Scanning non-public web applications with Acunetix OVS

The Software Development Life Cycle (SDLC) is full of challenges — developers have strict deadlines for creating functional, scalable, maintainable and testable code. What’s more, that code needs to be secure. Acunetix Online Vulnerability Scanner (OVS) can automatically test any Internet-facing website or web application for thousands of vulnerabilities. However, since automated security testing often […]

Read More →

Verizon Data Breach Investigations Report 2016

So, it’s that time of year again. The Verizon Data Breach Investigations Report is out and its time for us to take a good look and analyze their results. The cover, which is dark featuring an illuminati-style symbol and the pull out statistic of ‘89% of breaches had a financial or espionage motive’ promise some […]

Read More →

GoDaddy Blind XSS vulnerability – How to detect it and other Out-of-Band Vulnerabilities

Recently, security researcher Matthew Bryant discovered a blind cross-site scripting (BXSS) vulnerability in GoDaddy’s customer support portal —that is the portal accessible only to GoDaddy customer service representatives, not customers. New post: Poisoning the Well – Compromising GoDaddy Customer Support With Blind XSS – https://t.co/uEJWPU8Y4O — mandatory/MattBryant (@IAmMandatory) May 8, 2016 After disclosing the vulnerability to […]

Read More →

In the headlines: ImageMagick vulnerability, HIV patient data leak, Brazilian WhatsApp suspension and more

ImageMagick vulnerability being exploited in the wild Following its reveal last week, hackers are leaping on the ImageMagick vulnerability, which could allow an attacker to execute code on servers using the the vulnerable library frequently used to crop or resize images. ImageMagick is a popular open-source library which can be used with various technologies including […]

Read More →

PCI-DSS 3.2 released – Summary of Changes

The new version of PCI-DSS 3.2 has just been released, so having been through it with a fine toothcomb here are the most noteworthy changes, additions and clarifications, in the order in which they appear in the report. This new standard 3.2 is due to become fully operational in October of this year so you’ve […]

Read More →

JBoss Ransomware Vulnerability Attacks

In recent weeks there have been multiple reports regarding a ransomware campaign, known as SamSam, targeting vulnerable JBoss (now known as WildFly) application servers. An official report released by Cisco Talos states that there have been approximately 3.2 million machines hosting the vulnerable versions of JBoss. Further investigation found that a large number of K-12 […]

Read More →

In the headlines: UK surveillance policies leak; DDoS attacks; Australia’s Cyber Security Strategy; Facebook hack, and more

UK surveillance policies leaked online UK privacy campaigners Privacy International have managed to get their hands on, and subsequently have released a set of UK surveillance policies. What these policies reveal are the extent to which government agencies such as MI5 and GCHQ have access to citizen data from entities such as the NHS, petition […]

Read More →