Categories: Cyber Security News

Tor Browser 13.5.3 Released, What’s New?

The Tor Project has unveiled Tor Browser 13.5.3, a significant update that brings crucial security enhancements and usability improvements. This latest version is now available for download from the official Tor Browser website and distribution directory.

Important security updates to Firefox, the browser’s underlying engine, are at the forefront of this release. Tor Browser 13.5.3 is now based on Firefox 115.15.0esr, incorporating backported security fixes from Firefox 130. This update addresses several critical vulnerabilities, including:

Are You From SOC/DFIR Teams? - Try Advanced Malware and Phishing Analysis With ANY.RUN - 14 day free trial

  • Prevention of CSS-based scriptless interaction tracking
  • Ensuring the lazy loading attribute is ignored on script-disabled documents

The enhancements greatly enhance user privacy and security, upholding Tor’s strong reputation for providing robust online anonymity.

Platform-Specific Improvements

Desktop (Windows, macOS, Linux)

  • Resolution of console errors related to non-existing preferences
  • Improved accessibility of the offline state in about:torconnect
  • Enhanced Downloads button warning announcement for Orca screen reader users
  • Redesigned bridge cards with improved sharing features

Linux

  • More specific file filtering for copy/paste and drag/drop operations.

Android

  • Updated GeckoView to version 115.15.0esr for better performance and stability.

Additional Updates

  • NoScript extension updated to version 11.4.35.
  • Upgrade of lyrebird to version 0.3.0.
  • Build system updated to Go version 1.21.13.

The Tor Project recommends that users upgrade to the new release. With its focus on security, privacy, and user experience, Tor Browser 13.5.3 represents a significant step forward in developing this essential privacy tool.

What Does MITRE ATT&CK Expose About Your Enterprise Security? - Watch Free Webinar!

Gurubaran

Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Recent Posts

10 Best DNS Management Tools – 2025

Best DNS Management Tools play a crucial role in efficiently managing domain names and their…

2 hours ago

Sweet Security Announces Availability of its Cloud Native Detection & Response Platform on the AWS Marketplace

Customers can now easily integrate Sweet’s runtime detection and response platform into their AWS environments…

15 hours ago

Researchers Detailed Credential Abuse Cycle

Cybercriminals exploit leaked credentials, obtained through various means, to compromise systems and data, enabling them…

19 hours ago

New Android Malware SpyAgent Taking Screenshots Of User’s Devices

SpyAgent, a newly discovered Android malware, leverages OCR technology to extract cryptocurrency recovery phrases from…

19 hours ago

Tor Network Suffers IP Spoofing Attack Via Non-Exit Relays

In late October 2024, a coordinated IP spoofing attack targeted the Tor network, prompting abuse…

19 hours ago

Metasploit Framework Released with New Features

The Metasploit Framework, a widely used open-source penetration testing tool maintained by Rapid7, has introduced…

22 hours ago