Acunetix
Acunetix
Blog Post
  • If you are using Acunetix v11, you will be able to upgrade your Acunetix installation to Acunetix v12, and all your settings will be retained. Proceed as follows: Download the latest version of Acunetix from https://www.acunetix.com/download/fullver/ Backup the files in Install Acunetix v12 on the same machine as Acunetix v11. The installation will […] Read More → The post How to upgrade my Acune...

Acunetix
Acunetix
Blog Post
  • The upgrade of a multi-engine installation may seem like a daunting task, but it is quite easy to do. Here is the procedure to follow: Backup the contents of the directory found at From the Acunetix v11 UI > Settings > Select each Engine and Click on the Delete button Upgrade the Main […] Read More → The post How to upgrade a multi-engine installation from v11 to v12 appeared first on Acunetix.

Acunetix
Acunetix
Blog Post
  • Hot on the release of Acunetix v12, check out what’s NEW in this brief presentation highlighting: Scan speed of up to 2X faster Support for latest JavaScript technologies (ES7) New AcuSensor for Java web applications Pause and Resume scan functionality Exclusion of specific paths in the site’s structure directly from the UI Inclusion of Password […] Read More → The post What’s new in Acunetix v12 ...

Acunetix
Acunetix
Blog Post
  • In-depth analysis of JavaScript-rich sites and Single Page Applications London, UK – May 2018 – Acunetix, the pioneer in automated web application security software, has announced the release of version 12. This new version provides support for JavaScript ES7 to better analyse sites which rely heavily on JavaScript such as SPAs. This coupled with a […] Read More → The post Acunetix v12: More Compr...

Acunetix
Acunetix
YouTube Video
  • Find out what's new in Acunetix v12! This new version provides support for JavaScript ES7 to better analyse sites which rely heavily on JavaScript such as SPAs and includes a new AcuSensor for Java web applications to comprehensively and accurately scan all types of websites. With v12 also comes a brand new scanning engine, re-engineered and re-written from the ground up, making Acunetix the faste...

Acunetix
Acunetix
Blog Post
  • Acunetix will be exhibiting for the very first time at CEBIT, Europe’s Business Festival for Innovation and Digitization, held in Hannover, Germany between the 11th and 15th of June. We invite all customers and partners to visit us at Stand A35 in CEBIT d!conomy Regional Sales Executive Daniel McClean and Technical Support Engineer Bernhard Abele will […] Read More → The post Visit us at CEBIT 201...

Acunetix
Acunetix
Blog Post
  • This is part-2 of a 2 part series that discusses the evolution from human to machine based DDoS attacks. It specifically delves into how to prepare for such attacks while keeping low positives and negatives to industry standard low. The Evolution of DDoS In the early 2000’s, we had simple shell scripts created to take […] Read More → The post Preparing for Artificial Intelligence (AI) DDOS Attacks...

Acunetix
Acunetix
Blog Post
  • This is part-1 of a 2 part series that discusses the use of Artificial Intelligence (AI) to compromise web applications. This part introduces the concept of AI and its use for destruction by cybercriminals. The speed at which cybersecurity has evolved over the last decade has taken everyone by surprise. Different types of threats and […] Read More → The post Artificial Intelligence (AI) used in DD...

Acunetix
Acunetix
Blog Post
  • The Virginia Information Technologies Agency (VITA) announced that it cut the number of high-risk vulnerabilities affecting its web applications by 30 percent in one year by implementing a vulnerability-scanning program that includes the use of Acunetix. VITA’s Web Application Vulnerability Scanning Program, implemented in 2016, uses Acunetix to check more than 1,600 public-facing web applications...

Acunetix
Acunetix
Blog Post
  • The Acunetix team has returned from RSA Conference 2018 held once again at the Moscone Business Centre in San Francisco. This week-long conference was attended by security professionals from around the globe. Juxhin Dyrmishi Brigjaj from the Acunetix Development team, Kurt Giacchino, Technical Support, Eric Brown and Michelle Cartwright, Regional Sales Executives where in attendance […] Read More ...

Acunetix
Acunetix
Blog Post
  • Transport Layer Security (TLS) and its predecessor, Secure Socket Layer (SSL) are widely used protocols designed secure the transfer of data between the client and the server through authentication, encryption and integrity. Contrary to common assumptions TLS/SSL is a not only a widely used technology in websites and web applications (using the HTTP protocol), but […] Read More → The post Recommen...

Acunetix
Acunetix
Blog Post
  • Enterprise Threat and Vulnerability Assessment London UK, April 2018 – Training on Acunetix use is now available within the SANS Institute Course, SEC460: Enterprise Threat and Vulnerability Assessment, the premier course focused on building technical vulnerability assessment skills and techniques, while highlighting time-tested practical approaches to ensure true value across the enterprise. “As ...

Acunetix
Acunetix
Blog Post
  • This is part-2 of a 2 part series that continues to discuss cloud threats and how they affect web applications in the cloud. The following addresses insecure API’s and Management Plane, deepening the threat landscape. Management Plane – Security Perspective The cloud API management plane is one of the most significant differences between traditional computing […] Read More → The post Sail Smooth w...

Acunetix
Acunetix
Blog Post
  • Domain hijacking, or domain spoofing is a type of attack whereby an organization’s domain is stolen by changing the registration of a domain name without prior authorization of the domain’s owner. Domain hijacking typically occurs with the intention of associating malicious content or phishing websites with a trusted, and otherwise legitimate domain. Domain hijacking typically […] Read More → The ...

Acunetix
Acunetix
Blog Post
  • As we delve deeper into the digital world of communication, from the perspective of privacy, the impact of personal data changes in proportion to the way we examine security. As organizations chime in this world, the normal methods that were employed to protect data have now become obsolete. This forces the security professionals to shift […] Read More → The post GDPR: Data Controllers Be Prepared...

Acunetix
Acunetix
Blog Post
  • This is part-1 of a 2 part series that introduces the cloud and the types of threats and cloud security issues that opens the web application to compromisation. The following post addresses hypervisor breakouts, also known as VM escape. Cloud Introduction Cloud computing is the technology that equips the organizations to fabricate products and services […] Read More → The post Sail Smooth with Clo...

Acunetix
Acunetix
Blog Post
  • The University of Malta Student Council organises a yearly expo that primarily aims at bridging the gap between students and their potential employers while creating an environment to forge professional relationships that will shape their academia and careers. Through this expo, KSU student council provides students with practical first-hand information and knowledge regarding their careers […] Re...

Acunetix
Acunetix
Blog Post
  • Software Informer’s Editor Pedro Castro scores Acunetix Web Vulnerability Scanner 4.4 out of 5 in points and awards it the Editor’s Pick Award for excellence. “All in all, there is no doubt that Acunetix Web Vulnerability Scanner belongs to the must-have group of security software.It provides strong protection against many types of menaces and vulnerabilities,” […] Read More → The post Acunetix Re...

Acunetix
Acunetix
Blog Post
  • Cryptocurrencies have taken the world by storm in the past few years, making it hard to miss all the buzz around Bitcoin and Blockchain technology. While the cryptocurrencies are far from new to cybercriminals, cryptojacking opens up new ways attackers can easily monetize compromised websites without the need to distribute malware. For the uninitiated, cryptocurrencies […] Read More → The post Wha...

Acunetix
Acunetix
Blog Post
  • RSA Conference 2018 takes place April 16 to 20 in San Francisco! Take advantage of this opportunity to learn about new approaches to info security, discover the latest technology and interact with top security leaders and pioneers. Hands-on sessions, keynotes and informal gatherings allow you to tap into a smart, forward-thinking global community that will […] Read More → The post Visit Acunetix a...

Acunetix
Acunetix
Blog Post
  • DNS (Domain Name System) is one of the many systems that keeps the Internet humming and is responsible for resolving human-readable hostnames into machine-readable IP addresses. DNS servers host what are known as zones. A DNS zone is a portion of the domain name space that is served by a DNS server, and will contain […] Read More → The post What are DNS zone transfers (AXFR)? appeared first on Acu...

Acunetix
Acunetix
Blog Post
  • In this series we will be showing step by step examples of common attacks. We will start off with a basic SQL injection exploitation of a web application and then privilege escalation to O.S root. SQL Injection is one of the most dangerous vulnerabilities a web application can be prone to. When a user’s input […] Read More → The post Exploiting SQL Injection: a Hands-on Example appeared first on A...

Acunetix
Acunetix
Blog Post
  • This post is part 2 of a two-part series that addresses the rapid changes in security paradigms. The change to security not only affects operation, it increases the level of complexity in security designs. The following post discusses the history of security paradigms and the challenges that arise from their change. Firewall Designs & the […] Read More → The post The Evolving Security Paradigm, Pa...

Acunetix
Acunetix
Blog Post
  • Web-based attacks and malware do not just hold the cybercrime crown, but they’re on the rise — that’s according to the latest Threat Landscape Report by the EU Agency for Network and Information Security (ENISA). In its sixth annual report, ENISA also reported that in 2017 attackers are increasing the complexity and sophistication of their […] Read More → The post Web-based attacks still reign sup...

Acunetix
Acunetix
Blog Post
  • This post is part 1 of a two-part series that addresses the rapid changes in security paradigms. Driven by the need to satisfy new requirements and keep pace with the digital world greatly impacts the level of security. The following post introduces the history of firewalling and security paradigms. Introduction Internet Protocol (IP) networks provide […] Read More → The post The Evolving Security...

Acunetix
Acunetix
Blog Post
  • This final part in the series on PHP security concludes with tips for building a web application/system with security in mind. There are certain things which if done during the development cycle of a web application, will dramatically help reduce the risk of being exposed to a critical vulnerability. Some of those things include but […] Read More → The post PHP Security Part 5: Top Tips appeared f...

Acunetix
Acunetix
Blog Post
  • It is frequently the case within web applications that redirects are used to direct the user to a different portion of the application. A typical example would be that of an application redirecting a user to the login page when accessing a page intended for an authenticated user if they are not currently logged in. […] Read More → The post Safely handling redirects with die() and exit() in PHP app...

Out-Market Your Competitors?

Get complete competitive insights on over 2.2 million companies to drive your marketing strategy.

Create Free Account Log in

By signing up, you agree to the Terms of Service and Privacy Policy.

Out-Market Your Competitors

Get complete competitive insights on over 2.2 million companies to drive your marketing strategy.

Create Free Account

Already a user?  Log in

By signing up, you agree to the Terms of Service and Privacy Policy.