Sunday, June 15, 2025
HomeChromeChrome 76 Released - A new Stable version for Android, Windows, Mac,...

Chrome 76 Released – A new Stable version for Android, Windows, Mac, Linux, and iOS Platforms

Published on

SIEM as a Service

Follow Us on Google News

Google finally released chrome 76, a stable channel that adds media query, bringing a dark mode to websites and several major improvements including the fix for Incognito mode loophole.

Incognito Mode loophole that resides in FileSystem API allowed sites to detect people’s browsing activities, as Google Chrome promised on last week that they will fix in Chome 76, now it’s fixed.

Hereafter websites will no longer be able to force readers to sign up for a subscription after viewing a fixed number of free articles.

- Advertisement - Google News

Chrome adds PWA Omnibox Install Button which helps users to install Progressive Web Apps on the desktop, by adding an install button to the address bar.

Now Adobe Flash is now turned off by default, but you can manually enable to feature by going to chrome://settings/content/flash

Dark mode feature has been improved and the prefers-color-scheme media query, allows you to adjust the look and feel of your site to match the user’s preferred mode.

According to Google release notes, Chrome 76 contains a number of fixes and improvements — a list of changes is available in the log. Watch out for upcoming Chrome and Chromium blog posts about new features and big efforts delivered in 76.

All the platform desktop users can update to Chrome 76.0.3809.87 by checking here Settings -> Help -> About Google Chrome, you will receive the auto-update.

Android and iOS user can download the new Chrome 76 in the Play Store and App Store.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity updates also you can take the Best Cybersecurity course online to keep yourself updated.

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Kali Linux 2025.2 Released: New Tools, Smartwatch and Car Hacking Added

Kali Linux, the preferred distribution for security professionals, has launched its second major release...

Arsen Launches AI-Powered Vishing Simulation to Help Organizations Combat Voice Phishing at Scale

Arsen, the cybersecurity startup known for defending organizations against social engineering threats, has announced...

NIST Releases New Guide – 19 Strategies for Building Zero Trust Architectures

The National Institute of Standards and Technology (NIST) has released groundbreaking guidance to help...

Spring Framework Flaw Enables Remote File Disclosure via “Content‑Disposition” Header

A medium-severity reflected file download (RFD) vulnerability (CVE-2025-41234) in VMware's Spring Framework has been...

Credential Abuse: 15-Min Attack Simulation

Credential Abuse Unmasked

Credential abuse is #1 attack vector in web and API breaches today (Verizon DBIR 2025). Join our live, 15-min attack simulation with Karthik Krishnamoorthy (CTO - Indusface) and Phani Deepak Akella (VP of Marketing - Indusface) to see hackers move from first probe to full account takeover.

Discussion points


Username & email enumeration – how a stray status-code reveals valid accounts.
Password spraying – low-and-slow guesses that evade basic lockouts.
Credential stuffing – lightning-fast reuse of breach combos at scale.
MFA / session-token bypass – sliding past second factors with stolen cookies.

More like this

Major Outage Hits Google Cloud and Linked Cloudflare Services, Thousands Affected

On June 12, 2025, concurrent infrastructure failures at Cloudflare and Google caused widespread service...

AitM Phishing Attacks on Microsoft 365 and Google Aimed at Stealing Login Credentials

A dramatic escalation in phishing attacks leveraging Adversary-in-the-Middle (AiTM) techniques has swept across organizations...

Google Vulnerability Allowed Hackers to Access User Phone Numbers

A security researcher has disclosed a critical vulnerability in Google's account recovery system that...