Saturday, February 22, 2025
HomeChromeGoogle Released Chrome 75 for Windows, Mac, Linux and Android with Several...

Google Released Chrome 75 for Windows, Mac, Linux and Android with Several Security Fixes

Published on

SIEM as a Service

Follow Us on Google News

Google released Chrome 75 for Android and Stable Channel Update for Windows, Mac and Linux with the fixes of 42 security vulnerabilities that affected the old version of chrome.

In this Chrome 75 for Android, Google improved stability and performance along with Chrome’s built-in password manager to generate a strong and unique password.

Google added several new following features in Chrome 75.0.3770.80 along with security fixes, including two high severity vulnerability.

  1. There’s a new way to reduce latency on canvaselements.
  2. Web apps can now share files to other installed apps using the system level share sheet.
  3. Numeric literals now allow underscores as separators to make them more readable.
  4. Google I/O 2019 is a wrap and all of talks are on our YouTube channel

In Chrome 75, the Web Share API now allows you to plug in the systems share service that provided by the Android OS making us easy to share the file of files including audio files, images, videos, and text documents with other installed apps on the user’s device, watch the below video.

Developers can check out here about all the new features that have been added in this chrome 75 release.

Google already started rolling out, and the update reaches over the coming days/weeks for all desktop platforms Windows, Mac, Linux, and the Android Mobile platform.

Chrome 75 for Android become available on Google Play over the next few weeks and the desktop users now check for the update by going to Settings -> Help -> About Google Chrome in browser and check the auto update.

Out of 42 security vulnerabilities, Two (CVE-2019-5828 and CVE-2019-5829) marked as high severity vulnerabilities which was reported by Lucas Pinheiro, Microsoft Browser Vulnerability Research and Andrew Krasichkov, Yandex Security Team.

“Chrome 75.0.3770.80 contains a number of fixes and improvements — a list of changes is available in the log. Watch out for upcoming  Chrome and  Chromium blog posts about new features and big efforts delivered in 75.” Google said.

The patches can be deployed through Patch Manager plus, where you can pre-built, tested, ready-to-deploy packages for your Enterprise network.

You can follow us on Linkedin, Twitter, Facebook for daily Cybersecurity updates also you can take the Best Cybersecurity courses online to keep yourself updated.

Also Read: Unpatched Code Execution Zero-day Vulnerability Founds in Notepad – Google Security Researcher

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

SPAWNCHIMERA Malware Exploits Ivanti Buffer Overflow Vulnerability by Applying a Critical Fix

In a recent development, the SPAWNCHIMERA malware family has been identified exploiting the buffer...

Sitevision Auto-Generated Password Vulnerability Lets Hackers Steal Signing Key

A significant vulnerability in Sitevision CMS, versions 10.3.1 and earlier, has been identified, allowing...

NSA Allegedly Hacked Northwestern Polytechnical University, China Claims

Chinese cybersecurity entities have accused the U.S. National Security Agency (NSA) of orchestrating a...

ACRStealer Malware Abuses Google Docs as C2 to Steal Login Credentials

The ACRStealer malware, an infostealer disguised as illegal software such as cracks and keygens,...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

ACRStealer Malware Abuses Google Docs as C2 to Steal Login Credentials

The ACRStealer malware, an infostealer disguised as illegal software such as cracks and keygens,...

Fake Chrome Update Delivers DriverEasy Malware by Abusing Dropbox

A recent investigation has uncovered a malicious application, DriverEasy, masquerading as a legitimate Google...

Chrome Buffer Overflow Flaws Let Hackers Execute Arbitrary Code & Gain System Access

Google has rolled out an urgent security update for its Chrome browser, patching three...