Thursday, April 3, 2025
HomeCyber Security NewsTor Browser 14.0.8 Emergency Release for Windows Users

Tor Browser 14.0.8 Emergency Release for Windows Users

Published on

SIEM as a Service

Follow Us on Google News

The Tor Project has swiftly released an emergency update for the Tor Browser, 14.0.8, which is exclusively available for Windows users and can be downloaded directly from the Tor Browser download page and the Tor distribution directory.

This urgent update incorporates critical security fixes derived from Mozilla Firefox, ensuring the safety and privacy of users worldwide.

Urgent Security Updates

Tor Browser 14.0.8 addresses critical vulnerabilities in Firefox for Windows, which have been resolved in the recent Firefox 128.8.1esr release.

These updates are crucial for maintaining the integrity of user data and preventing exploitation by malicious actors.

Given the urgency of these fixes, the Tor Project strongly advises all Windows users to update their browser as soon as possible to safeguard their online activities.

Key Changes

The latest update includes several key adjustments:

  • Windows Bug Fixes: The release includes backports of security fixes from Firefox, addressing issues like tor-browser#43592, which patches vulnerabilities found in recent Firefox versions.
  • Improved User Experience: It implements the User Survey UX (Desktop) as part of tor-browser#43553, enhancing user interaction and feedback mechanisms.
  • Build System Updates: The update modifies the build process by removing legacy locale iteration and support for outdated migration tools in update responses. It also adds Claire Hurst to the list of recognized Firefox signers.
  • Third-Party Component Updates: This version updates Snowflake to version 2.11.0 and Lyrebird to 0.6.0, ensuring that these components are in line with the latest security standards.
  • OpenSSL Changes: OpenSSL hash files have been updated to reflect a format change, maintaining compatibility with evolving cryptographic standards.

As with all Tor Browser releases, the Tor Project invites users to report any bugs or suggest improvements.

Feedback can be submitted through the project’s official channels, allowing developers to enhance future releases with user-driven insights.

The swift release of Tor Browser 14.0.8 highlights the importance of continuous security updates in the digital landscape.

As users rely increasingly on secure browsing solutions, timely updates like this ensure that privacy remains paramount.

By updating to this version, Windows users can continue to surf the web with confidence in their security and privacy.

The Tor Project’s commitment to delivering security-focused releases underscores its role as a leading advocate for digital privacy worldwide.

Are you from SOC/DFIR Teams? – Analyse Malware, Phishing Incidents & get live Access with ANY.RUN -> Start Now for Free. 

Divya
Divya
Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Latest articles

Multiple Jenkins Plugin Vulnerabilities Expose Sensitive Information to Attackers

Jenkins, the widely used open-source automation server, faces heightened security risks after researchers disclosed 11...

Hackers Selling SnowDog RAT Malware With Remote Control Capabilities Online

A sophisticated remote access trojan (RAT) dubbed SnowDog has surfaced on underground cybercrime forums, prompting alarms...

Authorities Shut Down Kidflix Child Abuse Platform in Major Takedown

In one of the most significant operations against child sexual exploitation in recent history,...

Massive GitHub Leak: 39M API Keys & Credentials Exposed – How to Strengthen Security

Over 39 million API keys, credentials, and other sensitive secrets were exposed on GitHub...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Multiple Jenkins Plugin Vulnerabilities Expose Sensitive Information to Attackers

Jenkins, the widely used open-source automation server, faces heightened security risks after researchers disclosed 11...

Hackers Selling SnowDog RAT Malware With Remote Control Capabilities Online

A sophisticated remote access trojan (RAT) dubbed SnowDog has surfaced on underground cybercrime forums, prompting alarms...

Authorities Shut Down Kidflix Child Abuse Platform in Major Takedown

In one of the most significant operations against child sexual exploitation in recent history,...