Thursday, May 22, 2025
HomeCyber Security NewsTor Browser 13.5.3 Released, What's New?

Tor Browser 13.5.3 Released, What’s New?

Published on

SIEM as a Service

Follow Us on Google News

The Tor Project has unveiled Tor Browser 13.5.3, a significant update that brings crucial security enhancements and usability improvements. This latest version is now available for download from the official Tor Browser website and distribution directory.

Important security updates to Firefox, the browser’s underlying engine, are at the forefront of this release. Tor Browser 13.5.3 is now based on Firefox 115.15.0esr, incorporating backported security fixes from Firefox 130. This update addresses several critical vulnerabilities, including:

Are You From SOC/DFIR Teams? - Try Advanced Malware and Phishing Analysis With ANY.RUN - 14 day free trial

- Advertisement - Google News
  • Prevention of CSS-based scriptless interaction tracking
  • Ensuring the lazy loading attribute is ignored on script-disabled documents

The enhancements greatly enhance user privacy and security, upholding Tor’s strong reputation for providing robust online anonymity.

Platform-Specific Improvements

Desktop (Windows, macOS, Linux)

  • Resolution of console errors related to non-existing preferences
  • Improved accessibility of the offline state in about:torconnect
  • Enhanced Downloads button warning announcement for Orca screen reader users
  • Redesigned bridge cards with improved sharing features

Linux

  • More specific file filtering for copy/paste and drag/drop operations.

Android

  • Updated GeckoView to version 115.15.0esr for better performance and stability.

Additional Updates

  • NoScript extension updated to version 11.4.35.
  • Upgrade of lyrebird to version 0.3.0.
  • Build system updated to Go version 1.21.13.

The Tor Project recommends that users upgrade to the new release. With its focus on security, privacy, and user experience, Tor Browser 13.5.3 represents a significant step forward in developing this essential privacy tool.

What Does MITRE ATT&CK Expose About Your Enterprise Security? - Watch Free Webinar!

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Hackers Target Mobile Users Using PWA JavaScript to Bypass Browser Security

A sophisticated new injection campaign has been uncovered, targeting mobile users through malicious third-party...

Docker Zombie Malware Infects Containers for Crypto Mining and Self-Replication

A novel malware campaign targeting containerized infrastructures has emerged, exploiting insecurely exposed Docker APIs...

Hackers Masquerade as Organizations to Steal Payroll Logins and Redirect Payments from Employees

ReliaQuest, hackers have deployed a cunning search engine optimization (SEO) poisoning scheme to orchestrate...

PupkinStealer Exploits Web Browser Passwords and App Tokens to Exfiltrate Data Through Telegram

A newly identified .NET-based information-stealing malware, dubbed PupkinStealer (also known as PumpkinStealer in some...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Hackers Target Mobile Users Using PWA JavaScript to Bypass Browser Security

A sophisticated new injection campaign has been uncovered, targeting mobile users through malicious third-party...

Docker Zombie Malware Infects Containers for Crypto Mining and Self-Replication

A novel malware campaign targeting containerized infrastructures has emerged, exploiting insecurely exposed Docker APIs...

Hackers Masquerade as Organizations to Steal Payroll Logins and Redirect Payments from Employees

ReliaQuest, hackers have deployed a cunning search engine optimization (SEO) poisoning scheme to orchestrate...