Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Chrome to Distrust Chunghwa Telecom and Netlock Certificates

Chrome to Distrust Chunghwa Telecom and Netlock Certificates

Posted on June 2, 2025June 2, 2025 By CWS

Google on Friday introduced that the Chrome Root Retailer will now not belief digital certificates issued by Chunghwa Telecom and Netlock.

The change shall be launched in Chrome 139 and can affect all Transport Layer Safety (TLS) server authentication certificates issued by the 2 Certificates Authorities (CAs) after July 31, 2025 11:59:59 PM UTC. Digital certificates issued earlier than that point won’t be affected.

The transfer, Google says, is the results of diminished confidence and reliability in Chunghwa Telecom and Netlock as CA Homeowners, on account of “patterns of regarding conduct noticed over the previous yr”.

“These patterns characterize a lack of integrity and fall wanting expectations, eroding belief in these CA Homeowners as publicly-trusted certificates issuers trusted by default in Chrome,” Google says.

Over the previous years, the corporate explains, Chunghwa Telecom and Netlock failed to fulfill compliance, didn’t meet enchancment commitments, and didn’t make tangible progress in responding to publicly disclosed incident experiences.

The choice to take away belief within the two CAs, the web big says, is supposed to protect the integrity of the Chrome Root Retailer and to make sure the security of Chrome customers.

Following the change, when navigating to a web site serving a certificates issued by both of the 2 CAs after July 31, Chrome 139 customers on Home windows, Linux, macOS, Android, and ChromeOS will see a “potential safety risk” warning.

To keep away from disruptions, web site operators are suggested to make use of the Chrome Certificates Viewer to examine the validity of their web site’s certificates and to switch probably affected certificates earlier than July 31.Commercial. Scroll to proceed studying.

“Whereas web site operators might delay the affect of blocking motion by selecting to gather and set up a brand new TLS certificates issued from Chunghwa Telecom or Netlock earlier than Chrome’s blocking motion begins on August 1, 2025, web site operators will inevitably want to gather and set up a brand new TLS certificates from one of many many different CAs included within the Chrome Root Retailer,” Google notes.

Chrome customers and enterprises, the web big explains, can explicitly belief any of the doubtless impacted certificates on Chrome variations that depend on the Chrome Root Retailer, which is able to override the upcoming constraints. For that, they should set up the corresponding root CA certificates as a locally-trusted root on the underlying working system.

Associated: Chrome 137, Firefox 139 Patch Excessive-Severity Vulnerabilities

Associated: SSL.com Scrambles to Patch Certificates Issuance Vulnerability

Associated: Web Giants Comply with Scale back TLS Certificates Lifespan to 47 Days by 2029

Associated: New Issuance Necessities Enhance HTTPS Certificates Validation

Security Week News Tags:Certificates, Chrome, Chunghwa, Distrust, Netlock, Telecom

Post navigation

Previous Post: Role of Threat Intelligence in Proactive Defense Strategies
Next Post: APT Intrusions, AI Malware, Zero-Click Exploits, Browser Hijacks and More

Related Posts

‘Highest Ever’ Severity Score Assigned by Microsoft to ASP.NET Core Vulnerability ‘Highest Ever’ Severity Score Assigned by Microsoft to ASP.NET Core Vulnerability Security Week News
CISA Warns of Exploited DELMIA Factory Software Vulnerabilities CISA Warns of Exploited DELMIA Factory Software Vulnerabilities Security Week News
Adobe Patches Critical Vulnerability in Connect Collaboration Suite Adobe Patches Critical Vulnerability in Connect Collaboration Suite Security Week News
Companies Warned of Commvault Vulnerability Exploitation Companies Warned of Commvault Vulnerability Exploitation Security Week News
RSAC Unveils Quantickle: Open Source Threat Visualization Tool RSAC Unveils Quantickle: Open Source Threat Visualization Tool Security Week News
Infostealers: The Silent Smash-and-Grab Driving Modern Cybercrime Infostealers: The Silent Smash-and-Grab Driving Modern Cybercrime Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News