Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Chrome to Distrust Chunghwa Telecom and Netlock Certificates

Posted on June 2, 2025June 2, 2025 By CWS

Google on Friday introduced that the Chrome Root Retailer will now not belief digital certificates issued by Chunghwa Telecom and Netlock.

The change shall be launched in Chrome 139 and can affect all Transport Layer Safety (TLS) server authentication certificates issued by the 2 Certificates Authorities (CAs) after July 31, 2025 11:59:59 PM UTC. Digital certificates issued earlier than that point won’t be affected.

The transfer, Google says, is the results of diminished confidence and reliability in Chunghwa Telecom and Netlock as CA Homeowners, on account of “patterns of regarding conduct noticed over the previous yr”.

“These patterns characterize a lack of integrity and fall wanting expectations, eroding belief in these CA Homeowners as publicly-trusted certificates issuers trusted by default in Chrome,” Google says.

Over the previous years, the corporate explains, Chunghwa Telecom and Netlock failed to fulfill compliance, didn’t meet enchancment commitments, and didn’t make tangible progress in responding to publicly disclosed incident experiences.

The choice to take away belief within the two CAs, the web big says, is supposed to protect the integrity of the Chrome Root Retailer and to make sure the security of Chrome customers.

Following the change, when navigating to a web site serving a certificates issued by both of the 2 CAs after July 31, Chrome 139 customers on Home windows, Linux, macOS, Android, and ChromeOS will see a “potential safety risk” warning.

To keep away from disruptions, web site operators are suggested to make use of the Chrome Certificates Viewer to examine the validity of their web site’s certificates and to switch probably affected certificates earlier than July 31.Commercial. Scroll to proceed studying.

“Whereas web site operators might delay the affect of blocking motion by selecting to gather and set up a brand new TLS certificates issued from Chunghwa Telecom or Netlock earlier than Chrome’s blocking motion begins on August 1, 2025, web site operators will inevitably want to gather and set up a brand new TLS certificates from one of many many different CAs included within the Chrome Root Retailer,” Google notes.

Chrome customers and enterprises, the web big explains, can explicitly belief any of the doubtless impacted certificates on Chrome variations that depend on the Chrome Root Retailer, which is able to override the upcoming constraints. For that, they should set up the corresponding root CA certificates as a locally-trusted root on the underlying working system.

Associated: Chrome 137, Firefox 139 Patch Excessive-Severity Vulnerabilities

Associated: SSL.com Scrambles to Patch Certificates Issuance Vulnerability

Associated: Web Giants Comply with Scale back TLS Certificates Lifespan to 47 Days by 2029

Associated: New Issuance Necessities Enhance HTTPS Certificates Validation

Security Week News Tags:Certificates, Chrome, Chunghwa, Distrust, Netlock, Telecom

Post navigation

Previous Post: Role of Threat Intelligence in Proactive Defense Strategies
Next Post: APT Intrusions, AI Malware, Zero-Click Exploits, Browser Hijacks and More

Related Posts

Coinbase Says Rogue Contractor Data Breach Affects 69,461 Users Security Week News
Google Warns of Vishing, Extortion Campaign Targeting Salesforce Customers Security Week News
Cerby Raises $40 Million for Identity Automation Platform Security Week News
Hackers Earn Over $1 Million at Pwn2Own Berlin 2025 Security Week News
Popular Scraping Tool’s NPM Package Compromised in Supply Chain Attack Security Week News
Sharing Intelligence Beyond CTI Teams, Across Wider Functions and Departments Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • New Rust Based InfoStealer Extracts Sensitive Data from Chromium-based Browsers
  • Hackers Using New ClickFix Technique To Exploits Human Error Via Fake Prompts
  • Hundreds of GitHub Malware Repos Targeting Novice Cybercriminals Linked to Single User
  • How to Avoid QR Code Scams
  • New ClickFix Attack Exploits Fake Cloudflare Human Check to Install Malware Silently

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • June 2025
  • May 2025

Recent Posts

  • New Rust Based InfoStealer Extracts Sensitive Data from Chromium-based Browsers
  • Hackers Using New ClickFix Technique To Exploits Human Error Via Fake Prompts
  • Hundreds of GitHub Malware Repos Targeting Novice Cybercriminals Linked to Single User
  • How to Avoid QR Code Scams
  • New ClickFix Attack Exploits Fake Cloudflare Human Check to Install Malware Silently

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News