Wednesday, May 14, 2025
HomeSecurity NewsChrome 66 Released with Number of Security Fixes and Starts Distrust Symantec...

Chrome 66 Released with Number of Security Fixes and Starts Distrust Symantec SSL/TLS Certificates

Published on

SIEM as a Service

Follow Us on Google News

Google announced Chrome 66 to the stable channel for Windows, Mac, Linux, and users started upgrading to the new a version of Chrome 66.0.3359.117 that comes with a number of security fix and improvements.

Chrome 66 Targets Security 

With Chrome 66 site isolation turned on for a small percentage of users to prepare for a broader upcoming launch.

Strict site isolation which allows each website to have a dedicated process isolated from other sites, it was introduced in version 63 but not enabled by default.

Open Chrome.
In the address bar at the top, enter chrome://flags/#enable-site-per-process and press Enter.
Next to “Strict site isolation,” click Enable.
If you don’t see “Strict site isolation,” update Chrome.
Click Relaunch now.
- Advertisement - Google News
Chrome 66

The massive change is with the certificate that was issued by Symantec before June 1, 2016, those will stop function with Chrome 66 and from Chrome 70 all remaining Symantec SSL/TLS certificates will stop working. Chrome 70 set to be released on Aug 30th, 2018.

Chrome 66

The release includes the fix for 62 security bugs that reported by the security researchers and Google says “bug details and links may be kept restricted until a majority of users are updated with a fix”.

You can find the complete list of changelog here and here for Security Fixes. It includes a number of fixes such as SmartScreen bypass in the download, URL spoof in Navigation, Fullscreen UI spoof and Confusing autofill settings.

From Chrome 66 it begins alerting users if any third party software tries to inject any code in Chrome and asks users to remove the software.

Starting from Chrome 68 which set to release by July 2018 it begins to block the third-party software from injecting into chrome and starting from Chrome 72 this option will be removed and it always block code injection.

Also, they announced safe browsing by default in the WebView starting this April 2018 from the WebView version 66. This means Android app developers using WebView not required to make any protection.

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Weaponized PyPI Package Targets Developers to Steal Source Code

Security researchers at RL have discovered a malicious Python package called "solana-token" on PyPI...

Microsoft Alerts on AD CS Flaw Enabling Remote Denial-of-Service Attacks

Microsoft has issued a security advisory for a newly identified vulnerability in Active Directory...

Chinese Hackers Exploit SAP NetWeaver Zero-Day Vulnerability to Target Critical Infrastructure

EclecticIQ analysts have uncovered a sophisticated cyber-espionage campaign orchestrated by China-nexus nation-state Advanced Persistent...

Researchers Unveil New Threat-Hunting Techniques to Detect Azure Managed Identity Abuse

A group of cybersecurity specialists from Hunters, working under the prestigious Team Axon, have...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Phishing Campaign Uses Blob URLs to Bypass Email Security and Avoid Detection

Cybersecurity researchers at Cofense Intelligence have identified a sophisticated phishing tactic leveraging Blob URIs...

UK Government to Shift Away from Passwords in New Security Move

UK government has unveiled plans to implement passkey technology across its digital services later...

New Spam Campaign Leverages Remote Monitoring Tools to Exploit Organizations

A sophisticated spam campaign targeting Portuguese-speaking users in Brazil has been uncovered by Cisco...