Tuesday, April 29, 2025
Homecyber securityBurp Suite 2023.8 Released – What’s New!

Burp Suite 2023.8 Released – What’s New!

Published on

SIEM as a Service

Follow Us on Google News

The updated Burp suite scanner has new add-on features and bug fixes that enhance the scanning process’s overall performance.

Burp Suite is an integrated platform/graphical tool for performing security testing of web applications.

On 27 July 2023, Portswigger released all improved versions of Burpsuite, including the reuse of HTTP/1, customizable SNI values, browser updates, and bug fixes.

- Advertisement - Google News

Burp Suite 2023.8 New Features

The new facility lets the users reuse and control  HTTP/1 connections to speed up attacks found in Intruder > Settings > HTTP/1 connection reuse. 

Users can enable Unrecognized project files settings to open files from unknown sources safely.

Also, users can set intermediate certificates when a new PKCS#11 certificate is added for hardware tokens and smart cards.

SNI values can be customized in Repeater, reproducing external service interaction issues detected by Scanner.

To improve scan efficiency, they have included Crawl Tab in the target tool to display the path information populated from all the scans.

In addition to that, the Isolated scan feature is included to test settings without impacting “live” scan results.

Burp Scanner can now run introspection queries on GraphQL endpoints to gain information on available queries and mutations. 

A new Automatic throttling setting is added to the Resource pool section of the scan launcher.

The crawl optimization technique is tuned to reduce the chance of interesting content being missed.

Also, they have improved minor bugs found in their old versions below 

  • Fixed an issue that was causing the Proxy response panel to freeze.
  • Improved the reliability of the Send to Organizer function.
  • Fixed an issue where requests/responses generated by Intruder
  • Fixed a bug that makes the crawler not always wait for slow, asynchronous queries that cause a DOM mutation to return. 

They upgraded Burp’s built-in browser to 115.0.5790.110 for Windows and Linux and 115.0.5790.114 for Mac.

Keep yourself informed about the latest Cyber Security News by following us on GoogleNewsLinkedinTwitter, and Facebook.

Latest articles

Blinded from Above: How Relentless Cyber-Attacks Are Knocking Satellites Out of Sight

According to the Center for Strategic & International Studies' (CSIS) 2025 Space Threat Assessment,...

Google Chrome Vulnerability Allows Attackers to Bypass Sandbox Restrictions – Technical Details Revealed

A severe vulnerability, identified as CVE-2025-2783, has been discovered in Google Chrome, specifically targeting...

Threat Actors Accelerate Transition from Reconnaissance to Compromise – New Report Finds

Cybercriminals are leveraging automation across the entire attack chain, drastically reducing the time from...

ResolverRAT Targets Healthcare and Pharmaceutical Sectors Through Sophisticated Phishing Attacks

A previously undocumented remote access trojan (RAT) named ResolverRAT has surfaced, specifically targeting healthcare...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Blinded from Above: How Relentless Cyber-Attacks Are Knocking Satellites Out of Sight

According to the Center for Strategic & International Studies' (CSIS) 2025 Space Threat Assessment,...

Google Chrome Vulnerability Allows Attackers to Bypass Sandbox Restrictions – Technical Details Revealed

A severe vulnerability, identified as CVE-2025-2783, has been discovered in Google Chrome, specifically targeting...

Threat Actors Accelerate Transition from Reconnaissance to Compromise – New Report Finds

Cybercriminals are leveraging automation across the entire attack chain, drastically reducing the time from...