Digitally securing India is an achievable goal, especially with the support of national bodies like CERT-IN (Indian Computer Emergency Response Team). CERT-IN plays a pivotal role in strengthening cybersecurity across the country by focusing on threat intelligence, incident response, and collaboration with industry and government entities.
CERT-IN continuously monitors the internet for security threats and vulnerabilities, issuing alerts and advisories to government agencies, businesses, and citizens. This proactive approach helps mitigate large-scale cyberattacks.
CERT-IN coordinates responses to cybersecurity incidents such as data breaches, ransomware attacks, and phishing campaigns. They provide guidance on counter-measures, minimizing damage, and speeding up recovery.
According to CERT-In, the vulnerabilities affect Google Chrome versions prior to 128.0.6613.119/.120 for Windows and macOS, and versions prior to 128.0.6613.119 for Linux.
These flaws have been assigned the CVE identifiers CVE-2024-8362 and CVE-2024-7970. CERT-In explains that these vulnerabilities stem from "use after free" issues in Web Audio and other components of Chrome, which can be exploited by remote attackers to gain control over affected systems.
Critical infrastructure sectors (power, transport, banking, etc.) must be protected through comprehensive security policies, including regular security audits, patch management, and robust incident response frameworks. CERT-IN already supports this effort by offering guidelines and best practices.
India’s growing focus on national cybersecurity policies, can help develop strict laws for data protection and cybersecurity compliance across industries. CERT-IN plays a key role in enforcing these standards.
Detailing more about the risks, CERT-In notes that these reported vulnerabilities could allow a remote attacker to execute arbitrary code on the targeted system. In simpler terms, this means that hackers can exploit these vulnerabilities, and if successful, they could run any command or software on your computer without your permission.
Once they gain this access, they could potentially take full control of the system, allowing them to steal sensitive information like passwords and financial details, install malicious software (malware), or even use your computer to launch attacks on others.
According to the advisory, Please update your Google Chrome browser even if you do not use it regularly. If you have it installed and not updated vulnerability exist and can be exploited by hackers without your intervention or clicking on anything. It affects the OS, both- Windows and iOS.
See What’s Next in Tech With the Fast Forward Newsletter
Tweets From @varindiamag
Nothing to see here - yet
When they Tweet, their Tweets will show up here.