{"id":7030,"date":"2026-02-18T07:14:40","date_gmt":"2026-02-18T07:14:40","guid":{"rendered":"https:\/\/news.cybertechworld.co.in\/index.php\/2026\/02\/18\/cisa-flags-four-security-flaws-under-active-exploitation-in-latest-kev-update\/"},"modified":"2026-02-18T07:14:40","modified_gmt":"2026-02-18T07:14:40","slug":"cisa-flags-four-security-flaws-under-active-exploitation-in-latest-kev-update","status":"publish","type":"post","link":"https:\/\/news.cybertechworld.co.in\/index.php\/2026\/02\/18\/cisa-flags-four-security-flaws-under-active-exploitation-in-latest-kev-update\/","title":{"rendered":"CISA Flags Four Security Flaws Under Active Exploitation in Latest KEV Update"},"content":{"rendered":"<p>\u200bThe U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Tuesday added four security flaws to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitation in the wild.<br \/>\nThe list of vulnerabilities is as follows &#8211;<\/p>\n<p>CVE-2026-2441 (CVSS score: 8.8) &#8211; A use-after-free vulnerability in Google Chrome that could allow a remote attacker to potentially exploit heap\u00a0The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Tuesday added four security flaws to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitation in the wild.<br \/>\nThe list of vulnerabilities is as follows &#8211;<\/p>\n<p>CVE-2026-2441 (CVSS score: 8.8) &#8211; A use-after-free vulnerability in Google Chrome that could allow a remote attacker to potentially exploit heap\u00a0\u00a0The Hacker News<\/p>","protected":false},"excerpt":{"rendered":"<p>\u200bThe U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Tuesday added four security flaws to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitation in the wild. The list of vulnerabilities is as follows &#8211; CVE-2026-2441 (CVSS score: 8.8) &#8211; A use-after-free vulnerability in Google Chrome that could allow a remote attacker to&hellip;&nbsp;<a href=\"https:\/\/news.cybertechworld.co.in\/index.php\/2026\/02\/18\/cisa-flags-four-security-flaws-under-active-exploitation-in-latest-kev-update\/\" class=\"\" rel=\"bookmark\">Read More &raquo;<span class=\"screen-reader-text\">CISA Flags Four Security Flaws Under Active Exploitation in Latest KEV Update<\/span><\/a><\/p>\n","protected":false},"author":0,"featured_media":7031,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"neve_meta_sidebar":"","neve_meta_container":"","neve_meta_enable_content_width":"","neve_meta_content_width":0,"neve_meta_title_alignment":"","neve_meta_author_avatar":"","neve_post_elements_order":"","neve_meta_disable_header":"","neve_meta_disable_footer":"","neve_meta_disable_title":"","_themeisle_gutenberg_block_has_review":false,"footnotes":""},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/posts\/7030"}],"collection":[{"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/types\/post"}],"replies":[{"embeddable":true,"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/comments?post=7030"}],"version-history":[{"count":0,"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/posts\/7030\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/media\/7031"}],"wp:attachment":[{"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/media?parent=7030"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/categories?post=7030"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/tags?post=7030"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}