gbhackers.com
Open in
urlscan Pro
172.67.165.236
Public Scan
URL:
https://gbhackers.com/tor-browser-13-0-14/
Submission: On April 17 via manual from SG — Scanned from SG
Submission: On April 17 via manual from SG — Scanned from SG
Form analysis
4 forms found in the DOMPOST #
<form class="td-login-form-wrap" action="#" method="post">
<div class="td-login-panel-title"><span>Welcome!</span>Log into your account</div>
<div class="td_display_err"></div>
<div class="td-login-inputs"><input class="td-login-input" autocomplete="username" type="text" name="login_email" id="login_email-mob" value="" required=""><label for="login_email-mob">your username</label></div>
<div class="td-login-inputs"><input class="td-login-input" autocomplete="current-password" type="password" name="login_pass" id="login_pass-mob" value="" required=""><label for="login_pass-mob">your password</label></div>
<input type="button" name="login_button" id="login_button-mob" class="td-login-button" value="LOG IN">
<div class="td-login-info-text">
<a href="#" id="forgot-pass-link-mob">Forgot your password?</a>
</div>
<div class="td-login-register-link"></div>
</form>
GET https://gbhackers.com/
<form method="get" class="td-search-form" action="https://gbhackers.com/">
<div class="td-search-close">
<span><i class="td-icon-close-mobile"></i></span>
</div>
<div role="search" class="td-search-input">
<span>Search</span>
<input id="td-header-search-mob" type="text" value="" name="s" autocomplete="off">
</div>
</form>
GET https://gbhackers.com/
<form method="get" class="tdb-search-form" action="https://gbhackers.com/">
<div class="tdb-search-form-inner"><input class="tdb-head-search-form-input" placeholder=" " type="text" value="" name="s" autocomplete="off"><button class="wpb_button wpb_btn-inverse btn tdb-head-search-form-btn"
type="submit"><span>Search</span></button></div>
</form>
Name: mc-embedded-subscribe-form — POST https://gbhackers.us14.list-manage.com/subscribe/post?u=6c205143b8eda9ef337293b61&id=03468a2199&f_id=00d6c2e1f0
<form class="tdn-form" action="https://gbhackers.us14.list-manage.com/subscribe/post?u=6c205143b8eda9ef337293b61&id=03468a2199&f_id=00d6c2e1f0" method="post" name="mc-embedded-subscribe-form" target="_blank">
<div class="tdn-email-bar">
<div class="tdn-input-wrap"><input type="email" aria-label="email" name="EMAIL" placeholder="Your email address" required=""></div>
<div class="tdn-btn-wrap"><button class="tdn-submit-btn" type="submit" name="subscribe">Subscribe</button></div>
</div>
</form>
Text Content
Linkedin Sign in * Home * Threats * Vulnerability * Cyber AI * Cyber Tools * Data Breach * Top 10 * What is Sign in Welcome!Log into your account your username your password Forgot your password? Password recovery Recover your password your email Search GBHackers On SecurityTrusted Cyber Security News Platform Wednesday, April 17, 2024 * Home * Threats * Vulnerability * Cyber AI * Cyber Tools * Data Breach * Top 10 * What is Linkedin Twitter GBHackers On SecurityTrusted Cyber Security News Platform * Home * Threats * THREATS WHAT IS GLOBAL THREAT INTELLIGENCE? – SOC/DFIR TEAM GUIDE Cyber Security News NEW ACOUSTIC KEYBOARD SIDE CHANNEL ATTACK LET ATTACKERS STEAL SENSITIVE DATA cyber security RA WORLD RANSOMWARE ATTACK WINDOWS USING HACKED DOMAIN CONTROL & ANTI-AV TACTICS Cyber Security News AMOS MACOS STEALER STEALS PARTICULAR FILES ON THE SYSTEM & BROWSER DATA Cyber Security News NEW MALICIOUS PYPI PACKAGES USE DLL SIDELOADING IN A SUPPLY CHAIN ATTACK * Vulnerability * Cyber Security News CONNECT:FUN ATTACKING ORGANIZATIONS RUNNING FORTINET’S FORTICLIENT EMS cyber security CRITICAL RUST VULNERABILITY LET HACKERS INJECT COMMANDS ON WINDOWS SYSTEMS Cyber Security News NEW SHAREPOINT TECHNIQUE LETS HACKERS BYPASS SECURITY MEASURES CVE/vulnerability HTTP/2 VULNERABILITY LET HACKERS LAUNCH DOS ATTACKS ON WEB SERVERS CVE/vulnerability MULTIPLE CDATA VULNERABILITIES LET ATTACKERS BYPASS SECURITY RESTRICTIONS * Cyber AI * Cyber AI NSA, CISA & FBI RELEASED BEST PRACTICES FOR AI SECURITY DEPLOYMENT 2024 Cyber AI ZOOM UNVEILS AI-POWERED ALL-IN-ONE AI WORK WORKPLACE Cyber AI HACKERS ACTIVELY EXPLOITING RAY AI FRAMEWORK FLAW TO HACK THOUSANDS OF SERVERS Cyber AI HACKERS SELLING GLORYSPROUT MALWARE WITH ANTI-VM FEATURES IN UNDERGROUND FOURM FOR $300 Cyber AI DARKGPT – A CHATGPT-4 POWERED OSINT TOOL TO DETECT LEAKED DATABASES * Cyber Tools * Data Breach * Cyber Crime INC RANSOM GROUP EXFILTRATES DATA BEFORE ENCRYPTING & THREATENS PUBLIC EXPOSURE Cyber Security News LIGHTSPY HACKERS TARGET INDIAN APPLE DEVICE USERS TO STEAL SENSITIVE DATA cyber security CISCO DUO DATA BREACH: HACKERS STOLEN VOIP & SMS FOR MFA Cyber Security News SISENCE DATA BREACH, CISA URGES TO RESET LOGIN CREDENTIALS cyber security TAXI APP VENDOR DATA LEAK: 300K PASSENGERS DATA EXPOSED * Top 10 * Checklist WEB SERVER PENETRATION TESTING CHECKLIST – 2024 Network Pentesting 50+ NETWORK PENETRATION TESTING TOOLS FOR HACKERS & SECURITY PROFESSIONALS – 2024 Business 10 PROMINENT CYBERSECURITY ACQUISITIONS OF 2023 Top 10 10 BEST UNIFIED ENDPOINT MANAGEMENT TOOLS – 2024 Top 10 TOP 5 KUBERNETES VULNERABILITIES – 2023 * What is * Cyber Attack CLIENT-SIDE EXPLOITATION: POISONING WEBDAV+URL+LNK TO DELIVER MALICIOUS PAYLOADS Penetration Testing EXPLORING HOW PENETRATION TESTS ARE CLASSIFIED – PENTESTING ASPIRANT GUIDE 2024 Cyber Attack 5 MAJOR PHISHING CAMPAIGNS IN MARCH 2024 Malware HOW TO ANALYSE .NET MALWARE? – REVERSE ENGINEERING SNAKE KEYLOGGER THREATS WHAT IS GLOBAL THREAT INTELLIGENCE? – SOC/DFIR TEAM GUIDE Search TOR BROWSER 13.0.14 RELEASED – WHAT’S NEW! April 17, 2024 By Balaji The Tor Project has released a new version of the Tor Browser, their secure and private web browsing tool. Tor Browser 13.0.14 includes several critical security updates and bug fixes. KEY UPDATES IN TOR BROWSER 13.0.14 The latest release of Tor Browser focuses on improving users’ security and privacy. Some of the key updates include: Security Fixes: The update addresses several security vulnerabilities discovered in the underlying Firefox browser engine. These fixes help protect Tor Browser users from potential exploits. Tor Network Improvements: The release includes updates to the Tor network software to enhance the reliability and performance of the privacy-preserving network. User Interface Refinements: Minor user interface tweaks and bug fixes improve the overall browsing experience for Tor Browser users. Free Live Webinarfor DIFR/SOC Teams: Securing the Top 3 SME Cyber Attack Vectors - Register Here. PLATFORMS THAT GETS THE UPDATE! ALL PLATFORMS * Updated Tor to version 0.4.8.11 * Addressed the following bugs: * tor-browser#41676: Set privacy.resistFingerprinting.testing.setTZtoUTC as a defense-in-depth measure * tor-browser#42335: Do not localize the order of locales for app language * tor-browser#42428: Timezone offset leak via document.lastModified * tor-browser#42472: Timezone may leak from XSLT Date function * tor-browser#42508: Rebase Tor Browser stable onto 115.10.0esr WINDOWS, MACOS, AND LINUX * Updated Firefox to version 115.10.0esr * Addressed the following bugs: * tor-browser#42172: browser.startup.homepage and TOR_DEFAULT_HOMEPAGE are ignored for the new window opened by New Identity * tor-browser#42236: Let users decide whether to load their home page on new identity * tor-browser#42468: App languages not sorted correctly in stable LINUX * Addressed the following bug: * tor-browser-build#41110: Avoid Fontconfig warning about “ambiguous path” ANDROID * Updated GeckoView to version 115.10.0esr * Addressed the following bug: * tor-browser#42509: Backport Android security fixes from Firefox 125 Tor Browser is a critical tool for anyone looking to browse the web anonymously and protect their online privacy. By routing internet traffic through the Tor network, Tor Browser makes it much harder for users’ activities to be tracked or monitored. “Tor Browser is an essential tool for journalists, activists, and anyone who values their digital privacy,” said Isabelle Garcia, a spokesperson for the Tor Project. “This latest release ensures Tor Browser remains a secure and reliable way for people to access the internet without compromising their personal information.” AVAILABILITY AND SYSTEM REQUIREMENTS Tor Browser 13.0.14 is a free download for Windows, macOS, and Linux operating systems. The software can be obtained directly from the Tor Project website at www.torproject.org. Users will need a computer or mobile device running a compatible operating system to use Tor Browser. Minimum system requirements include at least 100MB of free disk space and 512MB of RAM. Looking to Safeguard Your Company from Advanced Cyber Threats? Deploy TrustNet to Your Radar ASAP. * Tags * computer security * cyber security * Cyber Security News MANAGED WAF PROTECTION LATEST ARTICLES cyber security CERBER LINUX RANSOMWARE EXPLOITS ATLASSIAN SERVERS TO TAKE FULL CONTROL Security researchers at Cado Security Labs have uncovered a new variant of the Cerber... April 17, 2024 CVE/vulnerability FGVULDET – NEW VULNERABILITY DETECTOR TO ANALYZE SOURCE CODE Detecting source code vulnerabilities aims to protect software systems from attacks by identifying inherent... April 17, 2024 Cyber Crime NORTH KOREAN HACKERS ABUSE DMARC TO LEGITIMIZE THEIR EMAILS DMARC is targeted by hackers as this serves to act as a preventative measure... April 17, 2024 Cyber Security News L00KUPRU RANSOMWARE ATTACKERS DISCOVERED IN THE WILD A new variant of the Xorist ransomware, dubbed L00KUPRU, has been discovered in the... April 17, 2024 Computer Security ORACLE RELEASES BIGGEST SECURITY UPDATE IN 2024 – 372 VULNERABILITIES ARE FIXED – UPDATE NOW! Oracle has released its April 2024 Critical Patch Update (CPU), addressing 372 security vulnerabilities... April 17, 2024 cyber security OUTLOOK LOGIN PANEL THEMED PHISHING ATTACK EVADED ALL ANTIVIRUS DETECTIONS Cybersecurity researchers have uncovered a new phishing attack that has bypassed all antivirus detections.The... April 17, 2024 Cyber Security News CISCO WARNS OF MASSIVE BRUTE-FORCE ATTACKS TARGETING VPNS & SSH SERVICES Hackers use brute-force attacks since it is an uncomplicated technique to break passwords or... April 17, 2024 FacebookFacebook InstagramInstagram LinkedinLinkedin TwitterTwitter Balaji BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security. WAAP/WAF ROI ANALYSIS MASTERING WAAP/WAF ROI ANALYSIS As the importance of compliance and safeguarding critical websites and APIs grows, Web Application and API Protection (WAAP) solutions play an integral role. Key takeaways include: * Pricing models * Cost Estimation * ROI Calculation Book Your Spot RELATED ARTICLES CERBER LINUX RANSOMWARE EXPLOITS ATLASSIAN SERVERS TO TAKE FULL CONTROL FGVULDET – NEW VULNERABILITY DETECTOR TO ANALYZE SOURCE CODE NORTH KOREAN HACKERS ABUSE DMARC TO LEGITIMIZE THEIR EMAILS L00KUPRU RANSOMWARE ATTACKERS DISCOVERED IN THE WILD ORACLE RELEASES BIGGEST SECURITY UPDATE IN 2024 – 372 VULNERABILITIES ARE... CONNECT WITH GBHACKERS ON SECURITY JOIN 70,000 SECURITY PROFESSIONALS Stay safe online with free daily cybersecurity updates. Sign up now! Subscribe GBHackers on security is a highly informative and reliable Cyber Security News platform that provides the latest and most relevant updates on Cyber Security News, Hacking News, Technology advancements, and Kali Linux tutorials on a daily basis. The platform is dedicated to keeping the community well-informed and up-to-date with the constantly evolving Cyber World. MENU * Home * Threats * Vulnerability * Cyber AI * Cyber Tools * Data Breach * Top 10 * What is Linkedin Twitter CONTACT US: Email : admin@gbhackers.com