Get a demo Acunetix Website Security Scanner Get a demo
  • Product
  • Why Acunetix?
    • Solutions
      • INDUSTRIES
        • IT & Telecom
        • Government
        • Financial Services
        • Education
        • Healthcare
      • ROLES
        • CTO & CISO
        • Engineering Manager
        • Security Engineer
        • DevSecOps
    • Case Studies
    • Customers
    • Testimonials
  • Pricing
  • About Us
    • Our story
    • In the news
    • Careers
    • Contact
  • Resources
    • Blog
    • Webinars
    • White papers
    • Buyer’s guide
    • Partners
    • Support
  • Get a demo

Acunetix Web Security Blog

Articles, news, and events from leading web security experts.

WEB SECURITY ZONE FAQS & DOCUMENTATION NEWS RELEASES EVENT WHITEPAPERS CASE STUDIES

Acunetix update introduces Business Logic Recorder, CVSS 3.1 scoring, and support for Citrix WAF and the Azure DevOps Services issue tracker

Product Releases | May 12, 2020 by Nicholas Sciberras

Acunetix Version 13 build 13.0.200508159 for Windows and Linux has been released. This new build introduces the Business Logic Recorder, which allows the user to record logic implemented in multi-step web forms. The Acunetix scanner will go through the multi-step form and will be able…

Read more

Even the Mightiest Fall: An SQL Injection in Sophos XG Firewall

Web Security Zone | April 30, 2020 by Tomasz Andrzej Nidecki

Do you really think you are safe from web vulnerabilities or that they are just minor problems? A few days ago Sophos, one of the world’s most renowned security companies, found an SQL Injection in their product. What is worse, they found the vulnerability because…

Read more

Acunetix Partners with Prianto Global on Distribution Contract

News | April 29, 2020 by Dale Schembri

Austin, Texas, April 29, 2020 — Acunetix, the pioneer in automated web application security software, announced today that it has partnered with Prianto Global. Partners will have the opportunity to sign up with Prianto as an Acunetix reseller, providing them with the opportunity to enjoy…

Read more

The Challenges for Security Teams: The Bangladesh e-GOV CIRT

Articles | April 28, 2020 by Oksana Pure

Security teams worldwide face similar challenges – both independent teams and those that are part of medium and large organizations. Due to the cybersecurity skill gap, such teams often lack in numbers. On the other hand, their clients keep providing more work. As a result,…

Read more

Scanning the bWAPP Application with Acunetix

Product Articles | April 23, 2020 by Kevin Attard Compagno

The bWAPP application is an intentionally vulnerable web application. It was developed for educational purposes – in fact, bWAPP stands for buggy Web APPlication. We will show you how to deploy this web application and we will scan it using Acunetix as an IAST (interactive…

Read more

Acunetix Awards Alpha Generation UK Distribution Contract

News | April 20, 2020 by Dale Schembri

Austin, Texas, April 20, 2020 – Acunetix, the pioneer in automated web application security software, announced today that it has selected Alpha Generation as a distribution partner in the United Kingdom. Resellers will have the opportunity to sign up with Alpha Generation as an Acunetix…

Read more

An Introduction to Web Shells (Web Shells Part 1)

Web Security Zone | April 16, 2020 by Agathoklis Prodromou

A web shell is a malicious script used by an attacker with the intent to escalate and maintain persistent access on an already compromised web application. A web shell itself cannot attack or exploit a remote vulnerability, so it is always the second step of…

Read more

Web Shells 101 Using PHP (Web Shells Part 2)

Web Security Zone | April 14, 2020 by Agathoklis Prodromou

In part 1 of this series, we looked at what a web shell is and why an attacker would seek to use one. In part 2 of this series, we’ll be looking at some specific examples of web shells developed using the PHP programming language….

Read more

Keeping Web Shells Under Cover (Web Shells Part 3)

Web Security Zone | April 14, 2020 by Agathoklis Prodromou

In part 2 of this series, we looked at specific examples of web shells in the PHP programming language. In part 3 of this series, we’ll be looking at some techniques that attackers use to keep web shells hidden. Commands can be sent to the…

Read more

  • 1
  • …
  • 24
  • 25
  • 26
  • 27
  • 28
  • …
  • 139
  • 26 / 139
Subscribe by Email

Get the latest content on web security in your inbox each week.

We respect your privacy

Learn More
  • IIS Security
  • Apache Troubleshooting
  • Security Scanner
  • DAST vs SAST
  • Threats, Vulnerabilities, & Risks
  • Vulnerability Assessment vs Pen Testing
  • Server Security
  • Google Hacking
Blog Categories
  • Articles
  • Web Security Zone
  • News
  • Events
  • Product Releases
  • Product Articles
Client: AWS
Client: Cognizant
Client: Garmin
Client: Airforce
Client: NASA
Client: American Express
Product Information
  • AcuSensor Technology
  • AcuMonitor Technology
  • Acunetix Integrations
  • Vulnerability Scanner
  • Support Plans
Use Cases
  • Penetration Testing Software
  • Website Security Scanner
  • External Vulnerability Scanner
  • Web Application Security
  • Vulnerability Management Software
Website Security
  • Cross-site Scripting
  • SQL Injection
  • Reflected XSS
  • CSRF Attacks
  • Directory Traversal
Learn More
  • White Papers
  • TLS Security
  • WordPress Security
  • Web Service Security
  • Prevent SQL Injection
Company
  • About Us
  • Customers
  • Become a Partner
  • Careers
  • Contact
Documentation
  • Case Studies
  • Support
  • Videos
  • Vulnerability Index
  • Webinars
  • Login
  • Invicti Subscription Services Agreement
  • Privacy Policy
  • Terms of Use
  • Sitemap
  • Find us on Facebook
  • Follow us on Twiter
  • Follow us on LinkedIn

© Acunetix 2025, by Invicti