Friday, April 26, 2024

Firefox 74 Released – Several Security Fixes & TLS 1.2 Upgraded

Mozilla released Firefox 74 with several improvements and issued security fixes that affected the previous version of Firefox 73.

In this update, Mozilla has improved the login management with the ability to reverse alpha sort (Name Z-A) in Firefox Lockwise, a built-in password manager. access it here.

  1. Click the menu button to open the menu panel.
  2. Click Logins and Passwords.

You can easily import history and bookmarks from the new Microsoft Edge browser on Windows and Mac once you have applied this new update.

 Mozilla disabled TLS 1.0 and TLS 1.1 to improve your website connections. Sites that don’t support TLS version 1.2 will now show an error page.

Firefox 74 has improved with privacy for web voice and video calls through support for mDNS ICE.

Facebook Container that introduced in this Firefox 74 update prevents Facebook from tracking you around the web – Facebook logins, likes, and comments are automatically blocked on non-Facebook sites.

According to the Mozilla update “new changes have been applied in this update when a video is uploaded with a batch of photos on Instagram, the Picture-in-Picture toggle would sit atop of the “next” button. The toggle is now moved allowing you to flip through to the next image of the batch.”

Also CTRL+L now be used to open the Page Info window instead of opening the Bookmarks sidebar.

Firefox Security Updates

Mozilla fixed 12 vulnerabilities that affect Firefox 73, and the security patch has been released in this update.

5 vulnerabilities are marked “High” severity, 6 vulnerabilities are patched as “Moderate” severity, and the one has marked as “Low”.

You can read the Firefox 74 security update notes here.

You can download Firefox 73 from the following links:

Also Read: Firefox Brings DNS over HTTPS by Default for U.S Users: Here’s How to Enable It

Follow us on TwitterLinkedinFacebook for Daily cyber security & hacking news updates.

Website

Latest articles

Hackers Exploit Old Microsoft Office 0-day to Deliver Cobalt Strike

Hackers have leveraged an old Microsoft Office vulnerability, CVE-2017-8570, to deploy the notorious Cobalt...

Microsoft Publicly Releases MS-DOS 4.0 Source Code

In a historic move, Microsoft has made the source code for MS-DOS 4.0, one...

New SSLoad Malware Combined With Tools Hijacking Entire Network Domain

A new attack campaign has been discovered to be employed by the FROZEN#SHADOW, which...

Palo Alto Networks Shares Remediation Advice for Hacked Firewalls

Palo Alto Networks has issued urgent remediation advice after discovering a critical vulnerability, designated...

Analyze Malicious Powershell Scripts by Running Malware in ANY.RUN Sandbox

Hackers exploit PowerShell, a built-in scripting tool on Windows (and sometimes Linux), to launch...

Beware! Zero-click RCE Exploit for iMessage Circulating on Hacker Forums

A new cybersecurity threat has emerged as a zero-click remote code execution (RCE) exploit...

New DragonForce Ransomware Emerged From The Leaked LOCKBIT Builder

Hackers exploit LOCKBIT Builder due to its versatility in creating customized ransomware payloads which...
Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

WAAP/WAF ROI Analysis

Mastering WAAP/WAF ROI Analysis

As the importance of compliance and safeguarding critical websites and APIs grows, Web Application and API Protection (WAAP) solutions play an integral role.
Key takeaways include:

  • Pricing models
  • Cost Estimation
  • ROI Calculation

Related Articles