Skip to main content
COSMICBYTEZLABS
NewsSecurityHOWTOsToolsStudyTraining
ProjectsChecklistsAI RankingsNewsletterStatusTagsAbout
Subscribe

Press Enter to search or Esc to close

News
Security
HOWTOs
Tools
Study
Training
Projects
Checklists
AI Rankings
Newsletter
Status
Tags
About
RSS Feed
Reading List
Subscribe

Stay in the Loop

Get the latest security alerts, tutorials, and tech insights delivered to your inbox.

Subscribe NowFree forever. No spam.
COSMICBYTEZLABS

Your trusted source for IT intelligence, cybersecurity insights, and hands-on technical guides.

429+ Articles
114+ Guides

CONTENT

  • Latest News
  • Security Alerts
  • HOWTOs
  • Projects
  • Exam Prep

RESOURCES

  • Search
  • Browse Tags
  • Newsletter Archive
  • Reading List
  • RSS Feed

COMPANY

  • About Us
  • Contact
  • Privacy Policy
  • Terms of Service

© 2026 CosmicBytez Labs. All rights reserved.

System Status: Operational
  1. Home
  2. News
  3. Google Patches Actively Exploited Chrome Zero-Day
Google Patches Actively Exploited Chrome Zero-Day
NEWS

Google Patches Actively Exploited Chrome Zero-Day

Google has released an emergency Chrome update to fix a zero-day vulnerability being actively exploited in targeted attacks against journalists and activists.

Dylan H.

Security Engineer

January 24, 2026
2 min read

Google Patches Actively Exploited Chrome Zero-Day

Google has released an emergency security update for Chrome to address a zero-day vulnerability that's being actively exploited in the wild. The flaw is being used in targeted attacks against journalists and human rights activists.

Vulnerability Overview

  • CVE: CVE-2026-0412
  • CVSS Score: 8.8 (High)
  • Component: V8 JavaScript engine
  • Type: Type confusion vulnerability

Active Exploitation

Google's Threat Analysis Group (TAG) discovered the vulnerability being exploited by a sophisticated threat actor:

  • Targets include journalists in multiple countries
  • Attacks delivered via spear-phishing emails
  • Exploitation leads to full browser compromise
  • Evidence suggests nation-state involvement

Technical Details

The vulnerability exists in Chrome's V8 JavaScript engine:

Type: Type Confusion in V8
Impact: Remote Code Execution
Prerequisite: Visit malicious website
User Interaction: None beyond page visit

Affected Versions

PlatformAffectedFixed Version
Windows< 122.0.6261.95122.0.6261.95
macOS< 122.0.6261.95122.0.6261.95
Linux< 122.0.6261.95122.0.6261.95

Update Instructions

Chrome should update automatically, but to verify:

  1. Open Chrome menu (three dots)
  2. Help > About Google Chrome
  3. Chrome will check for updates
  4. Restart browser to complete update

Chromium-Based Browsers

Other browsers using Chromium are also affected:

  • Microsoft Edge - Update expected shortly
  • Brave - Patch in progress
  • Opera - Update pending
  • Vivaldi - Working on fix

This Year's Zero-Days

This is the fourth Chrome zero-day patched in 2026:

CVEDateType
CVE-2026-0089Jan 5WebRTC
CVE-2026-0156Jan 12V8
CVE-2026-0287Jan 19Skia
CVE-2026-0412Jan 24V8

Recommendations

  1. Immediate: Update Chrome to latest version
  2. Enable auto-updates: Ensure Chrome updates automatically
  3. Consider Site Isolation: Already default but verify enabled
  4. High-risk users: Consider Chrome's Enhanced Safe Browsing

Google's Statement

"We are aware of reports that an exploit for CVE-2026-0412 exists in the wild. We thank the researchers who reported this issue and are committed to protecting our users."


Sources: Google Security Blog, The Hacker News, BleepingComputer

Related Reading

  • Google Patches First Chrome Zero-Day of 2026: CVE-2026-2441
  • Google Chrome Critical Update Patches High-Severity Code
  • Ex-L3Harris Executive Pleads Guilty to Selling Eight
#Google Chrome#Zero-Day#Browser Security#Espionage#CVE

Related Articles

Interlock Ransomware Exploited Cisco FMC Zero-Day for 36 Days Before Disclosure

CVE-2026-20131, a maximum-severity CVSS 10.0 insecure deserialization flaw in Cisco Firepower Management Center, was exploited by Interlock ransomware as...

4 min read

Critical Langflow RCE Flaw Exploited Within 20 Hours of Disclosure

CVE-2026-33017, a CVSS 9.3 unauthenticated remote code execution vulnerability in the Langflow AI platform, was weaponized by threat actors within 20...

3 min read

Interlock Ransomware Has Been Exploiting Cisco FMC Zero-Day CVE-2026-20131 Since January

The Interlock ransomware gang has been actively exploiting a CVSS 10.0 insecure deserialization flaw in Cisco Secure Firewall Management Center since late...

7 min read
Back to all News