RECENT BLOG NEWS

So, what’s new at wolfSSL? Take a look below to check out the most recent news, or sign up to receive weekly email notifications containing the latest news from wolfSSL. wolfSSL also has a support-specific blog page dedicated to answering some of the more commonly received support questions.

wolfSSL 5.8.4 Now Available

wolfSSL 5.8.4 introduces several updates, including the addition of a GPLv3 exceptions list. This allows specific GPLv3-licensed codebases linking against wolfSSL to continue using wolfSSL under GPLv2. Current GPLv3 Exceptions: MariaDB Server MariaDB Client Libraries OpenVPN-NL Fetchmail OpenVPN Security Fixes This release includes multiple fixes across TLS 1.2, TLS 1.3, X25519, XChaCha20-Poly1305, and PSK processing. […]

Read MoreMore Tag

Replacing TF-M on ARMv8-M: wolfBoot Secure Domain & wolfPSA, now integrated with Zephyr for CRA compliance

ARMv8-M TrustZone (TrustZone-M) gives Cortex-M23, Cortex-M33, Cortex-M35P and related MCUs a clean, hardware-enforced way to split a system into two execution environments: Secure world: the hardware root of trust, key material, security services, and the code that configures isolation. Non-secure world: the main RTOS and application logic, kept away from secrets by hardware boundaries. In […]

Read MoreMore Tag

wolfSSH Memory Size Reduction

Reducing wolfSSH Footprint: Logging Optimization and Other Size-Saving Options Embedded and resource-constrained systems often demand tight control over code size, memory usage, and runtime overhead. A recent improvement to wolfSSH directly addresses this need by reducing logging overhead when debugging is disabled. Eliminating Logging Overhead with a No-Op WLOG Historically, even when debugging was disabled, […]

Read MoreMore Tag

wolfSSL Announces Full Support for EU Cyber Resilience Act (CRA) Security Requirements for Connected and Embedded Devices

wolfSSL Inc. announced full support for the EU Cyber Resilience Act (CRA) across its product portfolio, helping manufacturers meet mandatory cybersecurity requirements for connected and embedded devices sold in the EU. This includes secure development practices, vulnerability management, and long-term post-market support such as CVE remediation. EDMONDS, Wash., March 2, 2026 /PRNewswire-PRWeb/ — wolfSSL Inc., […]

Read MoreMore Tag

Live Webinar: X9.146 QTLS Case Study with curl and nginx

Learn how to deploy quantum-resistant TLS today using X9.146 hybrid certificates in real-world curl and nginx workflows. Join us for a practical deep dive into post-quantum TLS implementation. With CNSA 2.0 and evolving NIST guidance, engineers are being asked to experiment, validate and prepare production systems for post-quantum TLS. In this webinar, wolfSSL Post-Quantum Cryptography […]

Read MoreMore Tag

wolfSSL and OpenTitan: Securing the Open Silicon Era

wolfSSL is initiating support for OpenTitan, the open-source silicon Root of Trust. Our implementation will integrate with OpenTitan’s hardware accelerators, specifically the OpenTitan Big Number (OTBN) unit, AES, and HMAC/KMAC blocks, to offload cryptographic operations from the host RISC-V core. This integration provides a transparent, FIPS-ready security stack for embedded designs. The programmable OTBN unit […]

Read MoreMore Tag

NXP S32K1 CSE Hardware Acceleration supported by wolfSSL

wolfSSL now supports using the Cryptographic Services Engine (CSE) on NXP S32K1 microcontrollers for hardware-accelerated cryptography. The CSE is a secure coprocessor integrated into automotive-grade microcontrollers like the S32K148, providing AES acceleration, hardware TRNG, and secure key storage. The port uses wolfSSL’s Crypto Callback mechanism, so when operations aren’t supported by CSE hardware (like AES-192/256), […]

Read MoreMore Tag

FIPS 140-3 Kernel Cryptography for Yocto

Introducing meta-wolfssl support for LinuxKM: build-time FIPS-validated kernel crypto for embedded Linux What’s New: LinuxKM Recipes in meta-wolfssl The meta-wolfssl Yocto layer now includes recipes for building wolfSSL’s Linux Kernel Module (LinuxKM) directly into your embedded Linux images. This means Yocto-based projects can integrate FIPS 140-3 validated cryptography at the kernel level. You can now: […]

Read MoreMore Tag

Posts navigation

1 2 3 4 222 223 224

Weekly updates

Archives