The EU Cyber Resilience Act (CRA) is reshaping how connected devices in Europe are designed, secured, and maintained. Join us on February 12th at 2 PM JST / February 11th at 9 PM PT for a practical webinar explaining CRA essentials and how wolfSSL’s TLS, cryptography, secure boot, and SBOM solutions help teams prepare for […]
Read MoreMore TagMonth: February 2026
Getting Started with libcurl: Live Webinar with Daniel Stenberg
Level up your URL transfer skills and learn how to use libcurl more effectively in modern applications. Join us for a practical walkthrough of libcurl with curl founder Daniel Stenberg. libcurl is powerful, but small mistakes in API usage or transfer handling can lead to fragile code and hard-to-debug issues. This session focuses on how […]
Read MoreMore TagLess is More: Community Contributions That Make wolfSSL Stronger
At wolfSSL, we continuously work to keep our TLS and cryptography engine fast, portable, secure, and lightweight. Most improvements come in the form of new features, optimizations, or platform ports. But sometimes the most valuable contributions are the ones that simplify the code rather than expand it. A recent community contribution highlighted exactly this. Pull […]
Read MoreMore TagNew Feature: Copy and Free Callbacks for Hardware Acceleration
wolfSSL 5.8.4 (PR#9309) has expanded the crypto callback api to include support for copy and free operations. This addition addresses a lifecycle management challenge for developers integrating hardware security modules (HSM) or hardware accelerators. Download wolfSSL → The Capability Previously, wolfSSL’s default behavior for duplicating a hash context was a standard memory copy. While efficient […]
Read MoreMore TagExpanded Rust API for wolfSSL
Rust is a modern programming language known for its focus on memory safety and performance, making it a powerful choice for systems programming, including security-sensitive applications. To bridge the gap between Rust’s strong guarantees and the mature, high-performance cryptography provided by the wolfSSL library, we have developed and are continuing to improve a comprehensive set […]
Read MoreMore TagML-KEM and ML-DSA Improvements in wolfSSL 5.8.4
Version 5.8.4 improves wolfSSL’s implementation of ML-KEM (formerly Kyber) and ML-DSA (formerly Dilithium) post-quantum algorithms. Download wolfSSL → Bug Fixes The ML-KEM derive secret operation was corrected to properly compute shared secrets; there was a miscalculation of an offset in a buffer. An out-of-bounds read was fixed in the ML-KEM/Kyber 5-bit value decomposition code, where […]
Read MoreMore TagGetting Started with wolfMQTT
Build secure, scalable IoT messaging with confidence using wolfMQTT. Join us for a live webinar on February 4 at 9 AM PT, where we’ll walk through the fundamentals of MQTT and show how to get started with wolfMQTT in real-world embedded and IoT applications. This session highlights practical implementation details, security tradeoffs, and architectural decisions […]
Read MoreMore Tag
