acunetix_logo_blog_post_100x74

Featured Article

Acunetix WVS v9.5 build 20140902 detects Hibernate Query Injection, Format Strings and more

September 02, 2014 - 11:30am

Acunetix Web Vulnerability Scanner version 9.5 build 20140902 has been updated to include new vulnerability checks, including detection of Hibernate Query Injection, format strings vulnerabilities, MySQL username disclosure and others, including some, in well-known web applications. This new build also ... [+]


Acunetix logo

More comprehensive scanning with Acunetix WVS v9.5 – Part II

In addtion to full JSON and XML support (already covered in Part I), Acunetix WVS version 9.5 includes other improvements that increase the scan coverage and improves its abilities to find vulnerabilities. In this blog post, I will cover CRUD … [+]

Acunetix logo

More comprehensive scanning with Acunetix WVS v9.5 – Part I

In these 2 articles, I will be detailing the new functionality introduced in Acunetix WVS version 9.5. An important update introduced in the new version of Acunetix WVS is full JSON and XML support. If you are scanning a web … [+]

net-framework

Build Secure Microsoft .NET Framework Web Apps Free of Vulnerabilities

Do you want the peace of mind that you’re delivering secure code free of vulnerabilities when building applications using the Microsoft .NET framework? Acunetix’s AcuSensor Technology is your answer. The .NET Framework is Microsoft’s comprehensive and consistent programming model for … [+]

cve-logo

Better scan results with CVSS, CVE and CWE

By adding these internationally adopted standards of classification, users of Acunetix Vulnerability Scanner will have a common language across their various security products resulting in an easier, more fluid remediation process. The most recent version of Acunetix Web Vulnerability Scanner … [+]

Scan GWT applications with Acunetix WVS

Scan Google Web Toolkit Applications with Acunetix Web Vulnerability Scanner

Google Web Toolkit (GWT) is an open source set of tools that allows web developers to create and maintain complex JavaScript front-end applications in Java, using the Java development tools of their choice. It is a development toolkit for building … [+]

search-image---resized

Negative Impacts of Automated Vulnerability Scanners and How to Prevent them

Automated web application vulnerability scanners are constantly being used in order to automatically identify vulnerabilities such as Cross-Site Scripting (XSS) and SQL Injection on web applications. Although automated vulnerability scanners have become an indispensable tool for pen-testers and security consultants, … [+]

stop-hackers-resized

The Results are in – Verizon 2014 Data Breach Investigations Report

The numbers are in… and cybercrime had quite an active 2013 according to Verizon’s 2014 Data Breach Investigations Report (DBIR) – one of the information security industry’s most prominent studies compiled from over 50 contributing organizations. This year’s report includes … [+]

security-image-resized

Key Web Application Security Metrics

How’s your web application security program measuring up today? If you’re like many people, you’re simply going through the motions of periodic vulnerability scans and problem resolution. It’s a vicious cycle that may or may not be delivering the results … [+]

Misleading Reports of 0-Day in Acunetix WVS

Reports of a 0day vulnerability in Acunetix Web Vulnerability Scanner turn out to affect only an old version from 2012 which was subsequently fixed. A blog post has recently come to our attention that claims a successful attack against Acunetix … [+]

trojan--resized

Danger: Open Ports – Trojan is as Trojan does

Open ports are the doorways to your secure perimeter. Behind open ports, there are applications and services listening for inbound packets, waiting for connections from the outside, in order to perform their jobs. Security best practices imply the use of … [+]