NetworkSecurity-resized

Vulnerable Network Devices: A Growing Concern

Network devices, except maybe firewalls, are not usually perceived as security sensitive assets. Manufacturers and users do not invest time in assessing the security state of routers and switches. IT admins, handling business IT infrastructures, are mainly concerned with uptime … [+]

infosec14

Acunetix Exhibited at Infosecurity Europe 2014

Acunetix participated in this year’s Infosecurity event at Earls Court, London. Infosecurity Europe is considered to be the biggest free-to-attend information security event in Europe – and the 19th edition of this event held up to its reputation. From April … [+]

Acunetix Web Vulnerability Scanner v9, build 20131216 includes a new PCI 3.0 compliance report and several new tests

More Comprehensive Detection and Classification of Web Vulnerabilities with the Latest Version of Acunetix Vulnerability Scanner

Manipulation of JSON/XML Input, Google Web ToolkitTM support and new .NET 4.5 AcuSensor are just some of the new features available in the latest version of Acunetix Vulnerability Scanner. London, May 8, 2014 – Acunetix have just announced the launch … [+]

net-framework

Build Secure Microsoft .NET Framework Web Apps Free of Vulnerabilities

Do you want the peace of mind that you’re delivering secure code free of vulnerabilities when building applications using the Microsoft .NET framework? Acunetix’s AcuSensor Technology is your answer. The .NET Framework is Microsoft’s comprehensive and consistent programming model for … [+]

cve-logo

Better scan results with CVSS, CVE and CWE

By adding these internationally adopted standards of classification, users of Acunetix Vulnerability Scanner will have a common language across their various security products resulting in an easier, more fluid remediation process. The most recent version of Acunetix Web Vulnerability Scanner … [+]

Misleading Reports of 0-Day in Acunetix WVS

Reports of a 0day vulnerability in Acunetix Web Vulnerability Scanner turn out to affect only an old version from 2012 which was subsequently fixed. A blog post has recently come to our attention that claims a successful attack against Acunetix … [+]

trojan--resized

Danger: Open Ports – Trojan is as Trojan does

Open ports are the doorways to your secure perimeter. Behind open ports, there are applications and services listening for inbound packets, waiting for connections from the outside, in order to perform their jobs. Security best practices imply the use of … [+]

Acunetix Web Vulnerability Scanner v9, build 20131216 includes a new PCI 3.0 compliance report and several new tests

Scanning for Heartbleed using Acunetix

Soon after the Heartbleed bug was made public, Acunetix released an update to detect the vulnerability in websites and web applications. The script that detects this is called Heartbleed_Bug.script, and is included in the following Scanning Profiles: Default High_Risk_Alerts The … [+]

Acunetix Web Vulnerability Scanner v9, build 20131216 includes a new PCI 3.0 compliance report and several new tests

Creating Custom Checks in Acunetix Web Vulnerability Scanner

Although Acunetix Web Vulnerability Scanner (WVS) includes most of the checks that you may require to perform a comprehensive scan of your site, there might be situations where you need to create checks for something which is specific to your … [+]

blog post image - resized

Elaborate Ways to Exploit XSS: XSS Proxies

In his book “Web Application Vulnerabilities: Detect, Exploit, Prevent”, Steve Palmer describes XSS Proxies as cross-site scripting exploitation tools that allow attackers to temporarily take control over the victim’s browser. XSS Proxy functions as a web server which takes commands … [+]