Friday, March 29, 2024

Tor Browser 8.5.2 Released With Fixes for Critical Zero-day Security Update in Firefox

Tor Browser 8.5.2 released with a fix for critical security updates in that allows an attacker to run malicious code on the vulnerable machine without user interaction.

Also, we update NoScript to 10.6.3, fixing a few issues. Tor Users with the safer and safest security levels were not affected by this security issue, reads the blog post.

This critical zero-day vulnerability initially reported to Mozilla by Samuel Groß, a member of Google Project Zero and Coinbase Security.

Attackers actively targeted the discovered JavaScript type confusion vulnerability that leads to an exploitable crash. Users are urged to update the new version immediately to protect themselves from this zero-day exploit.

The bug doesn’t affect the Tor users who were running under safer and safest security levels. Unfortunately, the release is not available for Android version as the development team unable to access the Android signing token.

Android users are recommended using Tor with safer or safest security levels. You can change the security level under Security Settings.

Changelog Tor Browser 8.5.2

  • Pick up a fix for Mozilla’s bug 1544386
  • Update NoScript to 10.6.3

Tor Browser 8.5.1 released for Windows, Linux and Mac and Android earlier this month. It is the first bug fix release in the 8.5 series.

You can Download Tor Browser 8.5.2 from Here Tor Browser and distribution directory. The Android version is available from Google Play

Follow us on Linkedin, Twitter, Facebook for daily Cybersecurity updates also you can take the Best Cybersecurity courses online to keep your self-updated.

Also Read

TOP 11 Deep Web Search Engine Alternative for Google and Bing 2019

Top 5 Best Dark Web Browser for Anonymous Web Browsing With Ultimate Privacy

TOR and VPN Anonymous Enough for Dark Web

Dark Web Secrets: What Should You Know About Your Information Being on the Dark Web?

How To Access Dark Web Anonymously and know its Secretive and Mysterious Activities

Website

Latest articles

GoPlus’s Latest Report Highlights How Blockchain Communities Are Leveraging Critical API Security Data To Mitigate Web3 Threats

GoPlus Labs, the leading Web3 security infrastructure provider, has unveiled a groundbreaking report highlighting...

Wireshark 4.2.4 Released: What’s New!

Wireshark stands as the undisputed leader, offering unparalleled tools for troubleshooting, analysis, development, and...

Zoom Unveils AI-Powered All-In-One AI Work Workplace

Zoom has taken a monumental leap forward by introducing Zoom Workplace, an all-encompassing AI-powered...

iPhone Users Beware! Darcula Phishing Service Attacking Via iMessage

Phishing allows hackers to exploit human vulnerabilities and trick users into revealing sensitive information...

2 Chrome Zero-Days Exploited at Pwn2Own 2024: Patch Now

Google has announced a crucial update to its Chrome browser, addressing several vulnerabilities, including...

The Moon Malware Hacked 6,000 ASUS Routers in 72hours to Use for Proxy

Black Lotus Labs discovered a multi-year campaign by TheMoon malware targeting vulnerable routers and...
Guru baran
Guru baranhttps://gbhackers.com
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Mitigating Vulnerability Types & 0-day Threats

Mitigating Vulnerability & 0-day Threats

Alert Fatigue that helps no one as security teams need to triage 100s of vulnerabilities.

  • The problem of vulnerability fatigue today
  • Difference between CVSS-specific vulnerability vs risk-based vulnerability
  • Evaluating vulnerabilities based on the business impact/risk
  • Automation to reduce alert fatigue and enhance security posture significantly

Related Articles