Information security
fromTechRepublic
1 hour agoGoogle Issues High-Risk Security Patch for 3.5 Billion Chrome Users
Google has released a security update for Chrome addressing eight high-risk vulnerabilities affecting its 3.5 billion users.
These findings led us to conclude that this exploit kit was not patchworked but rather designed with a unified approach. We assume that it's an updated version of the same exploitation framework that was used - at least to some extent - in Operation Triangulation.
"This is more likely to complement existing SIEMs than replace them. Early adoption will come from large enterprises already committed to Databricks, especially those seeking flexibility or cost control."
The first vulnerability, CVE-2026-4673, is a heap buffer overflow issue in WebAudio that earned the reporting researcher a $7,000 bug bounty reward. Google has yet to determine the bounty amount for CVE-2026-4677, another bug reported by the same researcher.
CanisterWorm, as Aikido has named the malware, targets organizations' CI/CD pipelines used for rapid development and deployment of software. Every developer or CI pipeline that installs this package and has an npm token accessible becomes an unwitting propagation vector.