Thursday, March 28, 2024

Chrome 63 comes with more Stability, Security Enhancements, and Site Isolation

Chrome announced version 63 with more security enhancement especially for enterprise users and the update will be available for Windows, Mac, and Linux within a couple of weeks.

Starting with site isolation which allows each website to have a dedicated process isolated from other sites.You can enable it for all sites are to a specific site.

With new version chrome allows to Whitelist or Blacklist specific extensions, it will enable ITadmins to create a sperate policy and enable extensions based on the requirements.

Chrome 63

Recently a phishing campaign targets Victims Via Chrome Extensions and infects users by opening an email with alleged photos.

Enabled support for TLS 1.3, it is not a minor redesign, it is a significant redesign of TLS 1.2. In fact, one of the most contentious issues was if the name should be something else to indicate how much of an improvement TLS 1.3 is.

TLS 1.3 is designed for speed, specifically by reducing the number of network round-trips required before data can be sent to one round-trip (1-RTT) or even zero round-trips (0-RTT) for repeat connections.

The improvements in TLS 1.3 make it faster and more secure, and we’ll be expanding TLS 1.3 support to the broader web in 2018.

They included NTLMv2 authentication protocol, including Extended Protection for Authentication (EPA) on Mac, Android, Linux and Chrome OS, from Chrome 65, NTLMv2 will become the default NTLM protocol as it already is on Windows.

With the new version dated Chrome 68 in July 2018, chrome is to block code injection by third-party software. You can check chrome://conflicts to see if any installed softwares are injecting into chrome.

Soon chrome to block Tab-Under Behavior which allows website owners and advertisers have abused users by tab-under to show ads and redirect users to unwanted sites.

Starting January 2018 Chrome to block the most irritating and bandwidth consuming autoplay videos, it allows users to block audio for a website entirely, and it will persist among perusing sessions, permitting users to modify when and where the sound will play.

Chrome 63 includes updates for 37 security fixes, for more details on security fixes.

Website

Latest articles

Wireshark 4.2.4 Released: What’s New!

Wireshark stands as the undisputed leader, offering unparalleled tools for troubleshooting, analysis, development, and...

Zoom Unveils AI-Powered All-In-One AI Work Workplace

Zoom has taken a monumental leap forward by introducing Zoom Workplace, an all-encompassing AI-powered...

iPhone Users Beware! Darcula Phishing Service Attacking Via iMessage

Phishing allows hackers to exploit human vulnerabilities and trick users into revealing sensitive information...

2 Chrome Zero-Days Exploited at Pwn2Own 2024: Patch Now

Google has announced a crucial update to its Chrome browser, addressing several vulnerabilities, including...

The Moon Malware Hacked 6,000 ASUS Routers in 72hours to Use for Proxy

Black Lotus Labs discovered a multi-year campaign by TheMoon malware targeting vulnerable routers and...

Hackers Actively Exploiting Ray AI Framework Flaw to Hack Thousands of Servers

A critical vulnerability in Ray, an open-source AI framework that is widely utilized across...

Chinese Hackers Attacking Southeast Asian Nations With Malware Packages

Cybersecurity researchers at Unit 42 have uncovered a sophisticated cyberespionage campaign orchestrated by two...
Guru baran
Guru baranhttps://gbhackers.com
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Mitigating Vulnerability Types & 0-day Threats

Mitigating Vulnerability & 0-day Threats

Alert Fatigue that helps no one as security teams need to triage 100s of vulnerabilities.

  • The problem of vulnerability fatigue today
  • Difference between CVSS-specific vulnerability vs risk-based vulnerability
  • Evaluating vulnerabilities based on the business impact/risk
  • Automation to reduce alert fatigue and enhance security posture significantly

Related Articles