Thursday, November 30, 2023

Google Released Chrome 75 for Windows, Mac, Linux and Android with Several Security Fixes

Google released Chrome 75 for Android and Stable Channel Update for Windows, Mac and Linux with the fixes of 42 security vulnerabilities that affected the old version of chrome.

In this Chrome 75 for Android, Google improved stability and performance along with Chrome’s built-in password manager to generate a strong and unique password.

Google added several new following features in Chrome 75.0.3770.80 along with security fixes, including two high severity vulnerability.

  1. There’s a new way to reduce latency on canvaselements.
  2. Web apps can now share files to other installed apps using the system level share sheet.
  3. Numeric literals now allow underscores as separators to make them more readable.
  4. Google I/O 2019 is a wrap and all of talks are on our YouTube channel

In Chrome 75, the Web Share API now allows you to plug in the systems share service that provided by the Android OS making us easy to share the file of files including audio files, images, videos, and text documents with other installed apps on the user’s device, watch the below video.

Developers can check out here about all the new features that have been added in this chrome 75 release.

Google already started rolling out, and the update reaches over the coming days/weeks for all desktop platforms Windows, Mac, Linux, and the Android Mobile platform.

Chrome 75 for Android become available on Google Play over the next few weeks and the desktop users now check for the update by going to Settings -> Help -> About Google Chrome in browser and check the auto update.

Out of 42 security vulnerabilities, Two (CVE-2019-5828 and CVE-2019-5829) marked as high severity vulnerabilities which was reported by Lucas Pinheiro, Microsoft Browser Vulnerability Research and Andrew Krasichkov, Yandex Security Team.

“Chrome 75.0.3770.80 contains a number of fixes and improvements — a list of changes is available in the log. Watch out for upcoming  Chrome and  Chromium blog posts about new features and big efforts delivered in 75.” Google said.

The patches can be deployed through Patch Manager plus, where you can pre-built, tested, ready-to-deploy packages for your Enterprise network.

You can follow us on Linkedin, Twitter, Facebook for daily Cybersecurity updates also you can take the Best Cybersecurity courses online to keep yourself updated.

Also Read: Unpatched Code Execution Zero-day Vulnerability Founds in Notepad – Google Security Researcher

Website

Latest articles

Hackers Using Weaponized Invoice to Deliver LUMMA Malware

Hackers use weaponized invoices to exploit trust in financial transactions, embedding malware or malicious...

US-Seized Crypto Currency Mixer Used by North Korean Lazarus Hackers

The U.S. Treasury Department sanctioned the famous cryptocurrency mixer Sinbad after it was claimed...

CISA Warns Hackers Exploiting Wastewater Systems Logic Controllers

In a disconcerting turn of events, cyber threat actors have set their sights on...

Zyxel Command Injection Flaws Let Attackers Run OS Commands

Three Command injection vulnerabilities have been discovered in Zyxel NAS (Network Attached Storage) products,...

North Korean Hackers Attacking macOS Using Weaponized Documents

Hackers often use weaponized documents to exploit vulnerabilities in software, which enables the execution...

Most Popular Websites Still Allow Users To Have Weak Passwords

The latest analysis shows that tens of millions of people are creating weak passwords...

Chrome Zero-Day Vulnerability That Exploited In The Wild

Google has fixed the sixth Chrome zero-day bug that was exploited in the wild this...
Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

API Attack Simulation Webinar

Live API Attack Simulation

In the upcoming webinar, Karthik Krishnamoorthy, CTO and Vivek Gopalan, VP of Products at Indusface demonstrate how APIs could be hacked.The session will cover:an exploit of OWASP API Top 10 vulnerability, a brute force account take-over (ATO) attack on API, a DDoS attack on an API, how a WAAP could bolster security over an API gateway

Related Articles