Actively exploited zero-day flaw in Google Chrome now patched – is yours? Could you check?

Make sure your Google Chrome patching is up to date.

Google has just released a patch to fix a flaw in Chrome that was being actively exploited by threat actors. The attack is directed at the WebRTC system – which is a component used in web based comms, so avoid those until you have run the patches. (This is a situation where Octagon’s RMM tools would a benefit to you, as with it you could check that everyone has Google Chrome patched.)

Google patches new Chrome zero-day flaw exploited in attacks (bleepingcomputer.com)

Google is claiming they have seen examples of exploits in the wild, but for obvious reasons they have not yet released any technical details – that gives you and me a head start to run the patches!

My advice: Either you or your IT support need to check whether these issues impact your systems. You need to have a master document that details your systems, hardware, software, online, networks, back-ups, suppliers etc – so when cyber security (or operational) issues arise you and your support teams can quickly check if you are affected. From there you can take fast, effective action.

patch now 200