: 8.8 (High)
  • Component: V8 JavaScript engine
  • Type: Type confusion vulnerability

Active Exploitation

Google's Threat Analysis Group (TAG) discovered the vulnerability being exploited by a sophisticated threat actor:

  • Targets include journalists in multiple countries
  • Attacks delivered via spear-phishing emails
  • Exploitation leads to full browser compromise
  • Evidence suggests nation-state involvement

Technical Details

The vulnerability exists in Chrome's V8 JavaScript engine:

Type: Type Confusion in V8
Impact: Remote Code Execution
Prerequisite: Visit malicious website
User Interaction: None beyond page visit

Affected Versions

PlatformAffectedFixed Version
Windows< 122.0.6261.95122.0.6261.95
macOS< 122.0.6261.95122.0.6261.95
Linux< 122.0.6261.95122.0.6261.95

Update Instructions

Chrome should update automatically, but to verify:

  1. Open Chrome menu (three dots)
  2. Help > About Google Chrome
  3. Chrome will check for updates
  4. Restart browser to complete update

Chromium-Based Browsers

Other browsers using Chromium are also affected:

  • Microsoft Edge - Update expected shortly
  • Brave - Patch in progress
  • Opera - Update pending
  • Vivaldi - Working on fix

This Year's Zero-Days

This is the fourth Chrome zero-day patched in 2026:

CVEDateType
CVE-2026-0089Jan 5WebRTC
CVE-2026-0156Jan 12V8
CVE-2026-0287Jan 19Skia
CVE-2026-0412Jan 24V8

Recommendations

  1. Immediate: Update Chrome to latest version
  2. Enable auto-updates: Ensure Chrome updates automatically
  3. Consider Site Isolation: Already default but verify enabled
  4. High-risk users: Consider Chrome's Enhanced Safe Browsing

Google's Statement

"We are aware of reports that an exploit for CVE-2026-0412 exists in the wild. We thank the researchers who reported this issue and are committed to protecting our users."


Sources: Google Security Blog, The Hacker News, BleepingComputer

Related Reading

  • Google Patches First Chrome Zero-Day of 2026: CVE-2026-2441
  • Google Chrome Critical Update Patches High-Severity Code
  • Ex-L3Harris Executive Pleads Guilty to Selling Eight
#Google Chrome#Zero-Day#Browser Security#Espionage#CVE

Related Articles

PAN-OS RCE Exploit Under Active Use Enabling Root Access and Espionage

Palo Alto Networks has disclosed that CVE-2026-0300, a critical CVSS 9.3 buffer overflow in the PAN-OS User-ID Authentication service, is being actively exploited to gain root-level remote code execution on network firewalls in what appear to be espionage-motivated campaigns.

5 min read

New Chrome Zero-Day CVE-2026-5281 Under Active Exploitation — Patch Released

Google has released a Chrome security update patching 21 vulnerabilities including a high-severity use-after-free zero-day in the Dawn graphics engine...

4 min read

Ivanti EPMM CVE-2026-6973 RCE Under Active Exploitation Grants Admin-Level Access

Ivanti has disclosed a high-severity improper input validation vulnerability in Endpoint Manager Mobile (EPMM) that is being actively exploited in the wild, granting attackers remote code execution with admin-level access.

5 min read
Back to all News