acunetix_logo_blog_post_100x74

Featured Article

Acunetix WVS v9.5 build 20140902 detects Hibernate Query Injection, Format Strings and more

September 02, 2014 - 11:30am

Acunetix Web Vulnerability Scanner version 9.5 build 20140902 has been updated to include new vulnerability checks, including detection of Hibernate Query Injection, format strings vulnerabilities, MySQL username disclosure and others, including some, in well-known web applications. This new build also ... [+]


Image-for-patching-blog--resized

Patching Servers is Not Enough

Patches and vulnerabilities Patches are pieces of code designed to fix ‘bugs’, enable additional functionality or address security flaws in operating systems and applications. Timely installation of patches on web servers and applications is generally recognized as critical to the … [+]

Web-security---resized

Taking Politics out of the Web Security Equation in your Business

Web security is complicated enough. Adding a healthy dose of politics, like what exists in most organizations, often proves to be more than IT professionals can handle. Most problems in life are either financial, health, or people-related. It’s the people … [+]

OWASP-logo

Drop by the Acunetix Stand at OWASP AppSec EU 2014

Acunetix will be sponsoring and exhibiting at this year’s OWASP AppSec EU. The event will be held from 23rd till 26th June at Anglia Ruskin University’s Cambridge campus in the United Kingdom. OWASP is an open-source application security organization made … [+]

cyber-attacks---resized

Why you should be Concerned about Web Security

Ever since the Heartbleed bug disaster, you’d think companies are becoming more vigilant with their web security plan. Recent events seem to show evidence to the contrary, with millions of users’ data left exposed to cyber-attacks on popularly used websites, … [+]

access-blog-image-resized

Analysis of an Intrusion: Backdoors

The concept of “Backdoor” has seen many interpretations during the relatively short history of the Internet. Microsoft defines Backdoors as “A hidden entrance to a computer system that can be used to bypass security policies”, and, in essence, that is … [+]

Risk-resized

Core Causes of Web Security Risks and What You Can do About Them

Samuel Johnson, an 18th century lexicographer, once said “The chains of habit are too weak to be felt until they are too strong to be broken.” That’s precisely what we’re seeing with web security today. We get caught up in … [+]

NetworkSecurity-resized

Vulnerable Network Devices: A Growing Concern

Network devices, except maybe firewalls, are not usually perceived as security sensitive assets. Manufacturers and users do not invest time in assessing the security state of routers and switches. IT admins, handling business IT infrastructures, are mainly concerned with uptime … [+]

Blog-image--resized

What You Don’t Know About Web Security CAN Hurt You

How secure is your web environment? You know, your business’s marketing website, your customer-facing web applications, your internal financials application, the various cloud services that process and store business assets, and so on. Many business executives don’t have the slightest … [+]

infosec14

Acunetix Exhibited at Infosecurity Europe 2014

Acunetix participated in this year’s Infosecurity event at Earls Court, London. Infosecurity Europe is considered to be the biggest free-to-attend information security event in Europe – and the 19th edition of this event held up to its reputation. From April … [+]

Acunetix Web Vulnerability Scanner v9, build 20131216 includes a new PCI 3.0 compliance report and several new tests

More Comprehensive Detection and Classification of Web Vulnerabilities with the Latest Version of Acunetix Vulnerability Scanner

Manipulation of JSON/XML Input, Google Web ToolkitTM support and new .NET 4.5 AcuSensor are just some of the new features available in the latest version of Acunetix Vulnerability Scanner. London, May 8, 2014 – Acunetix have just announced the launch … [+]