Tuesday, November 12, 2024
HomeCyber Security NewsWireshark 4.0.10 Released: What’s New!

Wireshark 4.0.10 Released: What’s New!

Published on

Malware protection

Wireshark that is formerly known as Ethereal is a widely used, free, and open-source network protocol analyzer, which allows users to capture and inspect data packets on a computer network.

This network analyzer tool is primarily used for the following purposes:-

  • Network Troubleshooting
  • Security Analysis
  • Software protocol development
  • Network Monitoring
  • Communications protocol development
  • Education

The widespread use of Wireshark reflects its effectiveness for network analysis. Wireshark 4.0.10 is the latest version that brings new updates and features for enhanced packet examination, making it a top choice for users and organizations across several sectors.

- Advertisement - SIEM as a Service
Document
FREE Demo

Deploy Advanced AI-Powered Email Security Solution

Implementing AI-Powered Email security solutions “Trustifi” can secure your business from today’s most dangerous email threats, such as Email Tracking, Blocking, Modifying, Phishing, Account Take Over, Business Email Compromise, Malware & Ransomware

What’s New?

This latest version, Wireshark 4.0.10 doesn’t bring any new features but comes with a fix, and here below we have mentioned that fix:-

  • Error loading g729.so plugin with Wireshark 4.0.9 and 3.6.17 on macOS. Issue 19374.

Wireshark and TShark search various locations for config files, plugins, SNMP MIBS, and RADIUS dictionaries, which vary by platform. To find default locations, use Help › About Wireshark › Folders or tshark -G folders.

This new version of Wireshark 4.0.10 doesn’t bring any new protocol support, updated protocol support, new and updated capture file support, or new file format decoding support.

As for Windows, make sure to use the most recent 3.6 version as there are no official 32-bit Windows packages for Wireshark 4.0+. 

Run “Uninstall ChmodBPF,” then “Install ChmodBPF” while using the macOS 13 upgrade to reset the ChmodBPF Launch Daemon.

Where to download?

The latest version of Wireshark (Wireshark 4.0.10) is available on the official portal of Wireshark Foundation, and you can download the latest version of Wireshark from the official download page, which you can access here.

Protect yourself from vulnerabilities using Patch Manager Plus to quickly patch over 850 third-party applications. Take advantage of the free trial to ensure 100% security.

Tushar Subhra
Tushar Subhra
Tushar is a Cyber security content editor with a passion for creating captivating and informative content. With years of experience under his belt in Cyber Security, he is covering Cyber Security News, technology and other news.

Latest articles

10 Best DNS Management Tools – 2025

Best DNS Management Tools play a crucial role in efficiently managing domain names and...

Sweet Security Announces Availability of its Cloud Native Detection & Response Platform on the AWS Marketplace

Customers can now easily integrate Sweet’s runtime detection and response platform into their AWS...

Researchers Detailed Credential Abuse Cycle

Cybercriminals exploit leaked credentials, obtained through various means, to compromise systems and data, enabling...

New Android Malware SpyAgent Taking Screenshots Of User’s Devices

SpyAgent, a newly discovered Android malware, leverages OCR technology to extract cryptocurrency recovery phrases...

Free Webinar

Protect Websites & APIs from Malware Attack

Malware targeting customer-facing websites and API applications poses significant risks, including compliance violations, defacements, and even blacklisting.

Join us for an insightful webinar featuring Vivek Gopalan, VP of Products at Indusface, as he shares effective strategies for safeguarding websites and APIs against malware.

Discussion points

Scan DOM, internal links, and JavaScript libraries for hidden malware.
Detect website defacements in real time.
Protect your brand by monitoring for potential blacklisting.
Prevent malware from infiltrating your server and cloud infrastructure.

More like this

Researchers Detailed Credential Abuse Cycle

Cybercriminals exploit leaked credentials, obtained through various means, to compromise systems and data, enabling...

New Android Malware SpyAgent Taking Screenshots Of User’s Devices

SpyAgent, a newly discovered Android malware, leverages OCR technology to extract cryptocurrency recovery phrases...

Tor Network Suffers IP Spoofing Attack Via Non-Exit Relays

In late October 2024, a coordinated IP spoofing attack targeted the Tor network, prompting...