{"id":1984,"date":"2023-08-07T02:37:03","date_gmt":"2023-08-07T07:37:03","guid":{"rendered":"https:\/\/www.cyberwissen.net\/?p=1984"},"modified":"2024-03-23T03:59:08","modified_gmt":"2024-03-23T03:59:08","slug":"cybercriminals-exploit-critical-vulnerability-in-chrome","status":"publish","type":"post","link":"https:\/\/cyberwissen.io\/pt\/cybercriminals-exploit-critical-vulnerability-in-chrome\/","title":{"rendered":"Cybercriminals Exploit Critical Vulnerability in Chrome"},"content":{"rendered":"<p><b>URGENTLY UPDATE YOUR GOOGLE CHROME TO STAY SAFE!<\/b><\/p>\n<p><a href=\"https:\/\/chromereleases.googleblog.com\/2023\/04\/stable-channel-update-for-desktop_14.html\"><span style=\"font-weight: 400;\">Google has just rolled out an emergency update for Google Chrome<\/span><\/a><span style=\"font-weight: 400;\"> on Windows, Mac, and Linux systems. This update is to address the pressing threat posed by CVE-2023-2033, a perilous vulnerability discovered in the desktop version of the browser.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">This vulnerability is already being exploited by malicious actors. It&#8217;s marked as the first Chrome vulnerability to be actively exploited in the wild this year. The potential consequences are dire: Attackers can potentially induce a browser crash or worse, execute malicious code on your device without your consent.<\/span><\/p>\n<p style=\"text-align: center;\"><img data-opt-id=1653925181  fetchpriority=\"high\" decoding=\"async\" class=\"aligncenter size-full wp-image-3015\" src=\"https:\/\/mlwdwcp8ntog.i.optimole.com\/w:auto\/h:auto\/q:mauto\/ig:avif\/https:\/\/cyberwissen.io\/pt\/wp-content\/uploads\/sites\/17\/2023\/08\/7971765_3808762.jpg\" alt=\"\" width=\"1920\" height=\"1280\" srcset=\"https:\/\/mlwdwcp8ntog.i.optimole.com\/w:1620\/h:1080\/q:mauto\/ig:avif\/https:\/\/cyberwissen.io\/pt\/wp-content\/uploads\/sites\/17\/2023\/08\/7971765_3808762.jpg 1920w, https:\/\/mlwdwcp8ntog.i.optimole.com\/w:300\/h:200\/q:mauto\/ig:avif\/https:\/\/cyberwissen.io\/pt\/wp-content\/uploads\/sites\/17\/2023\/08\/7971765_3808762.jpg 300w, https:\/\/mlwdwcp8ntog.i.optimole.com\/w:1024\/h:683\/q:mauto\/ig:avif\/https:\/\/cyberwissen.io\/pt\/wp-content\/uploads\/sites\/17\/2023\/08\/7971765_3808762.jpg 1024w, https:\/\/mlwdwcp8ntog.i.optimole.com\/w:768\/h:512\/q:mauto\/ig:avif\/https:\/\/cyberwissen.io\/pt\/wp-content\/uploads\/sites\/17\/2023\/08\/7971765_3808762.jpg 768w, https:\/\/mlwdwcp8ntog.i.optimole.com\/w:1536\/h:1024\/q:mauto\/ig:avif\/https:\/\/cyberwissen.io\/pt\/wp-content\/uploads\/sites\/17\/2023\/08\/7971765_3808762.jpg 1536w\" sizes=\"(max-width: 1000px) 100vw, 1000px\" \/><\/p>\n<p style=\"text-align: center;\"><i><span style=\"font-weight: 400;\">Hackers can penetrate your system through different methods, from malwares to crashes. Source: <\/span><\/i><a href=\"https:\/\/cdn.creazilla.com\/illustrations\/1662805\/hacker-trojan-program-illustration-md.jpeg\"><i><span style=\"font-weight: 400;\">Creazillla<\/span><\/i><\/a><\/p>\n<h2><span style=\"font-weight: 400;\">What You Must Do Now<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">To protect yourself against these looming threats, it&#8217;s absolutely crucial to take immediate action. <\/span><b>We highly recommend you to update your Google Chrome browser as soon as possible.<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Usually, your browser updates quietly in the background when you restart the app. If you&#8217;re someone who prefers to keep the browser running continuously, you should pause and relaunch the application to initiate the update. Rest assured, any tabs you had open will swiftly reappear \u2013 with the exception of Incognito tabs.<\/span><\/p>\n<p><span style=\"font-weight: 400;\"><a href=\"https:\/\/www.cyberwissen.io\/pt\">Your online safety is our priority.<\/a> Don&#8217;t delay, update your Google Chrome now to ensure a secure browsing experience.\u00a0 <\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>URGENTLY UPDATE YOUR GOOGLE CHROME TO STAY SAFE! Google has just rolled out an emergency update for Google Chrome on Windows, Mac, and Linux systems. This update is to address the pressing threat posed by CVE-2023-2033, a perilous vulnerability discovered in the desktop version of the browser. This vulnerability is already being exploited by malicious [&#8230;]<\/p>\n","protected":false},"author":2,"featured_media":3017,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"footnotes":""},"categories":[4],"tags":[3],"class_list":["post-1984","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyber-security","tag-blog"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/cyberwissen.io\/pt\/wp-json\/wp\/v2\/posts\/1984","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cyberwissen.io\/pt\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cyberwissen.io\/pt\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cyberwissen.io\/pt\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/cyberwissen.io\/pt\/wp-json\/wp\/v2\/comments?post=1984"}],"version-history":[{"count":4,"href":"https:\/\/cyberwissen.io\/pt\/wp-json\/wp\/v2\/posts\/1984\/revisions"}],"predecessor-version":[{"id":3019,"href":"https:\/\/cyberwissen.io\/pt\/wp-json\/wp\/v2\/posts\/1984\/revisions\/3019"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cyberwissen.io\/pt\/wp-json\/wp\/v2\/media\/3017"}],"wp:attachment":[{"href":"https:\/\/cyberwissen.io\/pt\/wp-json\/wp\/v2\/media?parent=1984"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cyberwissen.io\/pt\/wp-json\/wp\/v2\/categories?post=1984"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cyberwissen.io\/pt\/wp-json\/wp\/v2\/tags?post=1984"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}