Zohar Shachar, an Israeli security researcher, recently revealed the details of a bounty that he received approximately a year ago from Google. The security issue that he found was an advanced cross-site scripting (XSS) vulnerability in Google Maps. There was one detail about this case…
New Research Reveals Companies Are Losing the Web Application Security War
Half of organizations say that vulnerabilities are found faster than they can be fixed AUSTIN, Texas – Sept. 22, 2020 – Acunetix, a global leader in automated web application security testing, teamed up with Dimensional Research to learn how effectively companies are handling web application…
How Well Are Enterprises Handling Web Application Security?
Enterprises are continuously battling criminals on many fronts. It’s an all-out war against enemies that are well-hidden and remain unpredictable. And the stakes are high – an effective, multi-stage attack can cripple the business or even lead to its complete downfall. Fortunately, most enterprises now…
Security Misconfigurations and Their Consequences for Web Security
The term security misconfiguration is very generic and applies to any security issue that is not a result of a programming error but a result of a configuration error. Security misconfigurations have been defined as a separate category in the 2017 OWASP Top-10 list (category…
Acunetix update introduces data retention policies, static JavaScript method analysis, user-based timezone settings, and new vulnerability checks
A new Acunetix update has been released for Windows and Linux: 13.0.200911154, and macOS: 13.0.200911171. This Acunetix update introduces data retention policies for scans and vulnerabilities allowing users to focus on current vulnerabilities. It also introduces the detection of paths in JavaScript code using static…
Step-by-Step Configuration with GitLab
You can manage web vulnerabilities internally with Acunetix. However, these vulnerabilities will need to be fixed by developers and the developers may already use an issue management system. Therefore, managing them internally might not be an optimal choice. In such a case, your vulnerability scanner…
The Heartbleed Bug – Old Bugs Die Hard
You would think that after several years, a well-known security vulnerability should no longer be found in production systems. It may, therefore, come as a surprise that famous Internet security issues such as the Heartbleed vulnerability linger on for many years after they have been…
Scanning a REST API for Vulnerabilities
Many complex web applications are built using REST APIs. Acunetix can help you ensure the security of all your REST APIs just as effectively as in the case of monolithic web applications and websites. In this article, you will learn how to discover and fix…
Cross-Origin Resource Sharing (CORS) and the Access-Control-Allow-Origin Header
Modern browsers use the Same-Origin Policy (SOP) by default which means that fetching resources from other origins is not allowed. However, in some situations, such operations are necessary. Cross-Origin Resource Sharing (CORS) was designed to address such situations using HTTP response headers, which include Access-Control-Allow-Origin….