<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:media="http://search.yahoo.com/mrss/" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Aaj TV English News - World</title>
    <link>https://english.aaj.tv/</link>
    <description>Aaj TV English</description>
    <language>en-Us</language>
    <copyright>Copyright 2026</copyright>
    <pubDate>Sun, 05 Apr 2026 21:39:51 +0500</pubDate>
    <lastBuildDate>Sun, 05 Apr 2026 21:39:51 +0500</lastBuildDate>
    <ttl>60</ttl>
    <item xmlns:default="http://purl.org/rss/1.0/modules/content/">
      <title>Google issues emergency Chrome update after new zero-day exploit</title>
      <link>https://english.aaj.tv/news/330456448/google-issues-emergency-chrome-update-after-new-zero-day-exploit</link>
      <description>&lt;p&gt;&lt;strong&gt;Just days after rolling out a major security update, Google has issued a new alert for its Chrome browser following the discovery of a fresh zero-day exploit actively being used by hackers.&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The vulnerability, tracked as CVE-2026-5281, threatens the world’s 3.5 billion Chrome users, according to a report in &lt;em&gt;Forbes&lt;/em&gt;.&lt;/p&gt;
&lt;p&gt;Google has already begun distributing a new security update to fix this high-severity flaw, along with 20 other vulnerabilities.&lt;/p&gt;
&lt;p&gt;The rollout of the update could take several days — or even weeks — before reaching all Chrome users.&lt;/p&gt;
&lt;p&gt;Meanwhile, users who want immediate protection can manually update their browser to apply the patch without waiting.&lt;/p&gt;
&lt;h3&gt;&lt;a id="about-cve-2026-5281-zero-day" href="#about-cve-2026-5281-zero-day" class="heading-permalink" aria-hidden="true" title="Permalink"&gt;&lt;/a&gt;&lt;strong&gt;About CVE-2026-5281 zero-day&lt;/strong&gt;&lt;/h3&gt;
&lt;p&gt;Zero-day vulnerabilities in Chrome are becoming increasingly common.&lt;/p&gt;
&lt;p&gt;CVE-2026-5281 is the fourth zero-day patched in the first quarter of 2026 alone, following CVE-2026-2441 in February and CVE-2026-3909 and CVE-2026-3910 in March.&lt;/p&gt;
&lt;p&gt;By comparison, Google patched only eight zero-days in all of 2025.&lt;/p&gt;
&lt;p&gt;Technical details remain limited. Google’s Chrome team, represented by Srinivas Sista, explained that bug details are often withheld until most users have applied the fix.&lt;/p&gt;
&lt;p&gt;What is known is that CVE-2026-5281 is a use-after-free memory vulnerability affecting Chrome’s cross-platform Dawn WebGPU component.&lt;/p&gt;
&lt;p&gt;Exploitation of this flaw could result in browser crashes, data corruption, and arbitrary code execution via specially crafted web pages.&lt;/p&gt;
&lt;h3&gt;&lt;a id="cisa-adds-chrome-zero-day-to-known-exploited-vulnerabilities-list" href="#cisa-adds-chrome-zero-day-to-known-exploited-vulnerabilities-list" class="heading-permalink" aria-hidden="true" title="Permalink"&gt;&lt;/a&gt;&lt;strong&gt;CISA adds Chrome zero-day to known exploited vulnerabilities list&lt;/strong&gt;&lt;/h3&gt;
&lt;p&gt;The Cybersecurity and Infrastructure Security Agency (CISA) has added CVE-2026-5281 to its Known Exploited Vulnerabilities catalogue.&lt;/p&gt;
&lt;p&gt;The agency issued a binding operational directive requiring certain federal agencies to apply the update promptly.&lt;/p&gt;
&lt;p&gt;CISA also strongly advised organisations outside the federal government to address the vulnerability immediately to reduce exposure to potential cyberattacks. Although non-federal organisations are not legally required to act, cybersecurity experts advise evaluating the vulnerability and installing the patch promptly.&lt;/p&gt;
</description>
      <content:encoded xmlns="http://purl.org/rss/1.0/modules/content/"><![CDATA[<p><strong>Just days after rolling out a major security update, Google has issued a new alert for its Chrome browser following the discovery of a fresh zero-day exploit actively being used by hackers.</strong></p>
<p>The vulnerability, tracked as CVE-2026-5281, threatens the world’s 3.5 billion Chrome users, according to a report in <em>Forbes</em>.</p>
<p>Google has already begun distributing a new security update to fix this high-severity flaw, along with 20 other vulnerabilities.</p>
<p>The rollout of the update could take several days — or even weeks — before reaching all Chrome users.</p>
<p>Meanwhile, users who want immediate protection can manually update their browser to apply the patch without waiting.</p>
<h3><a id="about-cve-2026-5281-zero-day" href="#about-cve-2026-5281-zero-day" class="heading-permalink" aria-hidden="true" title="Permalink"></a><strong>About CVE-2026-5281 zero-day</strong></h3>
<p>Zero-day vulnerabilities in Chrome are becoming increasingly common.</p>
<p>CVE-2026-5281 is the fourth zero-day patched in the first quarter of 2026 alone, following CVE-2026-2441 in February and CVE-2026-3909 and CVE-2026-3910 in March.</p>
<p>By comparison, Google patched only eight zero-days in all of 2025.</p>
<p>Technical details remain limited. Google’s Chrome team, represented by Srinivas Sista, explained that bug details are often withheld until most users have applied the fix.</p>
<p>What is known is that CVE-2026-5281 is a use-after-free memory vulnerability affecting Chrome’s cross-platform Dawn WebGPU component.</p>
<p>Exploitation of this flaw could result in browser crashes, data corruption, and arbitrary code execution via specially crafted web pages.</p>
<h3><a id="cisa-adds-chrome-zero-day-to-known-exploited-vulnerabilities-list" href="#cisa-adds-chrome-zero-day-to-known-exploited-vulnerabilities-list" class="heading-permalink" aria-hidden="true" title="Permalink"></a><strong>CISA adds Chrome zero-day to known exploited vulnerabilities list</strong></h3>
<p>The Cybersecurity and Infrastructure Security Agency (CISA) has added CVE-2026-5281 to its Known Exploited Vulnerabilities catalogue.</p>
<p>The agency issued a binding operational directive requiring certain federal agencies to apply the update promptly.</p>
<p>CISA also strongly advised organisations outside the federal government to address the vulnerability immediately to reduce exposure to potential cyberattacks. Although non-federal organisations are not legally required to act, cybersecurity experts advise evaluating the vulnerability and installing the patch promptly.</p>
]]></content:encoded>
      <category>World</category>
      <guid>https://english.aaj.tv/news/330456448</guid>
      <pubDate>Sun, 05 Apr 2026 11:34:06 +0500</pubDate>
      <author>none@none.com (Web Desk)</author>
      <media:content url="https://i.aaj.tv/large/2026/04/051110006df2046.webp" type="image/webp" medium="image" height="480" width="800">
        <media:thumbnail url="https://i.aaj.tv/thumbnail/2026/04/051110006df2046.webp"/>
        <media:title>Picture courtesy Forbes.
</media:title>
      </media:content>
    </item>
  </channel>
</rss>
