For new developers, it generally takes a few months to become trusted. Eventually, we strive for all developers with compliant extensions to reach this status upon meeting our developer program policies.
Can confirm what @Nutter is experiencing. When I open the Chrome extension, go to Settings > Log out, and manually log out of the extension, I can get back in by just inputting my master password. I am not re-prompted for 2FA.
Recently we noticed that the Hubspot Sales gmail plugin for Chrome is causing the browser to become really slow and laggy, especially while working with Gmail. It gets so bad that sometimes it takes several seconds just to display the emails each time I scroll down within Gmail. I'm running on a 2019 HP Spectre 360 i7, SSD drive with 16GB of ram. It's a powerful computer so it's not a hardware thing. The second we disable the chrome plugin, everything instantly goes back to fast and snappy. The only other plugin we have Nimbus (screenshots) and Boomerang (Gmail plugin). Everything works fine with those plugins and everything worked fine before. Not sure if some recent Hubspot Sales plugin update and/or Chrome update broke things but it's unbearable.
We have a great troubleshooting guide for the extension that resolves a good majority or any problems or slowness that may be occurring that I would recommend having your team checking the steps here.
I would like to apologize for the frustrations, data issues, and business impact this has caused. Could you provide us more information on what is happening? The more information, screenshots, and details you can provide, the better I can advise on the next steps.
Latest Extension version (2.9.0.14348 released Dec 5th) resolved the issue for me. If you are still experiencing the issue check you are on the latest version by going here: chrome://extensions/ clicking details on the extension an verifying the version. If you are on an older version go to the Chrome Web Store and update or just uninstall and reinstall the extension.
For what it's worth I am using latest version of Chrome and latest version of Windows 11 on a HP Spectre x360 (2022). No one else in my office has reported the issue and they are on a variety of other manufactures laptops.
I am still monitoring, my memory usage is higher than Gmail instances without the extension. With the previous version of the extension I was getting runaway memory leaks where memory usage would climb infinitely until I ran out of memory and the tab crashed. Now it seems to start at 300 MBs vasiliate as high as 500 MBs without affecting system performance.
Same for us, using nearly all of my CPU resources (and I have a fairly "loaded" computer). Updated to latest Mac OS, restarted computer and chrome, still an issue. --- Something is wrong with the chrome extension for sure. Please let us know when it's fixed.
We deployed another change at 3:17 PM ET that we think will resolve this issue. Please refresh your Gmail page and try again. If the issue persists even after relaunching Chrome and Gmail let us know.
Following up here to see if there are plans to take a closer look into this? I had a meeting with our sales team just now and I am not the only person on our team that is experiencing this issue. One of our team members had their computer crash as it was just too overloaded but the rest of us are mainly experiencing a very laggy chrome browser where we cant even work.
We recommend to please refresh Gmail to get our latest updates; relaunching Google Chrome may also help. If you are still experiencing issues, please file a ticket and record a log from the background page. This will help our team to investigate more about it.
The North Korea-linked threat actor known as Kimsuky has been linked to the use of a new malicious Google Chrome extension that's designed to steal sensitive information as part of an ongoing intelligence collection effort.
Zscaler ThreatLabz, which observed the activity in early March 2024, has codenamed the extension TRANSLATEXT, highlighting its ability to gather email addresses, usernames, passwords, cookies, and browser screenshots.
A sister group of the Lazarus cluster and part of the Reconnaissance General Bureau (RGB), it's also tracked under the names APT43, ARCHIPELAGO, Black Banshee, Emerald Sleet, Springtail, and Velvet Chollima.
In recent weeks, the group has weaponized a known security flaw in Microsoft Office (CVE-2017-11882) to distribute a keylogger and has used job-themed lures in attacks aimed at aerospace and defense sectors with an aim to drop an espionage tool with data gathering and secondary payload execution functionalities.
"The backdoor, which does not appear to have been publicly documented before, allows the attacker to perform basic reconnaissance and drop additional payloads to take over or remotely control the machine," cybersecurity company CyberArmor said. It has given the campaign the name Niki.
The exact mode of initial access associated with the newly discovered activity is currently unclear, although the group is known to leverage spear-phishing and social engineering attacks to activate the infection chain.
Launching the executable results in the retrieval of a PowerShell script from an attacker-controlled server, which, in turn, exports information about the compromised victim to a GitHub repository and downloads additional PowerShell code by means of a Windows shortcut (LNK) file.
Zscaler said it found the GitHub account, created on February 13, 2024, briefly hosting the TRANSLATEXT extension under the name "GoogleTranslate.crx," although its delivery method is presently unknown.
"These files were present in the repository on March 7, 2024, and deleted the next day, implying that Kimsuky intended to minimize exposure and use the malware for a short period to target specific individuals," security researcher Seongsu Park said.
TRANSLATEXT, which masquerades as Google Translate, incorporates JavaScript code to bypass security measures for services like Google, Kakao, and Naver; siphon email addresses, credentials, and cookies; capture browser screenshots; and exfiltrate stolen data.
Installed the Password Manager extension on each browser. On Chrome and FFox, the extension icon is red and when I click on it I get the popup "Install the application" with a Download and Install button, but I already have the application installed. On Edge, the icon is green but when I click it I get only "Password Generator" and never the option to select the entry for the current website - like I previously had.
The Kaspersky Password Manager extension icon is grey, and when I click it I am prompted to enter in my main vault password. When I do this, I get a message "Incorrect main password" but my password is definitely being entered in correctly. I validated this by accessing the vault via my desktop shortcut.
Ciao Igor anch'io stesso problema con password manager su Windows 11 non mi si apre pi e anche sui browser mi dice password errata e l'icona e grigia cosa devo fare per fare funzionare il programma io o Kaspersky internet security ed compreso su tre dispositivi solo che su Windows 10 e sullo smartphone funziona sul Windows 11 e bloccato non si avvia grazie buona serata
Hi,
My Chrome extension was greyed out, despite me being logged into the PC app. I tried this solution, and it has now completely screwed up both - the PC app closes immediately and doesn't stay logged in, and the Chrome extension doesn't stay logged in, either.
Chrome is restricting third-party cookies by default for 1% of users to facilitate testing, and then ramping up to 100% of users starting in early 2025. The ramp up to 100% of users is subject to addressing any remaining competition concerns of the UK's Competition and Markets Authority.
Your goal as a developer is to minimize disruptions to your users due to these changes. This requires understanding the Privacy Sandbox and taking advantage of tooling and guidance to audit the core user journeys (CUJs) on your site. Such tooling encompasses three main components:
Privacy Sandbox Analysis Tool (PSAT), a Chrome DevTools extension with specialized capabilities to help developers deal with the deprecation of third-party cookies and adoption of alternative APIs.
In this post you'll learn about the Privacy Sandbox Analysis Tool (PSAT), a Chrome DevTools extension complementing DevTools with specialized capabilities for analyzing and debugging scenarios related to the deprecation of third-party cookies and adoption of new privacy-preserving alternatives.
When you navigate to a web page, PSAT gathers information about the cookie activities triggered by resource loading, and interactions with components on the page. Click the extension icon to trigger a popup showing baseline information about the number and type of cookies related to the loaded URL.
In the top left corner, Chrome displays the message "PSAT started debugging this browser", which indicates that PSAT is using the Chrome DevTools Protocol (CDP) to analyze and debug third-party cookie usage. In an upcoming version of PSAT, developers will have the ability to turn CDP on and off, and use it only during debugging sessions. To learn more about PSAT permission requirements, check the PSAT Debugging wiki page.
And on the right is the landing page for the Privacy Sandbox DevTools panel, which provides further access to information and insights. It embeds the privacysandbox.com home page, and provides links to enable you to report bugs and breakages, and to join discussion and support forums. You can also subscribe to the latest Privacy Sandbox news from the Privacy Sandbox RSS feed.
This page provides information and insights regarding the behavior of cookies on web pages, including the number of observed cookies by scope (total, first-party, third-party), classification of observed known cookies, cookie blocking reasons, and other information.
Opening the Cookies section takes you to PSAT's Cookies table, which is similar to the Cookies table in the DevTools Application tab, with some additional capabilities including filtering, blocked cookies highlighting, and frame overlays.
59fb9ae87f