This weakness crypto money It concerns almost all internet users, especially investors. Zero-day vulnerabilities are things that highly skilled attackers detect and gain serious power over until they are noticed. The Singapore Cyber Security Agency also warns about this.
Google Chrome Vulnerability
There have been and will be many vulnerabilities in systems over the years. The Singapore Computer Emergency Response Team (SingCERT) on Thursday, August 18 Google An important vulnerability has been announced that threatens Chrome users. Google When a 0day is detected, it does not provide any details about the vulnerability before closing it. This is done to prevent the vulnerability from being detected by more attackers. A Prize Pool Worth 21 Million TL Awaits You from BinanceTR! Participating and winning has never been easier.. You can sign up to BinanceTR from this link. Get your first crypto!
This vulnerability, which Google calls CVE-2022-2856, shows what kind of dangers await you in the future. That’s why you should always be skeptical and careful about the websites you visit, especially the links sent to you from social media.
These vulnerabilities, which are often not detected by security software during the attack, are not yet detected and the advantage of being unidentified is used greatly.
What is CVE-2022-2856?
This identifies a vulnerability related to “Intents,” a function in the browser that processes user input. As explained by Joanne Wong, this function is used to automatically launch applications and pass data to applications.
“It is crucial that such user inputs are validated to ensure that only correct data is entered into an information system and to prevent bad data from becoming persistent in the database and triggering a failure.”
Attackers can use this to sabotage an application and run their own malicious code when user input is not properly validated. Wong said arbitrary code execution has been used in the past to steal data, execute extortion schemes, and even expose private text messages and search history.
“In addition, some of the most severe flaws allow an attacker to execute malicious code in the context of the user. In this case, the severity of the attack depends on the privileges associated with the user – whether they have the authority to install new programs; view, modify or delete data; or create new user accounts.”
Google announced that this vulnerability has been closed and a detailed report will be shared at the end of 90 days. This year Google 4 different 0day vulnerability As the situation continues to deteriorate, it seems beneficial for investors to remain vigilant.
Disclaimer: The information contained in this article does not contain investment advice. Investors should be aware that cryptocurrencies carry high volatility and therefore risk, and should carry out their transactions in line with their own research.