Monday, March 31, 2025
HomeCyber Security NewsTor Browser 14.0.8 Emergency Release for Windows Users

Tor Browser 14.0.8 Emergency Release for Windows Users

Published on

SIEM as a Service

Follow Us on Google News

The Tor Project has swiftly released an emergency update for the Tor Browser, 14.0.8, which is exclusively available for Windows users and can be downloaded directly from the Tor Browser download page and the Tor distribution directory.

This urgent update incorporates critical security fixes derived from Mozilla Firefox, ensuring the safety and privacy of users worldwide.

Urgent Security Updates

Tor Browser 14.0.8 addresses critical vulnerabilities in Firefox for Windows, which have been resolved in the recent Firefox 128.8.1esr release.

These updates are crucial for maintaining the integrity of user data and preventing exploitation by malicious actors.

Given the urgency of these fixes, the Tor Project strongly advises all Windows users to update their browser as soon as possible to safeguard their online activities.

Key Changes

The latest update includes several key adjustments:

  • Windows Bug Fixes: The release includes backports of security fixes from Firefox, addressing issues like tor-browser#43592, which patches vulnerabilities found in recent Firefox versions.
  • Improved User Experience: It implements the User Survey UX (Desktop) as part of tor-browser#43553, enhancing user interaction and feedback mechanisms.
  • Build System Updates: The update modifies the build process by removing legacy locale iteration and support for outdated migration tools in update responses. It also adds Claire Hurst to the list of recognized Firefox signers.
  • Third-Party Component Updates: This version updates Snowflake to version 2.11.0 and Lyrebird to 0.6.0, ensuring that these components are in line with the latest security standards.
  • OpenSSL Changes: OpenSSL hash files have been updated to reflect a format change, maintaining compatibility with evolving cryptographic standards.

As with all Tor Browser releases, the Tor Project invites users to report any bugs or suggest improvements.

Feedback can be submitted through the project’s official channels, allowing developers to enhance future releases with user-driven insights.

The swift release of Tor Browser 14.0.8 highlights the importance of continuous security updates in the digital landscape.

As users rely increasingly on secure browsing solutions, timely updates like this ensure that privacy remains paramount.

By updating to this version, Windows users can continue to surf the web with confidence in their security and privacy.

The Tor Project’s commitment to delivering security-focused releases underscores its role as a leading advocate for digital privacy worldwide.

Are you from SOC/DFIR Teams? – Analyse Malware, Phishing Incidents & get live Access with ANY.RUN -> Start Now for Free. 

Divya
Divya
Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Latest articles

Hewlett Packard RCE Vulnerability Allows Attackers to Bypass Authentication and Execute Remote Commands

A critical unauthenticated remote code execution (RCE) vulnerability in HPE Insight Cluster Management Utility...

Windows 11 Insider Released – Microsoft Removes BypassNRO.cmd Script to Enhance Security

Microsoft has launched Windows 11 Insider Preview Build 26200.5516 to the Dev Channel with exciting new...

A New Microsoft Tool Automatically Detects, Diagnoses, and Resolves Boot Issues in Windows

Microsoft has unveiled a transformational tool aimed at addressing one of the most frustrating...

Beware! A Fake Zoom Installer Drops BlackSuit Ransomware on Your Windows Systems

Cybersecurity analysts have uncovered a sophisticated campaign exploiting a fake Zoom installer to deliver...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Hewlett Packard RCE Vulnerability Allows Attackers to Bypass Authentication and Execute Remote Commands

A critical unauthenticated remote code execution (RCE) vulnerability in HPE Insight Cluster Management Utility...

Windows 11 Insider Released – Microsoft Removes BypassNRO.cmd Script to Enhance Security

Microsoft has launched Windows 11 Insider Preview Build 26200.5516 to the Dev Channel with exciting new...

A New Microsoft Tool Automatically Detects, Diagnoses, and Resolves Boot Issues in Windows

Microsoft has unveiled a transformational tool aimed at addressing one of the most frustrating...