Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Chrome to Distrust Chunghwa Telecom and Netlock Certificates

Chrome to Distrust Chunghwa Telecom and Netlock Certificates

Posted on June 2, 2025June 2, 2025 By CWS

Google on Friday introduced that the Chrome Root Retailer will now not belief digital certificates issued by Chunghwa Telecom and Netlock.

The change shall be launched in Chrome 139 and can affect all Transport Layer Safety (TLS) server authentication certificates issued by the 2 Certificates Authorities (CAs) after July 31, 2025 11:59:59 PM UTC. Digital certificates issued earlier than that point won’t be affected.

The transfer, Google says, is the results of diminished confidence and reliability in Chunghwa Telecom and Netlock as CA Homeowners, on account of “patterns of regarding conduct noticed over the previous yr”.

“These patterns characterize a lack of integrity and fall wanting expectations, eroding belief in these CA Homeowners as publicly-trusted certificates issuers trusted by default in Chrome,” Google says.

Over the previous years, the corporate explains, Chunghwa Telecom and Netlock failed to fulfill compliance, didn’t meet enchancment commitments, and didn’t make tangible progress in responding to publicly disclosed incident experiences.

The choice to take away belief within the two CAs, the web big says, is supposed to protect the integrity of the Chrome Root Retailer and to make sure the security of Chrome customers.

Following the change, when navigating to a web site serving a certificates issued by both of the 2 CAs after July 31, Chrome 139 customers on Home windows, Linux, macOS, Android, and ChromeOS will see a “potential safety risk” warning.

To keep away from disruptions, web site operators are suggested to make use of the Chrome Certificates Viewer to examine the validity of their web site’s certificates and to switch probably affected certificates earlier than July 31.Commercial. Scroll to proceed studying.

“Whereas web site operators might delay the affect of blocking motion by selecting to gather and set up a brand new TLS certificates issued from Chunghwa Telecom or Netlock earlier than Chrome’s blocking motion begins on August 1, 2025, web site operators will inevitably want to gather and set up a brand new TLS certificates from one of many many different CAs included within the Chrome Root Retailer,” Google notes.

Chrome customers and enterprises, the web big explains, can explicitly belief any of the doubtless impacted certificates on Chrome variations that depend on the Chrome Root Retailer, which is able to override the upcoming constraints. For that, they should set up the corresponding root CA certificates as a locally-trusted root on the underlying working system.

Associated: Chrome 137, Firefox 139 Patch Excessive-Severity Vulnerabilities

Associated: SSL.com Scrambles to Patch Certificates Issuance Vulnerability

Associated: Web Giants Comply with Scale back TLS Certificates Lifespan to 47 Days by 2029

Associated: New Issuance Necessities Enhance HTTPS Certificates Validation

Security Week News Tags:Certificates, Chrome, Chunghwa, Distrust, Netlock, Telecom

Post navigation

Previous Post: Role of Threat Intelligence in Proactive Defense Strategies
Next Post: APT Intrusions, AI Malware, Zero-Click Exploits, Browser Hijacks and More

Related Posts

TurboMirai-Class ‘Aisuru’ Botnet Blamed for 20+ Tbps DDoS Attacks TurboMirai-Class ‘Aisuru’ Botnet Blamed for 20+ Tbps DDoS Attacks Security Week News
Ukrainian Jailed for Role in North Korean IT Fraud Ukrainian Jailed for Role in North Korean IT Fraud Security Week News
ManoMano Data Breach Affects 38 Million Users ManoMano Data Breach Affects 38 Million Users Security Week News
Hackers Access Legacy Systems in Oxford City Council Cyberattack Hackers Access Legacy Systems in Oxford City Council Cyberattack Security Week News
Lumma Stealer Malware Returns After Takedown Attempt Lumma Stealer Malware Returns After Takedown Attempt Security Week News
Ransomware Payments Surpassed .5 Billion: US Treasury Ransomware Payments Surpassed $4.5 Billion: US Treasury Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Russian Group Star Blizzard Utilizes DarkSword iOS Exploit
  • Secrets Sprawl Expands in 2026: Key Insights for CISOs
  • Urgent Patches Address Critical Grafana Security Flaws
  • Telnyx Python SDK Faces Supply Chain Attack
  • Russian Toolkit Exploits RDP via Malicious LNK Files

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Russian Group Star Blizzard Utilizes DarkSword iOS Exploit
  • Secrets Sprawl Expands in 2026: Key Insights for CISOs
  • Urgent Patches Address Critical Grafana Security Flaws
  • Telnyx Python SDK Faces Supply Chain Attack
  • Russian Toolkit Exploits RDP via Malicious LNK Files

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark