Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Google to Remove Two Certificate Authorities from Chrome Root Store

Google to Remove Two Certificate Authorities from Chrome Root Store

Posted on June 4, 2025June 5, 2025 By CWS

Google has introduced plans to take away two Certificates Authorities (CAs) from Chrome’s Root Retailer attributable to ongoing safety considerations. 

The Chrome Root Program and Safety Group revealed that Chunghwa Telecom and Netlock will now not be trusted by default in Chrome 139 and better for certificates issued after July 31, 2025. 

This determination comes after what Google describes as “patterns of regarding habits” which have eroded their confidence in these CA house owners as publicly trusted certificates issuers.

Ongoing Compliance Failures 

Based on the Google Report, each Chunghwa Telecom and Netlock have demonstrated compliance failures and unmet enchancment commitments over a number of months and years. 

The Chrome workforce particularly cited “a sample of compliance failures, unmet enchancment commitments, and the absence of tangible, measurable progress in response to publicly disclosed incident experiences” as causes for the elimination. 

The Chrome Root Program Coverage states that CA certificates included within the Chrome Root Retailer should present worth that exceeds the chance of their continued inclusion. Google has decided that these CAs now not meet this threshold requirement.

The affected root certificates embrace:

OU=ePKI Root Certification Authority,O=Chunghwa Telecom Co., Ltd.,C=TW.

CN=HiPKI Root CA – G1,O=Chunghwa Telecom Co., Ltd.,C=TW.

CN=NetLock Arany (Class Gold) Főtanúsítvány,OU=Tanúsítványkiadók (Certification Providers),O=NetLock Kft.,L=Budapest,C=HU.

The implementation will make the most of Chrome’s Signed Certificates Timestamp (SCT) characteristic to find out which certificates ought to now not be trusted. 

Transport Layer Safety (TLS) server authentication certificates that validate to the affected root CA certificates, whose earliest SCT is dated after July 31, 2025, will now not be trusted by default in Chrome 139 and better. 

Importantly, certificates issued on or earlier than this cutoff date will proceed to perform usually till their expiration.

This method goals to reduce disruption whereas sustaining safety. Chrome customers or enterprises that explicitly belief these certificates (for instance, by Group Coverage Objects on Home windows) will override the SCT-based constraints, permitting certificates to perform as they do at this time. 

The change will have an effect on Chrome on Home windows, macOS, ChromeOS, Android, and Linux platforms, however not Chrome for iOS attributable to Apple’s insurance policies concerning certificates verification.

Really useful Actions for Web site Admins

Web site operators can decide in the event that they’re affected through the use of the Chrome Certificates Viewer. 

If the “Group (O)” subject below “Issued By” comprises “Chunghwa Telecom,” “行政院,” “NETLOCK Ltd.,” or “NETLOCK Kft.,” motion is required. 

Google recommends that affected web site operators transition to a brand new publicly-trusted CA as quickly as attainable.

Whereas operators may delay the impression by acquiring new certificates from these CAs earlier than August 1, 2025, they’ll ultimately want to change to a different CA included within the Chrome Root Retailer. 

For testing functions, Chrome 128 launched a command-line flag to simulate the impact of an SCTNotAfter mistrust constraint:

Enterprise customers who make the most of affected certificates for inner networks can override these constraints beginning in Chrome 127 by putting in the corresponding root CA certificates as a regionally trusted root on the platform Chrome is operating on, or through the use of enterprise insurance policies.

When customers navigate to web sites serving affected certificates after the cutoff date, they’ll encounter a full-page safety warning interstitial, successfully blocking entry to the positioning.

Because the digital panorama evolves, sustaining consumer belief will rely upon relentless vigilance, speedy response to rising threats, and a unified dedication to upholding the very best requirements of cryptographic integrity.

Stay Credential Theft Assault Unmask & Prompt Protection – Free Webinar

Cyber Security News Tags:Authorities, Certificate, Chrome, Google, Remove, Root, Store

Post navigation

Previous Post: Going Into the Deep End: Social Engineering and the AI Flood
Next Post: Threat Actors Exploit ‘Prove You Are Human’ Scheme To Deliver Malware

Related Posts

Threat Intelligence That Powers Best SOCs Worldwide Is Now Free   Threat Intelligence That Powers Best SOCs Worldwide Is Now Free   Cyber Security News
Apache StreamPark Vulnerability Let Attackers Access Sensitive Data Apache StreamPark Vulnerability Let Attackers Access Sensitive Data Cyber Security News
Tor Browser 15.0.1 Released With Fix for Multiple Security Vulnerabilities Tor Browser 15.0.1 Released With Fix for Multiple Security Vulnerabilities Cyber Security News
Agenda Ransomware Actors Deploying Linux RAT on Windows Systems Targeting VMware Deployments Agenda Ransomware Actors Deploying Linux RAT on Windows Systems Targeting VMware Deployments Cyber Security News
Five Hackers Behind Notorious Data Selling Platform BreachForums Arrested Five Hackers Behind Notorious Data Selling Platform BreachForums Arrested Cyber Security News
Hackers Leverage GitHub Notifications to Mimic as Y Combinator to Steal Funds from Wallets Hackers Leverage GitHub Notifications to Mimic as Y Combinator to Steal Funds from Wallets Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News