Highlights from RSA Conference 2018

The Acunetix team has returned from RSA Conference 2018 held once again at the Moscone Business Centre in San Francisco. This week-long conference was attended by security professionals from around the globe. Juxhin Dyrmishi Brigjaj from the Acunetix Development team, Kurt Giacchino, Technical Support, Eric…

Read more

Acunetix included in SANS Institute Course SEC460

Enterprise Threat and Vulnerability Assessment London UK, April 2018 – Training on Acunetix use is now available within the SANS Institute Course, SEC460: Enterprise Threat and Vulnerability Assessment, the premier course focused on building technical vulnerability assessment skills and techniques, while highlighting time-tested practical approaches…

Read more

Acunetix heads to University for KSU Careers Week

The University of Malta Student Council organises a yearly expo that primarily aims at bridging the gap between students and their potential employers while creating an environment to forge professional relationships that will shape their academia and careers. Through this expo, KSU student council provides…

Read more

What is Cryptojacking?

Cryptocurrencies have taken the world by storm in the past few years, making it hard to miss all the buzz around Bitcoin and Blockchain technology. While the cryptocurrencies are far from new to cybercriminals, cryptojacking opens up new ways attackers can easily monetize compromised websites…

Read more

Visit Acunetix at RSA Conference 2018

RSA Conference 2018 takes place April 16 to 20 in San Francisco! Take advantage of this opportunity to learn about new approaches to info security, discover the latest technology and interact with top security leaders and pioneers. Hands-on sessions, keynotes and informal gatherings allow you…

Read more

The Evolving Security Paradigm, Part 2

This post is part 2 of a two-part series that addresses the rapid changes in security paradigms. The change to security not only affects operation, it increases the level of complexity in security designs. The following post discusses the history of security paradigms and the…

Read more