Back to all threats

Tor switches to new Counter Galois Onion relay encryption algorithm

BleepingComputer

Summary

Tor has upgraded its encryption method for circuit traffic by implementing the Counter Galois Onion (CGO) algorithm, replacing the older tor1 relay encryption. This change aims to enhance the security and privacy of users by improving encryption standards. The move reflects ongoing efforts to bolster the security of the Tor network against potential vulnerabilities.

Original Article Summary

Tor has announced improved encryption and security for the circuit traffic by replacing the old tor1 relay encryption algorithm with a new design called Counter Galois Onion (CGO). [...]

Impact

Tor network users

In the Wild

No

Timeline

Newly disclosed

Remediation

Users are encouraged to update to the latest version of Tor that includes the CGO algorithm.

Related Coverage

Attackers launch dual campaign on GlobalProtect portals and SonicWall APIs

Security Affairs

A hacking campaign has been targeting GlobalProtect logins and scanning SonicWall APIs since December 2, 2025. The attack is significant due to its scale, involving over 7,000 IP addresses linked to a German hosting provider, indicating a coordinated effort that poses a serious threat to the security of affected systems.

Dec 6, 2025

Researchers Uncover 30+ Flaws in AI Coding Tools Enabling Data Theft and RCE Attacks

The Hacker News

Over 30 security vulnerabilities have been identified in AI-powered Integrated Development Environments (IDEs), collectively termed IDEsaster. These vulnerabilities combine prompt injection techniques with legitimate features, allowing for potential data exfiltration and remote code execution, posing significant risks to developers and organizations using these tools.

Dec 6, 2025

Your smart home is at risk - 6 ways to protect your devices from attack

Latest news

This article discusses the cybersecurity risks associated with smart home devices and emphasizes the importance of minimizing entry points to enhance security. It highlights the growing concern over vulnerabilities in smart home technology and the potential for unauthorized access and attacks.

Dec 6, 2025

Attackers hit React defect as researchers quibble over proof

CyberScoop

The article discusses a React vulnerability that has been reportedly exploited by attackers, leading to a debate among researchers about the existence of concrete evidence for these attacks. While some researchers claim to have seen proof of concepts demonstrating the exploit, others argue that there is insufficient evidence of actual attacks occurring, complicating the response efforts.

Dec 5, 2025

Barts Health NHS discloses data breach after Oracle zero-day hack

BleepingComputer

Barts Health NHS Trust has reported a data breach involving the Clop ransomware group, which exploited a vulnerability in the Oracle E-business Suite software to steal files from their database. This incident highlights the ongoing risks associated with unpatched software vulnerabilities and the potential for significant data loss in healthcare organizations.

Dec 5, 2025

Zero-Click Agentic Browser Attack Can Delete Entire Google Drive Using Crafted Emails

The Hacker News

A new zero-click attack has been identified that targets the Perplexity Comet browser, allowing malicious emails to delete all contents of a user's Google Drive. This technique exploits the automation capabilities of the browser when connected to Gmail and Google Drive, posing a significant risk to users' data security.

Dec 5, 2025