Categories: Cyber Security News

Tor Browser 13.5.3 Released, What’s New?

The Tor Project has unveiled Tor Browser 13.5.3, a significant update that brings crucial security enhancements and usability improvements. This latest version is now available for download from the official Tor Browser website and distribution directory.

Important security updates to Firefox, the browser’s underlying engine, are at the forefront of this release. Tor Browser 13.5.3 is now based on Firefox 115.15.0esr, incorporating backported security fixes from Firefox 130. This update addresses several critical vulnerabilities, including:

Are You From SOC/DFIR Teams? - Try Advanced Malware and Phishing Analysis With ANY.RUN - 14 day free trial

  • Prevention of CSS-based scriptless interaction tracking
  • Ensuring the lazy loading attribute is ignored on script-disabled documents

The enhancements greatly enhance user privacy and security, upholding Tor’s strong reputation for providing robust online anonymity.

Platform-Specific Improvements

Desktop (Windows, macOS, Linux)

  • Resolution of console errors related to non-existing preferences
  • Improved accessibility of the offline state in about:torconnect
  • Enhanced Downloads button warning announcement for Orca screen reader users
  • Redesigned bridge cards with improved sharing features

Linux

  • More specific file filtering for copy/paste and drag/drop operations.

Android

  • Updated GeckoView to version 115.15.0esr for better performance and stability.

Additional Updates

  • NoScript extension updated to version 11.4.35.
  • Upgrade of lyrebird to version 0.3.0.
  • Build system updated to Go version 1.21.13.

The Tor Project recommends that users upgrade to the new release. With its focus on security, privacy, and user experience, Tor Browser 13.5.3 represents a significant step forward in developing this essential privacy tool.

What Does MITRE ATT&CK Expose About Your Enterprise Security? - Watch Free Webinar!

Gurubaran

Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Recent Posts

Hackers Exploit Legitimate Microsoft Utility to Deliver Malicious DLL Payload

Hackers are now exploiting a legitimate Microsoft utility, mavinject.exe, to inject malicious DLLs into unsuspecting…

1 hour ago

Cybercriminals Exploit Network Edge Devices to Infiltrate SMBs

Small and midsized businesses (SMBs) continue to be prime targets for cybercriminals, with network edge…

1 hour ago

Criminal IP to Showcase Advanced Threat Intelligence at RSAC™ 2025

Joining Criminal IP at Booth S-634 | South Expo, Moscone Center | April 28 –…

2 hours ago

TP-Link Router Vulnerabilities Allow Attackers to Execute Malicious SQL Commands

Cybersecurity researchers have uncovered critical SQL injection vulnerabilities in four TP-Link router models, enabling attackers…

2 hours ago

Faster Vulnerability Patching Reduces Risk and Lowers Cyber Risk Index

Trend Micro's Cyber Risk Exposure Management (CREM) solution has highlighted the critical role that timely…

3 hours ago

Malicious npm Packages Target Linux Developers with SSH Backdoor Attacks

In a sophisticated onslaught targeting the open-source ecosystem, reports have emerged detailing several malicious npm…

3 hours ago