Chrome 72 Released with 58 Security fixes, Removes HPKP and Deprecate TLS 1.0 and 1.1

Google released Chrome 72 stable version for Windows, Mac, and Linux. The Chrome 72.0.3626.81 comes with the fix for 58 security bugs and includes a number of improvements.

The release includes some major updates that includes Deprecate of the TLS 1.0 and 1.1 protocols and HTTP-Based Public Key Pinning.

Depreciation of TLS 1.0, TLS 1.1 and HPKP

Starting from Google Chrome 72, the chrome has taken the first step in removing the support for TLS 1.0 and TLS 1.1 protocols. During the depreciation period if any sites using TLS 1.0 and 1.1 shows a warning in browser devtools.

After the depreciation period, in 2020, if any sites using TLS 1.0 and 1.1 will fail to connect with the and the website administrators need to upgraded with TLS 1.2.

HPKP support was removed, it is a security feature that prevents the misissuance of the certificate but the adoption rate is very low.

Chrome to remove the support for rendering resources from FTP servers and instead allows users to download them directly.

Popups during page unload are blocked, “the popup blocker already prohibited this, but now it is prohibited whether or not the popup blocker is enabled.”

Chrome Web Authentication API which adds support for communicating with external devices over BLE, including a UI to guide users in pairing and using their devices for two-factor authentication.

Chrome 72 comes with a fix for 58 security bugs that identified from internal audits, fuzzing and other initiatives such as AddressSanitizer, MemorySanitizer, UndefinedBehaviorSanitizer, Control Flow Integrity, libFuzzer, or AFL.

Firefox 65.0 released few hours before the Chrome update, the Firefox updates fixes several security vulnerabilities along with various new futures including video streaming experience, updated language preference etc.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity updates also you can take the Best Cybersecurity courses online to keep your self-updated.

Gurubaran

Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Recent Posts

Ivanti Fully Patched Connect Secure RCE Vulnerability That Actively Exploited in the Wild

Ivanti has issued an urgent security advisory for CVE-2025-22457, a critical vulnerability impacting Ivanti Connect…

15 hours ago

Beware! Weaponized Job Recruitment Emails Spreading BeaverTail and Tropidoor Malware

A concerning malware campaign was disclosed by the AhnLab Security Intelligence Center (ASEC), revealing how…

19 hours ago

EncryptHub Ransomware Uncovered Through ChatGPT Use and OPSEC Failures

EncryptHub, a rapidly evolving cybercriminal entity, has come under intense scrutiny following revelations of operational…

19 hours ago

PoisonSeed Targets CRM and Bulk Email Providers in New Supply Chain Phishing Attack

A sophisticated phishing campaign, dubbed "PoisonSeed," has been identified targeting customer relationship management (CRM) and…

19 hours ago

Beware! Fake Unpaid Tolls Messages Used in Phishing Attack to Steal Login Credentials

A surge in phishing text messages claiming unpaid tolls has been linked to a massive…

19 hours ago

State Bar of Texas Confirms Data Breach, Begins Notifying Affected Consumers

The State Bar of Texas has confirmed a data breach following the detection of unauthorized…

19 hours ago