Sunday, January 26, 2025
HomePrivacyTor Browser 8.5.3 Released With Fixes for Critical Zero-day Security Update in...

Tor Browser 8.5.3 Released With Fixes for Critical Zero-day Security Update in Firefox

Published on

SIEM as a Service

Follow Us on Google News

Tor Browser 8.5.3 released with the fixes for critical Sandbox Escape zero-day vulnerability in Firefox, and it results in executing arbitrary code on the user’s computer.

Mozilla recently released Firefox 67.0.3 with a security update for a type of confusion zero-day vulnerability.

Tor Browser 8.5.2 released soon after the Mozilla a patch for first zero-day, a type confusion vulnerability which can be triggered when attackers are manipulating JavaScript objects in Firefox.

After 2 days, Mozilla released another version of Firefox 67.0.4 with the fixes for the second zero-day vulnerability, a sandbox escape vulnerability that allows an attacker to execute the malicious code remotely and gain complete control of the system.

Since Firefox 67.0.4 released, Tor prepared and applied the necessary patch for the Sandbox Escape flaw with its new Tor Browser 8.5.3 version.

Currently, Tor released an update only for Desktop version and promised to release the update for Android version within this weekend since their team is currently traveling to an event, so they are unable to access our Android signing token.

According to Tor, We expect to be able to publish the Android release this weekend. In the meantime, Android users should use the safer or safest security levels. The security level on Android can be changed by going in the menu on the right of the URL bar and selecting Security Settings.

You can Download Tor Browser 8.5.3 from Here Tor Browser and distribution directory for Windows, Mac, and Linux.

You can check manually whether your browser is up to date by navigating Tor Browser menu -> Help -> About Tor Browser.

Follow us on Linkedin, Twitter, Facebook for daily Cybersecurity updates also you can take the Best Cybersecurity course online to keep your self-updated.

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Subaru’s STARLINK Connected Car’s Vulnerability Let Attackers Gain Restricted Access

In a groundbreaking discovery on November 20, 2024, cybersecurity researchers Shubham Shah and a...

Android Kiosk Tablets Vulnerability Let Attackers Control AC & Lights

A security flaw found in Android-based kiosk tablets at luxury hotels has exposed a...

CISA Releases Six ICS Advisories Details Security Issues

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) issued six Industrial Control Systems (ICS)...

Juniper Routers Exploited via Magic Packet Vulnerability to Deploy Custom Backdoor

A sophisticated cyber campaign dubbed "J-magic" has been discovered targeting enterprise-grade Juniper routers with...

API Security Webinar

Free Webinar - DevSecOps Hacks

By embedding security into your CI/CD workflows, you can shift left, streamline your DevSecOps processes, and release secure applications faster—all while saving time and resources.

In this webinar, join Phani Deepak Akella ( VP of Marketing ) and Karthik Krishnamoorthy (CTO), Indusface as they explores best practices for integrating application security into your CI/CD workflows using tools like Jenkins and Jira.

Discussion points

Automate security scans as part of the CI/CD pipeline.
Get real-time, actionable insights into vulnerabilities.
Prioritize and track fixes directly in Jira, enhancing collaboration.
Reduce risks and costs by addressing vulnerabilities pre-production.

More like this

PriveShield – Advanced Privacy Protection with Browser Profile Isolation

A browser extension named PRIVESHIELD automatically creates isolated profiles to group websites based on...

Raspberry Robin Employs TOR Network For C2 Servers Communication

Raspberry Robin, a stealthy malware discovered in 2021, leverages advanced obfuscation techniques to evade...

Tor Network Suffers IP Spoofing Attack Via Non-Exit Relays

In late October 2024, a coordinated IP spoofing attack targeted the Tor network, prompting...