Fortinet uses Acunetix to offer immediate Vulnerability detection

Acunetix Vulnerability Scan results can now be imported into the FortiWeb Web Application Firewall (WAF) LONDON, 12th October 2015 – Acunetix, a market leader in web application security technology, today announced that Acunetix web vulnerability scan results can now be imported into the new FortiWeb 4000E and 3000E Web Application Firewalls (WAFs) to automatically configure […]

Read More →

Acunetix OVS updated to allow better Vulnerability Management

Acunetix Online Vulnerability Scanner (OVS) has been updated to provide better web and perimeter security, while providing an improved indication of the security of your assets. Through this update, Acunetix OVS users can easily identify their long forgotten assets, rest assured that their servers are being constantly checked for the latest vulnerabilities. The following is […]

Read More →

In the headlines: David Jones and T-Mobile hack, remote code execution bugs, WinRAR vulnerability, and more

Australian department store David Jones victim of hack Australian department store giant David Jones has informed customers through a notice on their site, that they were recently hacked. However, they also assured account holders that no financial data had been breached and that there was no need to take any action. The Australian Federal Police […]

Read More →

SQLi – How it works (Part 1)

In this 6 part series on SQLi (SQL Injection) we shall be describing the vulnerability and its variants, showing how it works and what an attacker can do with it. SQL injection (SQLi) refers to an injection attack wherein an attacker can execute malicious SQL statements (also commonly referred to as a malicious payload) that […]

Read More →

Acunetix Port Scanner

The Acunetix Port Scanner performs a port scan against the server hosting the scanned website. When open ports are found, Acunetix Web Vulnerability Scanner will proceed with network level security checks against the network service running on that port, such as DNS Open Recursion tests, badly configured proxy server tests, weak SNMP community strings, and […]

Read More →

In the headlines: South Korea’s cyber attacks, DHS networks, Adobe Shockwave Player and more

South Korea has had over 110,000 cyber attacks in the last 5 years A recently released report has revealed that South Korean government agencies were subject to over 114,000 cyber attacks in the last five years. The report, compiled using data from the National Computing and Information Agency shows that the departments targeted most frequently […]

Read More →

Acunetix 10 new build checks for vulnerabilities in Composer, Zend Framework, AjaxControlToolkit

Acunetix WVS v.10 (build 20150921) has been released. This new build checks for Cross Site Scripting in mobile-touch event handlers and for various vulnerabilities in products such as Composer, Zend Framework, AjaxControlToolkit and others. Below is a full list of updates. New Features Added a new test looking for development configuration files such as Vagrantfile, […]

Read More →

XSS in Google Feedburner

A fundamental aspect of web applications which developers should bear in mind is securing the input inserted by the user.  Many times, due to lack of attention or understanding, programmers might ignore the review of the code, resulting in security breaches, which through exploiting represent a threat to the confidentiality of the users’ data and […]

Read More →