Acunetix
Acunetix
Blog Post
  • Validation Validation is the process in which data is checked against specific criteria/specification. It is being used to check if the information given by a user is in the expected/correct format before it is processed. Validation is very important as if used correctly, it allows a user to identify and block malicious activity at an […] Read More → The post PHP Security Part 4: Input Validation ...

Acunetix
Acunetix
Blog Post
  • Part one in this two part series looked at the evolution of a network architecture and how it affects security. Here we will take a deeper look at the security tools needed to deal with these changes. The Firewall is not enough Firewalls in three-tier or leaf and spine designs are not lacking features; this […] Read More → The post Changes to Network Architectures & The Security Tools required, Pa...

Acunetix
Acunetix
Blog Post
  • Domain Fronting is a widely popular technique that is used for evading Firewalls, DPI’s and censors. Domain Fronting takes advantage of legitimate high reputation cloud providers, more specifically, Content Delivery Networks (CDN), for evasion. This technique has been commonly used in the wild to circumvent censorship or by malware for establishing a Command and Control […] Read More → The post Do...

Acunetix
Acunetix
Blog Post
  • When developing a web application, it is extremely important to have security in mind and be aware of the different risks. If one does not know the risks and the mechanics behind each vulnerability, there is no way to protect against it. In Parts 1 and 2 in this Series on PHP Security we looked […] Read More → The post PHP Security Part 3: XSS and Password Storage appeared first on Acunetix.

Acunetix
Acunetix
Blog Post
  • The History of Network Architecture The goal of any network and its underlying infrastructure is simple. It is to securely transport the end user’s traffic to support an application of some kind without any packet drops which may trigger application performance problems. Here a key point to consider is that the metrics engaged to achieve […] Read More → The post Evolution of the Network Architectu...

Acunetix
Acunetix
Blog Post
  • Most web vulnerabilities are a result of bad coding habits or lack of PHP security awareness by developers. The source of probably all of them relies in the fact that user input, which plays a critical role in the security of a web application, is being trusted. This is probably the single point of failure […] Read More → The post PHP Security Part 2: Directory Traversal & Code Injection appeared ...

Acunetix
Acunetix
Blog Post
  • Whether your site is the web presence for a large multinational, a gallery showing your product range and inviting potential customers to come into the shop, or a personal site exhibiting your holiday photos, web security always matters. No matter what programming language you use to develop your site, after all the hard work you […] Read More → The post PHP Security: The Big Picture appeared firs...

Acunetix
Acunetix
Blog Post
  • Path Traversal, or, as it is otherwise known, Directory Traversal, refers to an attack through which an attacker may trick a web application into reading and subsequently divulging the contents of files outside of the root directory of the application, or the web server. Path Traversal attacks typically manipulate web application inputs by using the […] Read More → The post What is Path Traversal?...

Acunetix
Acunetix
Blog Post
  • Big congratulations go to our President’s Club Award Winners for the months of February through to November. Awards were presented by CEO Chris Martin, during the annual Christmas Staff party. Paola Monforte Alvarez, Jon Muscat, Eric Brown, Daniel McClean, Damian Fearnley and Jean-Michel Azzopardi – Regional Sales Executives at Acunetix Read More → The post Acunetix President’s Club Award Winners ...

Acunetix
Acunetix
Blog Post
  • Insecure Deserialization is a vulnerability which occurs when untrusted data is used to abuse the logic of an application, inflict a denial of service (DoS) attack, or even execute arbitrary code upon it being deserialized. It also occupies the #8 spot in the OWASP Top 10 2017 list. In order to understand what insecure deserialization […] Read More → The post What is Insecure Deserialization? appe...

Acunetix
Acunetix
Blog Post
  • This year Acunetix has teamed up with local charity The Foodbank at St.Andrew’s that helps individuals and families in short term crisis, through the provision of emergency food supplies. Acunetix staff collected non-perishable food items and baby products, to be delivered to the Foodbank. All staff collections were doubled in value by the Company.   Read More → The post Off to the Foodbank we go!...

Acunetix
Acunetix
Blog Post
  • Part 1 in this series looked at Online Security and the flawed protocols it lays upon. Online Security is complex and its underlying fabric was built without security in mind. Here we shall be exploring aspects of Application Security Testing. We live in a world of complicated application architecture compound with poor visibility leaving the […] Read More → The post Online Security: Application S...

Acunetix
Acunetix
Blog Post
  • After the long-winding road of discussion and deliberation, revision, disagreements and adjustments, the Open Web Application Security Project (OWASP) are updating their venerable Top 10 list of the most critical web application security risks since 2013. This update brings with it three new entries to the list, based on data OWASP collected and analyzed. Here’s […] Read More → The post OWASP Top ...

Acunetix
Acunetix
Blog Post
  • Technology Revolutionized A plethora of valuable solutions now run on web-based applications. One could argue that web applications are the forefront of the world. More importantly, we must equip them with appropriate online security tools to barricade against the rising web vulnerabilities. With the right tool set at hand, any web site can shock-absorb known […] Read More → The post Online Securi...

Acunetix
Acunetix
Blog Post
  • Acunetix v11 (build 11.0.173131028) has been released. This new build introduces new vulnerability checks for CMS Made Simple, adds support for Selenium scripts as import files, and includes a good list of updates and bug fixes. Below is a full list of updates. New Features and Vulnerability Tests Added support for Selenium scripts as Target […] Read More → The post New build adds detection for CM...

Acunetix
Acunetix
Blog Post
  • It’s common for terms such as cyber threats, vulnerabilities and risks to be conflated and confused. This post aims to define each term, highlight how they differ and how they are related to one-another. Cyber Threats Cyber threats, or simply, threats refer to circumstances or events with the potential to cause harm by way of […] Read More → The post Cyber Threats vs Vulnerabilities vs Risks appea...

Acunetix
Acunetix
Blog Post
  • Acunetix were the proud sponsors of the 3rd Cyprus Penetration Testing Competition that took place on Sunday, October 8th at UCLan Cyprus. The event was organized by UCLan Cyprus and the University of Cyprus, under the auspices of the office of the Commissioner of Electronic Communications and Postal Regulation. Mr. Petros Galides, Deputy Commissioner of Electronic […] Read More → The post Acuneti...

Acunetix
Acunetix
Blog Post

it-sa 2017 Highlights

  • Acunetix recently participated at it-sa 2017 in Nuremberg, Germany in partnership with VOQUZ, the Acunetix Expert Partners for Germany. While talking to visitors, VOQUZ, noted that IT compliance and data security were at the forefront of visitors’ minds, making Acunetix a fitting solution. Read More → The post it-sa 2017 Highlights appeared first on Acunetix.

Acunetix
Acunetix
Blog Post
  • WordPress, the content management system powering north of 28% of websites on the Internet, is certainly no stranger to providing timely security patches to its hundreds of millions of users when security researchers report them. This time however, things took a slightly different turn — Enguerran Gillier, a security researcher discovered and disclosed a Cross-site […] Read More → The post Cross-s...

Acunetix
Acunetix
Blog Post
  • emt Distribution, Acunetix distributors for Australia and New Zealand, recently exhibited at the AISA National Conference in Sydney 2017. Acunetix was showcased on Stand 21 together with Flexera and local security firm Airlock Digital. The distributors noted a diversity of attendees all eager to discuss varying security topics and challenges and an eagerness to hear […] Read More → The post Acunet...

Acunetix
Acunetix
Blog Post
  • Acunetix was once again present at the 37th Gitex Technology Week, held at the Dubai World Trade Center, in partnership with regional distributors EMT Technology Distribution, between the 8th and 12th October, 2017 For 37 years, visionaries and tech pioneers have been descending on Dubai to witness first-hand the technology that has inspired generations and innovations that are […] Read More → The...

Acunetix
Acunetix
Blog Post
  • Acunetix v11 (build 11.0.172901635) has been released. This new build includes new vulnerability checks for XSF Vulnerability in WordPress. Improves Joomla! and WordPress vulnerability checks, as well as and other bug fixes. Below is a full list of updates. New Features and Vulnerability Tests Added detection for XSF vulnerability in WordPress (CVE-2016-9263) Improvements Updated the […] Read More...

Acunetix
Acunetix
Blog Post
  • National Cyber Security Awareness Month (NCSAM) is upon us once again. This annual campaign to raise awareness about the importance of cybersecurity is held every year in October. NCSAM is designed to engage and educate public and private sector partners through events and initiatives to raise awareness about the importance of cybersecurity, providing tools and […] Read More → The post Free Acunet...

Acunetix
Acunetix
Blog Post
  • The following guide provides a series of recommendations for improving the security (“hardening”) of your Acunetix On Premise installation. 1. Update to the current version It is recommended that you always run the latest version of Acunetix. Additionally, Acunetix periodically publishes updates, which may include fixes for known security vulnerabilities. By default Acunetix is set […] Read More →...

Acunetix
Acunetix
Blog Post
  • Acunetix v11 (build 11.0.172641450) has been released. This new build includes new vulnerability checks for Apache Struts and nginx. It also improves the detection of Blind SQL Injection and Remote File Inclusion XSS and improves support for large JavaScript files. Below is a full list of updates. New Features and Vulnerability Tests Added detection for […] Read More → The post New build checks fo...

Acunetix
Acunetix
Blog Post
  • RESTful (or simply, REST) APIs and web services are continually becoming a core part of modern web applications thanks to the simplicity, scalability and flexibility they provide. Security vulnerabilities in REST APIs expose the same risks as traditional websites and web-applications, however, some characteristics of REST APIs make it challenging for automated web security scanners […] Read More →...

Acunetix
Acunetix
Blog Post

Visit us at it-sa 2017

  • Acunetix will be exhibiting at it-sa 2017 security expo and congress for the third year running, in partnership with VOQUZ. it-sa is the only IT security exhibition in the German-speaking region and one of the most important worldwide events. The expo is being held at the Nuremberg Exhibition Centre from 10 – 12 October 2017. […] Read More → The post Visit us at it-sa 2017 appeared first on Acunet...

Acunetix
Acunetix
Blog Post
  • On 19th September 2017, DotForce Srl will be hosting GDPR meeting in Rome, aimed at the best IT Security Systems Integrators and Managed Service Providers operating in the Italian market. The Challenge It is widely recognized among privacy professionals, that the European Union’s General Data Protection Regulation (GDPR) is the most significant privacy legislation in decades. GDPR awareness […] Re...

Out-Market Your Competitors?

Get complete competitive insights on over 2.2 million companies to drive your marketing strategy.

Create Free Account Log in

By signing up, you agree to the Terms of Service and Privacy Policy.

Out-Market Your Competitors

Get complete competitive insights on over 2.2 million companies to drive your marketing strategy.

Create Free Account

Already a user?  Log in

By signing up, you agree to the Terms of Service and Privacy Policy.