Visit us at CEBIT 2018

Acunetix will be exhibiting for the very first time at CEBIT, Europe’s Business Festival for Innovation and Digitization, held in Hannover, Germany between the 11th and 15th of June. We invite all customers and partners to visit us at Stand A35 in CEBIT d!conomy Regional Sales Executive Daniel McClean and Technical Support Engineer Bernhard Abele will […]

Read More →

Virginia scanning program (VITA) uses Acunetix to slash vulnerabilities in web apps

The Virginia Information Technologies Agency (VITA) announced that it cut the number of high-risk vulnerabilities affecting its web applications by 30 percent in one year by implementing a vulnerability-scanning program that includes the use of Acunetix. VITA’s Web Application Vulnerability Scanning Program, implemented in 2016, uses Acunetix to check more than 1,600 public-facing web applications […]

Read More →

Highlights from RSA Conference 2018

The Acunetix team has returned from RSA Conference 2018 held once again at the Moscone Business Centre in San Francisco. This week-long conference was attended by security professionals from around the globe. Juxhin Dyrmishi Brigjaj from the Acunetix Development team, Kurt Giacchino, Technical Support, Eric Brown and Michelle Cartwright, Regional Sales Executives where in attendance […]

Read More →

Recommendations for TLS/SSL Cipher Hardening

Transport Layer Security (TLS) and its predecessor, Secure Socket Layer (SSL) are widely used protocols designed secure the transfer of data between the client and the server through authentication, encryption and integrity. Contrary to common assumptions TLS/SSL is a not only a widely used technology in websites and web applications (using the HTTP protocol), but […]

Read More →

Acunetix included in SANS Institute Course SEC460

Enterprise Threat and Vulnerability Assessment London UK, April 2018 – Training on Acunetix use is now available within the SANS Institute Course, SEC460: Enterprise Threat and Vulnerability Assessment, the premier course focused on building technical vulnerability assessment skills and techniques, while highlighting time-tested practical approaches to ensure true value across the enterprise. “As the pioneer […]

Read More →

Sail Smooth with Cloud Threats, Part 2 – Cloud APIs

This is part-2 of a 2 part series that continues to discuss cloud threats and how they affect web applications in the cloud. The following addresses insecure API’s and Management Plane, deepening the threat landscape. Management Plane – Security Perspective The cloud API management plane is one of the most significant differences between traditional computing […]

Read More →

Domain Hijacking a.k.a Domain Spoofing

Domain hijacking, or domain spoofing is a type of attack whereby an organization’s domain is stolen by changing the registration of a domain name without prior authorization of the domain’s owner. Domain hijacking typically occurs with the intention of associating malicious content or phishing websites with a trusted, and otherwise legitimate domain. Domain hijacking typically […]

Read More →

GDPR: Data Controllers Be Prepared

As we delve deeper into the digital world of communication, from the perspective of privacy, the impact of personal data changes in proportion to the way we examine security. As organizations chime in this world, the normal methods that were employed to protect data have now become obsolete. This forces the security professionals to shift […]

Read More →