gbhackers.com Open in urlscan Pro
172.67.165.236  Public Scan

URL: https://gbhackers.com/tor-browser-13-0-14/
Submission: On April 17 via manual from SG — Scanned from SG

Form analysis 4 forms found in the DOM

POST #

<form class="td-login-form-wrap" action="#" method="post">
  <div class="td-login-panel-title"><span>Welcome!</span>Log into your account</div>
  <div class="td_display_err"></div>
  <div class="td-login-inputs"><input class="td-login-input" autocomplete="username" type="text" name="login_email" id="login_email-mob" value="" required=""><label for="login_email-mob">your username</label></div>
  <div class="td-login-inputs"><input class="td-login-input" autocomplete="current-password" type="password" name="login_pass" id="login_pass-mob" value="" required=""><label for="login_pass-mob">your password</label></div>
  <input type="button" name="login_button" id="login_button-mob" class="td-login-button" value="LOG IN">
  <div class="td-login-info-text">
    <a href="#" id="forgot-pass-link-mob">Forgot your password?</a>
  </div>
  <div class="td-login-register-link"></div>
</form>

GET https://gbhackers.com/

<form method="get" class="td-search-form" action="https://gbhackers.com/">
  <div class="td-search-close">
    <span><i class="td-icon-close-mobile"></i></span>
  </div>
  <div role="search" class="td-search-input">
    <span>Search</span>
    <input id="td-header-search-mob" type="text" value="" name="s" autocomplete="off">
  </div>
</form>

GET https://gbhackers.com/

<form method="get" class="tdb-search-form" action="https://gbhackers.com/">
  <div class="tdb-search-form-inner"><input class="tdb-head-search-form-input" placeholder=" " type="text" value="" name="s" autocomplete="off"><button class="wpb_button wpb_btn-inverse btn tdb-head-search-form-btn"
      type="submit"><span>Search</span></button></div>
</form>

Name: mc-embedded-subscribe-formPOST https://gbhackers.us14.list-manage.com/subscribe/post?u=6c205143b8eda9ef337293b61&id=03468a2199&f_id=00d6c2e1f0

<form class="tdn-form" action="https://gbhackers.us14.list-manage.com/subscribe/post?u=6c205143b8eda9ef337293b61&amp;id=03468a2199&amp;f_id=00d6c2e1f0" method="post" name="mc-embedded-subscribe-form" target="_blank">
  <div class="tdn-email-bar">
    <div class="tdn-input-wrap"><input type="email" aria-label="email" name="EMAIL" placeholder="Your email address" required=""></div>
    <div class="tdn-btn-wrap"><button class="tdn-submit-btn" type="submit" name="subscribe">Subscribe</button></div>
  </div>
</form>

Text Content

Linkedin

Sign in
 * Home
 * Threats
 * Vulnerability
 * Cyber AI
 * Cyber Tools
 * Data Breach
 * Top 10
 * What is

Sign in

Welcome!Log into your account

your username
your password
Forgot your password?

Password recovery
Recover your password

your email

Search

GBHackers On SecurityTrusted Cyber Security News Platform



Wednesday, April 17, 2024
 * Home
 * Threats
 * Vulnerability
 * Cyber AI
 * Cyber Tools
 * Data Breach
 * Top 10
 * What is

Linkedin
Twitter
GBHackers On SecurityTrusted Cyber Security News Platform

 * Home
 * Threats
   * THREATS
     
     
     WHAT IS GLOBAL THREAT INTELLIGENCE? – SOC/DFIR TEAM GUIDE
     
     
     Cyber Security News
     
     
     NEW ACOUSTIC KEYBOARD SIDE CHANNEL ATTACK LET ATTACKERS STEAL SENSITIVE
     DATA
     
     
     cyber security
     
     
     RA WORLD RANSOMWARE ATTACK WINDOWS USING HACKED DOMAIN CONTROL & ANTI-AV
     TACTICS
     
     
     Cyber Security News
     
     
     AMOS MACOS STEALER STEALS PARTICULAR FILES ON THE SYSTEM & BROWSER DATA
     
     
     Cyber Security News
     
     
     NEW MALICIOUS PYPI PACKAGES USE DLL SIDELOADING IN A SUPPLY CHAIN ATTACK
     
     
     
 * Vulnerability
   * Cyber Security News
     
     
     CONNECT:FUN ATTACKING ORGANIZATIONS RUNNING FORTINET’S FORTICLIENT EMS
     
     
     cyber security
     
     
     CRITICAL RUST VULNERABILITY LET HACKERS INJECT COMMANDS ON WINDOWS SYSTEMS
     
     
     Cyber Security News
     
     
     NEW SHAREPOINT TECHNIQUE LETS HACKERS BYPASS SECURITY MEASURES
     
     
     CVE/vulnerability
     
     
     HTTP/2 VULNERABILITY LET HACKERS LAUNCH DOS ATTACKS ON WEB SERVERS
     
     
     CVE/vulnerability
     
     
     MULTIPLE CDATA VULNERABILITIES LET ATTACKERS BYPASS SECURITY RESTRICTIONS
     
     
     
 * Cyber AI
   * Cyber AI
     
     
     NSA, CISA & FBI RELEASED BEST PRACTICES FOR AI SECURITY DEPLOYMENT 2024
     
     
     Cyber AI
     
     
     ZOOM UNVEILS AI-POWERED ALL-IN-ONE AI WORK WORKPLACE
     
     
     Cyber AI
     
     
     HACKERS ACTIVELY EXPLOITING RAY AI FRAMEWORK FLAW TO HACK THOUSANDS OF
     SERVERS
     
     
     Cyber AI
     
     
     HACKERS SELLING GLORYSPROUT MALWARE WITH ANTI-VM FEATURES IN UNDERGROUND
     FOURM FOR $300
     
     
     Cyber AI
     
     
     DARKGPT – A CHATGPT-4 POWERED OSINT TOOL TO DETECT LEAKED DATABASES
     
     
     
 * Cyber Tools
 * Data Breach
   * Cyber Crime
     
     
     INC RANSOM GROUP EXFILTRATES DATA BEFORE ENCRYPTING & THREATENS PUBLIC
     EXPOSURE
     
     
     Cyber Security News
     
     
     LIGHTSPY HACKERS TARGET INDIAN APPLE DEVICE USERS TO STEAL SENSITIVE DATA
     
     
     cyber security
     
     
     CISCO DUO DATA BREACH: HACKERS STOLEN VOIP & SMS FOR MFA
     
     
     Cyber Security News
     
     
     SISENCE DATA BREACH, CISA URGES TO RESET LOGIN CREDENTIALS
     
     
     cyber security
     
     
     TAXI APP VENDOR DATA LEAK: 300K PASSENGERS DATA EXPOSED
     
     
     
 * Top 10
   * Checklist
     
     
     WEB SERVER PENETRATION TESTING CHECKLIST – 2024
     
     
     Network Pentesting
     
     
     50+ NETWORK PENETRATION TESTING TOOLS FOR HACKERS & SECURITY PROFESSIONALS
     – 2024
     
     
     Business
     
     
     10 PROMINENT CYBERSECURITY ACQUISITIONS OF 2023
     
     
     Top 10
     
     
     10 BEST UNIFIED ENDPOINT MANAGEMENT TOOLS – 2024
     
     
     Top 10
     
     
     TOP 5 KUBERNETES VULNERABILITIES – 2023
     
     
     
 * What is
   * Cyber Attack
     
     
     CLIENT-SIDE EXPLOITATION: POISONING WEBDAV+URL+LNK TO DELIVER MALICIOUS
     PAYLOADS
     
     
     Penetration Testing
     
     
     EXPLORING HOW PENETRATION TESTS ARE CLASSIFIED – PENTESTING ASPIRANT GUIDE
     2024
     
     
     Cyber Attack
     
     
     5 MAJOR PHISHING CAMPAIGNS IN MARCH 2024
     
     
     Malware
     
     
     HOW TO ANALYSE .NET MALWARE? – REVERSE ENGINEERING SNAKE KEYLOGGER
     
     
     THREATS
     
     
     WHAT IS GLOBAL THREAT INTELLIGENCE? – SOC/DFIR TEAM GUIDE
     
     
     

Search






TOR BROWSER 13.0.14 RELEASED – WHAT’S NEW!



April 17, 2024
By Balaji



The Tor Project has released a new version of the Tor Browser, their secure and
private web browsing tool. Tor Browser 13.0.14 includes several critical
security updates and bug fixes.


KEY UPDATES IN TOR BROWSER 13.0.14

The latest release of Tor Browser focuses on improving users’ security and
privacy. Some of the key updates include:

Security Fixes: The update addresses several security vulnerabilities discovered
in the underlying Firefox browser engine. These fixes help protect Tor Browser
users from potential exploits.



Tor Network Improvements: The release includes updates to the Tor network
software to enhance the reliability and performance of the privacy-preserving
network.

User Interface Refinements: Minor user interface tweaks and bug fixes improve
the overall browsing experience for Tor Browser users.



Free Live Webinarfor DIFR/SOC Teams: Securing the Top 3 SME Cyber Attack Vectors
- Register Here.


PLATFORMS THAT GETS THE UPDATE!


ALL PLATFORMS

 * Updated Tor to version 0.4.8.11
 * Addressed the following bugs:
 * tor-browser#41676: Set privacy.resistFingerprinting.testing.setTZtoUTC as a
   defense-in-depth measure
 * tor-browser#42335: Do not localize the order of locales for app language
 * tor-browser#42428: Timezone offset leak via document.lastModified
 * tor-browser#42472: Timezone may leak from XSLT Date function
 * tor-browser#42508: Rebase Tor Browser stable onto 115.10.0esr


WINDOWS, MACOS, AND LINUX

 * Updated Firefox to version 115.10.0esr
 * Addressed the following bugs:
 * tor-browser#42172: browser.startup.homepage and TOR_DEFAULT_HOMEPAGE are
   ignored for the new window opened by New Identity
 * tor-browser#42236: Let users decide whether to load their home page on new
   identity
 * tor-browser#42468: App languages not sorted correctly in stable


LINUX

 * Addressed the following bug:
 * tor-browser-build#41110: Avoid Fontconfig warning about “ambiguous path”


ANDROID

 * Updated GeckoView to version 115.10.0esr
 * Addressed the following bug:
 * tor-browser#42509: Backport Android security fixes from Firefox 125

Tor Browser is a critical tool for anyone looking to browse the web anonymously
and protect their online privacy. By routing internet traffic through the Tor
network, Tor Browser makes it much harder for users’ activities to be tracked or
monitored.

“Tor Browser is an essential tool for journalists, activists, and anyone who
values their digital privacy,” said Isabelle Garcia, a spokesperson for the Tor
Project. “This latest release ensures Tor Browser remains a secure and reliable
way for people to access the internet without compromising their personal
information.”


AVAILABILITY AND SYSTEM REQUIREMENTS

Tor Browser 13.0.14 is a free download for Windows, macOS, and Linux operating
systems. The software can be obtained directly from the Tor Project website at
www.torproject.org.

Users will need a computer or mobile device running a compatible operating
system to use Tor Browser. Minimum system requirements include at least 100MB of
free disk space and 512MB of RAM.



Looking to Safeguard Your Company from Advanced Cyber Threats?
Deploy TrustNet to Your Radar ASAP.

 * Tags
 * computer security
 * cyber security
 * Cyber Security News

MANAGED WAF PROTECTION


LATEST ARTICLES

cyber security


CERBER LINUX RANSOMWARE EXPLOITS ATLASSIAN SERVERS TO TAKE FULL CONTROL

Security researchers at Cado Security Labs have uncovered a new variant of the
Cerber...
April 17, 2024
CVE/vulnerability


FGVULDET – NEW VULNERABILITY DETECTOR TO ANALYZE SOURCE CODE

Detecting source code vulnerabilities aims to protect software systems from
attacks by identifying inherent...
April 17, 2024
Cyber Crime


NORTH KOREAN HACKERS ABUSE DMARC TO LEGITIMIZE THEIR EMAILS

DMARC is targeted by hackers as this serves to act as a preventative measure...
April 17, 2024
Cyber Security News


L00KUPRU RANSOMWARE ATTACKERS DISCOVERED IN THE WILD

A new variant of the Xorist ransomware, dubbed L00KUPRU, has been discovered in
the...
April 17, 2024
Computer Security


ORACLE RELEASES BIGGEST SECURITY UPDATE IN 2024 – 372 VULNERABILITIES ARE FIXED
– UPDATE NOW!

Oracle has released its April 2024 Critical Patch Update (CPU), addressing 372
security vulnerabilities...
April 17, 2024
cyber security


OUTLOOK LOGIN PANEL THEMED PHISHING ATTACK EVADED ALL ANTIVIRUS DETECTIONS

Cybersecurity researchers have uncovered a new phishing attack that has bypassed
all antivirus detections.The...
April 17, 2024
Cyber Security News


CISCO WARNS OF MASSIVE BRUTE-FORCE ATTACKS TARGETING VPNS & SSH SERVICES

Hackers use brute-force attacks since it is an uncomplicated technique to break
passwords or...
April 17, 2024
FacebookFacebook
InstagramInstagram
LinkedinLinkedin
TwitterTwitter

Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo
Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On
Security.





WAAP/WAF ROI ANALYSIS


MASTERING WAAP/WAF ROI ANALYSIS

As the importance of compliance and safeguarding critical websites and APIs
grows, Web Application and API Protection (WAAP) solutions play an integral
role.
Key takeaways include:

 * Pricing models
 * Cost Estimation
 * ROI Calculation

   

   
   Book Your Spot



RELATED ARTICLES


CERBER LINUX RANSOMWARE EXPLOITS ATLASSIAN SERVERS TO TAKE FULL CONTROL


FGVULDET – NEW VULNERABILITY DETECTOR TO ANALYZE SOURCE CODE


NORTH KOREAN HACKERS ABUSE DMARC TO LEGITIMIZE THEIR EMAILS


L00KUPRU RANSOMWARE ATTACKERS DISCOVERED IN THE WILD


ORACLE RELEASES BIGGEST SECURITY UPDATE IN 2024 – 372 VULNERABILITIES ARE...





CONNECT WITH GBHACKERS ON SECURITY


JOIN 70,000 SECURITY PROFESSIONALS

Stay safe online with free daily cybersecurity updates. Sign up now!

Subscribe

GBHackers on security is a highly informative and reliable Cyber Security News
platform that provides the latest and most relevant updates on Cyber Security
News, Hacking News, Technology advancements, and Kali Linux tutorials on a daily
basis. The platform is dedicated to keeping the community well-informed and
up-to-date with the constantly evolving Cyber World.





MENU

 * Home
 * Threats
 * Vulnerability
 * Cyber AI
 * Cyber Tools
 * Data Breach
 * Top 10
 * What is

Linkedin
Twitter


CONTACT US:

Email : admin@gbhackers.com