Monday, December 4, 2023

Tor Browser 8.5.2 Released With Fixes for Critical Zero-day Security Update in Firefox

Tor Browser 8.5.2 released with a fix for critical security updates in that allows an attacker to run malicious code on the vulnerable machine without user interaction.

Also, we update NoScript to 10.6.3, fixing a few issues. Tor Users with the safer and safest security levels were not affected by this security issue, reads the blog post.

This critical zero-day vulnerability initially reported to Mozilla by Samuel Groß, a member of Google Project Zero and Coinbase Security.

Attackers actively targeted the discovered JavaScript type confusion vulnerability that leads to an exploitable crash. Users are urged to update the new version immediately to protect themselves from this zero-day exploit.

The bug doesn’t affect the Tor users who were running under safer and safest security levels. Unfortunately, the release is not available for Android version as the development team unable to access the Android signing token.

Android users are recommended using Tor with safer or safest security levels. You can change the security level under Security Settings.

Changelog Tor Browser 8.5.2

  • Pick up a fix for Mozilla’s bug 1544386
  • Update NoScript to 10.6.3

Tor Browser 8.5.1 released for Windows, Linux and Mac and Android earlier this month. It is the first bug fix release in the 8.5 series.

You can Download Tor Browser 8.5.2 from Here Tor Browser and distribution directory. The Android version is available from Google Play

Follow us on LinkedinTwitterFacebook for daily Cybersecurity updates also you can take the Best Cybersecurity courses online to keep your self-updated.

Also Read

TOP 11 Deep Web Search Engine Alternative for Google and Bing 2019

Top 5 Best Dark Web Browser for Anonymous Web Browsing With Ultimate Privacy

TOR and VPN Anonymous Enough for Dark Web

Dark Web Secrets: What Should You Know About Your Information Being on the Dark Web?

How To Access Dark Web Anonymously and know its Secretive and Mysterious Activities


Latest articles

Hackers Use Weaponized Documents to Attack U.S. Aerospace Industry

An American aerospace company has been the target of a commercial cyberespionage campaign dubbed...

Active Attacks Targeting Google Chrome & ownCloud Flaws: CISA Warns

The CISA announced two known exploited vulnerabilities active attacks targeting Google Chrome & own...

Cactus Ransomware Exploiting Qlik Sense code execution Vulnerability

A new Cactus Ransomware was exploited in the code execution vulnerability to Qlik Sense...

Hackers Bypass Antivirus with ScrubCrypt Tool to Install RedLine Malware

The ScrubCrypt obfuscation tool has been discovered to be utilized in attacks to disseminate the RedLine Stealer...

Hotel’s Hacked Logins Let Attacker Steal Guest Credit Cards

According to a recent report by Secureworks, a well-planned and advanced phishing attack was...

Critical Zoom Vulnerability Let Attackers Take Over Meetings

Zoom, the most widely used video conferencing platform has been discovered with a critical...

Hackers Using Weaponized Invoice to Deliver LUMMA Malware

Hackers use weaponized invoices to exploit trust in financial transactions, embedding malware or malicious...

API Attack Simulation Webinar

Live API Attack Simulation

In the upcoming webinar, Karthik Krishnamoorthy, CTO and Vivek Gopalan, VP of Products at Indusface demonstrate how APIs could be hacked.The session will cover:an exploit of OWASP API Top 10 vulnerability, a brute force account take-over (ATO) attack on API, a DDoS attack on an API, how a WAAP could bolster security over an API gateway

Related Articles