GoDaddy Blind XSS vulnerability – How to detect it and other Out-of-Band Vulnerabilities

Recently, security researcher Matthew Bryant discovered a blind cross-site scripting (BXSS) vulnerability in GoDaddy’s customer support portal —that is the portal accessible only to GoDaddy customer service representatives, not customers. New post: Poisoning the Well – Compromising GoDaddy Customer Support With Blind XSS – https://t.co/uEJWPU8Y4O — mandatory/MattBryant (@IAmMandatory) May 8, 2016 After disclosing the vulnerability to […]

Read More →

Acunetix participates at the ISACA Malta Chapter 2016

Acunetix participated at the ISACA Malta Chapter Biennial Conference held at Hilton Malta, St. Julians on the 13th of May 2016. The conference dealt with “Protecting Privacy in an Information-Driven Economy”. The ISACA Malta Chapter is a voluntary organisation which was officially formed in 2005 and has over 180 members. It provides professional education, resource […]

Read More →

In the headlines: ImageMagick vulnerability, HIV patient data leak, Brazilian WhatsApp suspension and more

ImageMagick vulnerability being exploited in the wild Following its reveal last week, hackers are leaping on the ImageMagick vulnerability, which could allow an attacker to execute code on servers using the the vulnerable library frequently used to crop or resize images. ImageMagick is a popular open-source library which can be used with various technologies including […]

Read More →

PCI-DSS 3.2 released – Summary of Changes

The new version of PCI-DSS 3.2 has just been released, so having been through it with a fine toothcomb here are the most noteworthy changes, additions and clarifications, in the order in which they appear in the report. This new standard 3.2 is due to become fully operational in October of this year so you’ve […]

Read More →

JBoss Ransomware Vulnerability Attacks

In recent weeks there have been multiple reports regarding a ransomware campaign, known as SamSam, targeting vulnerable JBoss (now known as WildFly) application servers. An official report released by Cisco Talos states that there have been approximately 3.2 million machines hosting the vulnerable versions of JBoss. Further investigation found that a large number of K-12 […]

Read More →

In the headlines: UK surveillance policies leak; DDoS attacks; Australia’s Cyber Security Strategy; Facebook hack, and more

UK surveillance policies leaked online UK privacy campaigners Privacy International have managed to get their hands on, and subsequently have released a set of UK surveillance policies. What these policies reveal are the extent to which government agencies such as MI5 and GCHQ have access to citizen data from entities such as the NHS, petition […]

Read More →

Latest build of Acunetix includes new version of .NET AcuSensor, checks for JSP source code disclosure and improves crawling capabilities

Acunetix v10.5 (build 20160427) has been released. This new build includes a new version of the .NET AcuSensor registers with .NET web applications in a way that supports signed .NET Assemblies. In addition, it includes new and improved vulnerability checks and a number of minor features and bug fixes. Below is the full list of […]

Read More →