Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Chrome to Distrust Chunghwa Telecom and Netlock Certificates

Posted on June 2, 2025June 2, 2025 By CWS

Google on Friday introduced that the Chrome Root Retailer will now not belief digital certificates issued by Chunghwa Telecom and Netlock.

The change shall be launched in Chrome 139 and can affect all Transport Layer Safety (TLS) server authentication certificates issued by the 2 Certificates Authorities (CAs) after July 31, 2025 11:59:59 PM UTC. Digital certificates issued earlier than that point won’t be affected.

The transfer, Google says, is the results of diminished confidence and reliability in Chunghwa Telecom and Netlock as CA Homeowners, on account of “patterns of regarding conduct noticed over the previous yr”.

“These patterns characterize a lack of integrity and fall wanting expectations, eroding belief in these CA Homeowners as publicly-trusted certificates issuers trusted by default in Chrome,” Google says.

Over the previous years, the corporate explains, Chunghwa Telecom and Netlock failed to fulfill compliance, didn’t meet enchancment commitments, and didn’t make tangible progress in responding to publicly disclosed incident experiences.

The choice to take away belief within the two CAs, the web big says, is supposed to protect the integrity of the Chrome Root Retailer and to make sure the security of Chrome customers.

Following the change, when navigating to a web site serving a certificates issued by both of the 2 CAs after July 31, Chrome 139 customers on Home windows, Linux, macOS, Android, and ChromeOS will see a “potential safety risk” warning.

To keep away from disruptions, web site operators are suggested to make use of the Chrome Certificates Viewer to examine the validity of their web site’s certificates and to switch probably affected certificates earlier than July 31.Commercial. Scroll to proceed studying.

“Whereas web site operators might delay the affect of blocking motion by selecting to gather and set up a brand new TLS certificates issued from Chunghwa Telecom or Netlock earlier than Chrome’s blocking motion begins on August 1, 2025, web site operators will inevitably want to gather and set up a brand new TLS certificates from one of many many different CAs included within the Chrome Root Retailer,” Google notes.

Chrome customers and enterprises, the web big explains, can explicitly belief any of the doubtless impacted certificates on Chrome variations that depend on the Chrome Root Retailer, which is able to override the upcoming constraints. For that, they should set up the corresponding root CA certificates as a locally-trusted root on the underlying working system.

Associated: Chrome 137, Firefox 139 Patch Excessive-Severity Vulnerabilities

Associated: SSL.com Scrambles to Patch Certificates Issuance Vulnerability

Associated: Web Giants Comply with Scale back TLS Certificates Lifespan to 47 Days by 2029

Associated: New Issuance Necessities Enhance HTTPS Certificates Validation

Security Week News Tags:Certificates, Chrome, Chunghwa, Distrust, Netlock, Telecom

Post navigation

Previous Post: Role of Threat Intelligence in Proactive Defense Strategies
Next Post: APT Intrusions, AI Malware, Zero-Click Exploits, Browser Hijacks and More

Related Posts

Swimlane Raises $45 Million for Security Automation Platform Security Week News
High-Severity Vulnerabilities Patched in Tenable Nessus Agent Security Week News
Webinar Today: Rethinking Endpoint Hardening for Today’s Attack Landscape Security Week News
Akamai, Microsoft Disagree on Severity of Unpatched ‘BadSuccessor’ Flaw Security Week News
Google Finds Data Theft Malware Used by Russian APT in Select Cases Security Week News
July 2025 Breaks a Decade of Monthly Android Patches Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Weaponized LNK File Disguised as Credit Card Security Email Steals User Data
  • How to Recognize Fake Reviews and Scams
  • Lumma Stealer Via Fake Cracked Software Steals Login Credentials and Private Files
  • Key Administrator of World’s Most Popular Dark Web Cybercrime Platform Arrested
  • New ZuRu Malware Variant Weaponizes Termius SSH Client to Attack macOS Users

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Weaponized LNK File Disguised as Credit Card Security Email Steals User Data
  • How to Recognize Fake Reviews and Scams
  • Lumma Stealer Via Fake Cracked Software Steals Login Credentials and Private Files
  • Key Administrator of World’s Most Popular Dark Web Cybercrime Platform Arrested
  • New ZuRu Malware Variant Weaponizes Termius SSH Client to Attack macOS Users

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News