16th March 2026 Cyber Update: Google Patches Actively Exploited Chrome Zero-Day

Google has issued an emergency patch for a high-severity zero-day (CVE-2026-3910) in its V8 JavaScript engine, which is being actively exploited in the wild. The flaw allows arbitrary code execution, posing a significant risk to billions of Chrome users globally, including in Australia.

16th March 2026 Cyber Update: Google Patches Actively Exploited Chrome Zero-Day
Grok AI generated image.

Cyber News Centre's cyber update for 16th March 2026: Google has released an emergency security update for its Chrome browser to patch a high-severity zero-day vulnerability in its V8 JavaScript engine that is being actively exploited in the wild.

The Update and Why It Matters

Update: Google has released an emergency security update for its Chrome web browser, version 146.0.7680.75, to address a high-severity zero-day vulnerability, tracked as CVE-2026-3910. The flaw, an inappropriate implementation in Chrome's V8 JavaScript and WebAssembly engine, was discovered by Google's Threat Analysis Group on March 10, 2026, and is confirmed to be under active exploitation. The vulnerability allows a remote attacker to execute arbitrary code within the browser's sandbox simply by tricking a user into visiting a malicious website.

Given Chrome's dominant market share in Australia, a significant number of users and organizations are at immediate risk. The US Cybersecurity and Infrastructure Security Agency (CISA) has added the vulnerability to its Known Exploited Vulnerabilities (KEV) catalog, mandating federal agencies to apply the patch by March 27, 2026.

While another zero-day, CVE-2026-3909 in the Skia graphics library, was initially reported alongside this patch, Google has since clarified that its fix will be released in a future update. Users of all Chromium-based browsers, including Microsoft Edge, Brave, and Vivaldi, are also advised to update their software as soon as patches become available.

Why it Matters: The active exploitation of CVE-2026-3910 represents a direct and immediate threat to Australian individuals and organizations. With a low attack complexity that only requires visiting a compromised webpage, the potential for widespread impact is substantial. For businesses, this could lead to the deployment of malware, ransomware, or spyware, resulting in significant data breaches, financial loss, and reputational damage.

The vulnerability undermines the security of the browser, a primary tool for daily business operations, and highlights the persistent threat of sophisticated actors targeting widely used software. The inclusion in the CISA KEV catalog underscores the seriousness of the threat and the urgency for all organizations, not just government agencies, to prioritize patching to mitigate their exposure.

Given Chrome's dominant market share in Australia, a significant number of users and organizations are at immediate risk. The US Cybersecurity and Infrastructure Security Agency (CISA) has added the vulnerability to its Known Exploited Vulnerabilities (KEV) catalog, mandating federal agencies to apply the patch by March 27, 2026.

How to stay safe

To keep your device secure, update Chrome as soon as you can. Here are a few handy tips to help you stay out of trouble, even before a zero-day is patched:

  • Don't click on unknown links in emails, messages, unknown websites, or social media.
  • Turn on automatic updates and restart your computer regularly. Lots of people leave browsers open for days, which means you aren't protected straight away even if the update downloads in the background.
  • Use an up-to-date anti-malware program that includes web protection.
  • If you use other browsers based on Chromium, you should see a similar update coming soon.

Get the stories that matter to you.
Subscribe to Cyber News Centre and update your preferences to follow our Daily 4min Cyber Update, Innovative AI Startups, The AI Diplomat series, or the main Cyber News Centre newsletter — featuring in-depth analysis on major cyber incidents, tech breakthroughs, global policy, and AI developments.

Great! You’ve successfully signed up.

Welcome back! You've successfully signed in.

You've successfully subscribed to Cyber News Centre.

Success! Check your email for magic link to sign-in.

Success! Your billing info has been updated.

Your billing was not updated.