Saturday, April 12, 2025
HomeCyber Security NewsParrot Security OS 4.4 Released with Updated Hacking & Privacy Tools with...

Parrot Security OS 4.4 Released with Updated Hacking & Privacy Tools with Various Security Testing Futures

Published on

SIEM as a Service

Follow Us on Google News

Parrot OS 4.4 released with new updates for hacking & privacy tools along with other software updates to improve the stability and reliability for most effective penetration testing performance and experience.

The Parrot Security Operating System is a Penetration Testing & Forensics Distro dedicated to Ethical Hackers & Cyber Security Professionals. It was initially released on June 2013, developed by FrozenBox.

Parrot OS 4.4 Provides the best environment for software developers and those pentesters who usually write or modify their tools with support for various languages including python, java, c/c++, ruby, perl, bash and php and other emerging languages like  golang, rust or vala.

- Advertisement - Google News

New Tools & Updates with Parrot OS 4.4 Release

This release comes with new privacy tools such as anonsurf, torbrowser, ricochet-im, onionshare and more.

Parrot OS 4.4 using VSCodium from this release as its new advanced editor instead of Atom since the Atom binary package are too heavy.

According to Parrot OS release notes,  VSCodium in the other hand is very lightweight (less than 200MB) and it is way faster than both Atom and Visual Studio Code, with a smaller memory footprint, and it provides many important features by default and without any need for external plugins (advanced intellisense, code inspector, debugger, git interface, broader languages support etc).

In order to customize the theme and settings for all users, Parrot 4.4 provides an awesome KDE flavor includes the latest 5.13 Plasma desktop with custom configurations that proved to be very lightweight and fast with a small memory footprint.

Also BTRFS & XFS file system  set by default for root and xfs for the home filesystem and it is very powerful advanced filesystems with CoW, subvolumes, snapshots and other features.

To Update from Older Versions

sudo full-upgrade
or
sudo apt update
sudo apt full-upgrade

You can Download the Parrot Security OS 4.4 here.

Alos Recommended reviewing our Kali Linux Tutorials page which covers dozens of Kali Linux Hacking Tools.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity updates.

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Threat Actors Manipulate Search Results to Lure Users to Malicious Websites

Cybercriminals are increasingly exploiting search engine optimization (SEO) techniques and paid advertisements to manipulate...

Hackers Imitate Google Chrome Install Page on Google Play to Distribute Android Malware

Cybersecurity experts have unearthed an intricate cyber campaign that leverages deceptive websites posing as...

Dangling DNS Attack Allows Hackers to Take Over Organization’s Subdomain

Hackers are exploiting what's known as "Dangling DNS" records to take over corporate subdomains,...

HelloKitty Ransomware Returns, Launching Attacks on Windows, Linux, and ESXi Environments

Security researchers and cybersecurity experts have recently uncovered new variants of the notorious HelloKitty...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Threat Actors Manipulate Search Results to Lure Users to Malicious Websites

Cybercriminals are increasingly exploiting search engine optimization (SEO) techniques and paid advertisements to manipulate...

Hackers Imitate Google Chrome Install Page on Google Play to Distribute Android Malware

Cybersecurity experts have unearthed an intricate cyber campaign that leverages deceptive websites posing as...

Dangling DNS Attack Allows Hackers to Take Over Organization’s Subdomain

Hackers are exploiting what's known as "Dangling DNS" records to take over corporate subdomains,...