Thursday, March 6, 2025
HomeCyber Security NewsTor Browser 13.5.3 Released, What's New?

Tor Browser 13.5.3 Released, What’s New?

Published on

SIEM as a Service

Follow Us on Google News

The Tor Project has unveiled Tor Browser 13.5.3, a significant update that brings crucial security enhancements and usability improvements. This latest version is now available for download from the official Tor Browser website and distribution directory.

Important security updates to Firefox, the browser’s underlying engine, are at the forefront of this release. Tor Browser 13.5.3 is now based on Firefox 115.15.0esr, incorporating backported security fixes from Firefox 130. This update addresses several critical vulnerabilities, including:

Are You From SOC/DFIR Teams? - Try Advanced Malware and Phishing Analysis With ANY.RUN - 14 day free trial

  • Prevention of CSS-based scriptless interaction tracking
  • Ensuring the lazy loading attribute is ignored on script-disabled documents

The enhancements greatly enhance user privacy and security, upholding Tor’s strong reputation for providing robust online anonymity.

Platform-Specific Improvements

Desktop (Windows, macOS, Linux)

  • Resolution of console errors related to non-existing preferences
  • Improved accessibility of the offline state in about:torconnect
  • Enhanced Downloads button warning announcement for Orca screen reader users
  • Redesigned bridge cards with improved sharing features

Linux

  • More specific file filtering for copy/paste and drag/drop operations.

Android

  • Updated GeckoView to version 115.15.0esr for better performance and stability.

Additional Updates

  • NoScript extension updated to version 11.4.35.
  • Upgrade of lyrebird to version 0.3.0.
  • Build system updated to Go version 1.21.13.

The Tor Project recommends that users upgrade to the new release. With its focus on security, privacy, and user experience, Tor Browser 13.5.3 represents a significant step forward in developing this essential privacy tool.

What Does MITRE ATT&CK Expose About Your Enterprise Security? - Watch Free Webinar!

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Implementing Identity First Security for Zero Trust Architectures

Zero Trust is a security framework that operates under the assumption that no implicit...

InvokeADCheck – New Powershell Module for Active Directory Assessment

Orange Cyberdefense has announced the development of InvokeADCheck, a new PowerShell module designed to...

Detecting Malicious Activities With Traffic Distribution Systems

Traffic Distribution Systems (TDS) have emerged as critical tools for both legitimate and malicious...

Hackers Deploy Advanced Social Engineering Tactics in Phishing Attacks

Cybercriminals are evolving their phishing methods, employing more sophisticated social engineering tactics to deceive...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Implementing Identity First Security for Zero Trust Architectures

Zero Trust is a security framework that operates under the assumption that no implicit...

InvokeADCheck – New Powershell Module for Active Directory Assessment

Orange Cyberdefense has announced the development of InvokeADCheck, a new PowerShell module designed to...

Detecting Malicious Activities With Traffic Distribution Systems

Traffic Distribution Systems (TDS) have emerged as critical tools for both legitimate and malicious...