Visit Acunetix at Gitex Technology Week 2015

Comguard, the Acunetix distributor based in Dubai, will be participating in GITEX 2015 between the 18th and 22nd October 2015. Now in its 35th year, Gitex is heralded as one of the largest and most important ICT events around the globe. Alive with the energy of the ICT sector and the buzz of real business, GITEX Technology […]

Read More →

Gartner recognizes Acunetix as a Challenger for Application Security Testing in 2015

Acunetix Receives 2nd highest product score for Manual Web Penetration Testing in Gartner’s 2015 Critical Capabilities for Application Security Testing Report Gartner, Inc., the leading provider of research and analysis on the global information technology industry, has recognised Acunetix as a challenger, assigning Acunetix Web Vulnerability Scanner a score of 4.36 out of 5.0 in […]

Read More →

Fortinet uses Acunetix to offer immediate Vulnerability detection

Acunetix Vulnerability Scan results can now be imported into the FortiWeb Web Application Firewall (WAF) LONDON, 12th October 2015 – Acunetix, a market leader in web application security technology, today announced that Acunetix web vulnerability scan results can now be imported into the new FortiWeb 4000E and 3000E Web Application Firewalls (WAFs) to automatically configure […]

Read More →

Acunetix OVS updated to allow better Vulnerability Management

Acunetix Online Vulnerability Scanner (OVS) has been updated to provide better web and perimeter security, while providing an improved indication of the security of your assets. Through this update, Acunetix OVS users can easily identify their long forgotten assets, rest assured that their servers are being constantly checked for the latest vulnerabilities. The following is […]

Read More →

In the headlines: David Jones and T-Mobile hack, remote code execution bugs, WinRAR vulnerability, and more

Australian department store David Jones victim of hack Australian department store giant David Jones has informed customers through a notice on their site, that they were recently hacked. However, they also assured account holders that no financial data had been breached and that there was no need to take any action. The Australian Federal Police […]

Read More →

SQLi – How it works (Part 1)

In this 6 part series on SQLi (SQL Injection) we shall be describing the vulnerability and its variants, showing how it works and what an attacker can do with it. SQL injection (SQLi) refers to an injection attack wherein an attacker can execute malicious SQL statements (also commonly referred to as a malicious payload) that […]

Read More →