Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
Microsoft Exposes Kazuar Malware’s Modular P Details Malware’s
May 15, 2026
VMware Fusion Vulnerability Let Attackers Escalate Privilege to Root
May 15, 2026
Hackers Abuse Scheduled Tasks for FrostyNeighbor Persistence
May 15, 2026
Home/CyberSecurity News/79 Chrome Vulnerabilities Patched, Including 14 Critical One’s
CyberSecurity News

79 Chrome Vulnerabilities Patched, Including 14 Critical One’s

Google has issued a significant security update for its Chrome browser, patching 79 vulnerabilities to prevent their exploitation by threat actors. With 14 of these flaws rated as critical, browsing...

Emy Elsamnoudy
Emy Elsamnoudy
May 15, 2026 2 Min Read
2 0

Google has issued a significant security update for its Chrome browser, patching 79 vulnerabilities to prevent their exploitation by threat actors.

With 14 of these flaws rated as critical, browsing the web on an outdated version leaves your entire system wide open to devastating cyberattacks.

The newest stable release bumps Chrome to 148.0.7778.167/168 on Windows and Mac, while Linux users will upgrade to 148.0.7778.167.

Google is deploying this patch over the coming days, but proactive users and enterprise administrators should trigger the update manually.

The sheer volume of this release highlights the constant battle against memory corruption bugs, particularly “Use-after-free” (UAF) and “Heap buffer overflow” flaws that commonly plague complex browser architectures.

As standard practice, Google keeps specific exploit details and proof-of-concept code restricted.

This creates a vital window for the global user base to install the patch before malware operators weaponize the disclosures.

However, the tech giant has already paid out hefty bug bounties to independent researchers, highlighting the severity of the findings.

The highest reward of $43,000 went to an external researcher who discovered a critical heap buffer overflow in the WebML component.

Critical Chrome Vulnerabilities Patched

Google released fixes for multiple memory management flaws that could let attackers execute arbitrary code through malicious HTML pages.

Below is a breakdown of the most severe vulnerabilities patched in this update that every security intelligence team needs to track.

CVE ID Component Vulnerability Type Reporter Bounty
CVE-2026-8509 WebML Heap buffer overflow c6eed09fc8b174b0f3eebedcceb1e792 $43,000
CVE-2026-8510 Skia Integer overflow [email protected] $25,000
CVE-2026-8511 UI Use after free Google N/A
CVE-2026-8512 FileSystem Use after free Google N/A
CVE-2026-8513 Input Use after free Google N/A
CVE-2026-8514 Aura Use after free Google N/A
CVE-2026-8515 HID Use after free Google N/A
CVE-2026-8516 DataTransfer Insufficient validation of untrusted input Google N/A
CVE-2026-8517 WebShare Object lifecycle issue Google N/A
CVE-2026-8518 Blink Use after free Google N/A
CVE-2026-8519 ANGLE Integer overflow Google N/A
CVE-2026-8520 Payments Race condition Google N/A
CVE-2026-8521 Tab Groups Use after free Google N/A
CVE-2026-8522 Downloads Use after free Google N/A

Threat actors heavily target browser vulnerabilities to bypass sandboxes, steal sensitive data, and compromise the underlying operating system.

Delaying this patch is a direct risk to your infrastructure. Take these immediate steps to secure your environment:

  • Navigate to the three-dot menu in the top right corner of your Chrome browser.
  • Select Help, then click on About Google Chrome.
  • Allow the browser to fetch and install version 148 automatically.
  • Click Relaunch to apply the security fixes and clear active sessions.

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

AttackCVEExploitMalwarePatchSecurityThreatVulnerability

Share Article

Emy Elsamnoudy

Emy Elsamnoudy

Emy is a cybersecurity analyst and reporter specializing in threat hunting, defense strategies, and industry trends. With expertise in proactive security measures, Emily covers the tools and techniques organizations use to detect and prevent cyber attacks. She is a regular speaker at security conferences and has contributed to industry reports on threat intelligence and security operations. Emily's reporting focuses on helping organizations improve their security posture through practical, actionable insights.

Previous Post

Critical Microsoft Exchange Server Flaw Actively Exploited

Next Post

Hackers Abuse Scheduled Tasks for FrostyNeighbor Persistence

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
Critical Next.js Flaw Exposes Cloud Vulnerability Credentials
May 15, 2026
OpenAI Confirms Security Breach from TanStack npm Attack
May 15, 2026
Cisco Catalyst SD-WAN Controller 0-Day Actively Exploited to Gain
May 15, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Jennifer sherman
Jennifer sherman
Sarah simpson
Sarah simpson
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us