Get a demo Acunetix Website Security Scanner Get a demo
  • Product
  • Why Acunetix?
    • Solutions
      • INDUSTRIES
        • IT & Telecom
        • Government
        • Financial Services
        • Education
        • Healthcare
      • ROLES
        • CTO & CISO
        • Engineering Manager
        • Security Engineer
        • DevSecOps
    • Case Studies
    • Customers
    • Testimonials
  • Pricing
  • About Us
    • Our story
    • In the news
    • Careers
    • Contact
  • Resources
    • Blog
    • Webinars
    • White papers
    • Buyer’s guide
    • Partners
    • Documentation
  • Get a demo
THE ACUNETIX BLOG

Web Security Zone

Hack Naked News Episode: British Airways and NewEgg Hacks

Web Security Zone | October 15, 2018 by Tamara Naudi

Juxin Dyrmishi Brigjaj Developer at Acunetix, joins Paul at SecurityWeekly for an expert commentary on Hack Naked News programme. Juxhin talks about the resurgence of XSS after the big British Airways and NewEgg Hack! Watch the clip below to find out how these hacks could…

Read more

Acunetix v12 Review for Enterprise Customers on Firewall.cx

Web Security Zone | October 8, 2018 by Tamara Naudi

Firewall.cx first began its journey with Acunetix almost 12 years ago with its standalone Windows 98 program. The reviewer notes that the distance the web vulnerability scanner has come since then is “truly immeasurable”, managing to keep up with the competition as other companies have…

Read more

How To Protect Your Website Against A Cross-Site Scripting (XSS) Attack

Web Security Zone | October 3, 2018 by Samuel Bocetta

One of the most common methods that hackers use/will use to attack your website is a cross-site scripting (XSS) attack. Basically, an XSS attack is where a hacker will take advantage of an XSS vulnerability to execute a malicious JavaScript when users visit your website….

Read more

Better web-pentesting in Windows with AHK

Web Security Zone | October 1, 2018 by Aleksei Tiurin

Recently, I have moved to Malta. It’s quite hot here, but as I’m from colder country, I like it very much. Actually, I’m obsessed with everything hot, including hotkeys! Every pentester / researcher / bugbounter / etc has their own approach to doing things in…

Read more

Pony: A Breakdown of the Most Popular Malware in Credential Theft

Web Security Zone | September 25, 2018 by Josh Lake

Pony has been around since 2011, but it’s still the biggest threat when it comes to credential theft, according to data from Blueliv’s report, The Credential Theft Ecosystem. It leads the way at 39%, with LokiPWS and KeyBase trailing behind at 28% and 16% respectively….

Read more

Multi-Cloud Design: The Priority Focus Should be on Application Security, Part 2

Web Security Zone | September 11, 2018 by Matt Conran

This is part-2 of a 2 part series that discusses the risks involved for application security in the new multi-cloud environments. This part introduces the requirements for multi-cloud, the types of multi-clouds and the risks they transport to application security. Requirements for multi-cloud So why…

Read more

How to Mitigate XXE Vulnerabilities in Python

Web Security Zone | August 27, 2018 by Juxhin Dyrmishi Brigjaj

What is XML External Entity (XXE)? XML External Entity Injection is often referred to as a variant of Server-side Request Forgery (SSRF). XXE leverages language parsers that parse the widely used data format, XML used in a number of common scenarios such as SOAP &…

Read more

Multi-Cloud Design: The Priority Focus Should be on Application Security, Part 1

Web Security Zone | August 22, 2018 by Matt Conran

This is part 1 of a two part series that discusses the risks involved for application security in the new multi-cloud environments. This part introduces cloud threats to the application, different types of cloud types and finally the latest multi-cloud design. Introduction The World Wide…

Read more

European Credential Theft Boom: How You Can Stay Safe

Web Security Zone | August 20, 2018 by Josh Lake

Credential theft has been a cyber-criminal staple since the early days of computing. While there have been fewer cases in the US over the past year, according to data from Blueliv we have seen a 39% spike in Europe. This massive rise should be alarming…

Read more

  • 1
  • …
  • 26
  • 27
  • 28
  • 29
  • 30
  • …
  • 74
  • 28 / 74
Subscribe by Email

Get the latest content on web security in your inbox each week.

We respect your privacy

Learn More
  • IIS Security
  • Apache Troubleshooting
  • Security Scanner
  • DAST vs SAST
  • Threats, Vulnerabilities, & Risks
  • Vulnerability Assessment vs Pen Testing
  • Server Security
  • Google Hacking
Blog Categories
  • Articles
  • Web Security Zone
  • News
  • Events
  • Product Releases
  • Product Articles

Take action and discover your vulnerabilities

Get a demo
Client: AWS
Client: Cognizant
Client: Garmin
Client: Airforce
Client: NASA
Client: American Express
Product Information
  • AcuSensor Technology
  • AcuMonitor Technology
  • Acunetix Integrations
  • Vulnerability Scanner
  • Support Plans
Use Cases
  • Penetration Testing Software
  • Website Security Scanner
  • External Vulnerability Scanner
  • Web Application Security
  • Vulnerability Management Software
Website Security
  • Cross-site Scripting
  • SQL Injection
  • Reflected XSS
  • CSRF Attacks
  • Directory Traversal
Learn More
  • White Papers
  • TLS Security
  • WordPress Security
  • Web Service Security
  • Prevent SQL Injection
Company
  • About Us
  • Customers
  • Become a Partner
  • Careers
  • Contact
Documentation
  • Case Studies
  • Documentation
  • Videos
  • Vulnerability Index
  • Webinars
  • Login
  • Invicti Subscription Services Agreement
  • Privacy Policy
  • Terms of Use
  • Sitemap
  • Find us on Facebook
  • Follow us on Twiter
  • Follow us on LinkedIn

© Acunetix 2025, by Invicti