Get a demo Acunetix Website Security Scanner Get a demo
  • Product
  • Why Acunetix?
    • Solutions
      • INDUSTRIES
        • IT & Telecom
        • Government
        • Financial Services
        • Education
        • Healthcare
      • ROLES
        • CTO & CISO
        • Engineering Manager
        • Security Engineer
        • DevSecOps
    • Case Studies
    • Customers
    • Testimonials
  • Pricing
  • About Us
    • Our story
    • In the news
    • Careers
    • Contact
  • Resources
    • Blog
    • Webinars
    • White papers
    • Buyer’s guide
    • Partners
    • Support
  • Get a demo

Acunetix Web Security Blog

Articles, news, and events from leading web security experts.

WEB SECURITY ZONE FAQS & DOCUMENTATION NEWS RELEASES EVENT WHITEPAPERS CASE STUDIES

Drupal Ransomware Vulnerability Attacks – Rex

Web Security Zone | August 22, 2016 by Juxhin Dyrmishi Brigjaj

For the past few months, multiple reports regarding a ransomware primarily affecting the popular CMS, Drupal have been emerging. The ransomware itself has no official name however is currently being dubbed as Rex. In May 2016, it was reported that 400 Drupal installations were affected, and…

Read more

Pentest Diaries: Negative Transfers and Android eWallets don’t Mix

Web Security Zone | August 18, 2016 by Raghav Bisht

eWallets, or digital wallets are becoming evermore popular. Most Android eWallets are apps that allow a user to make electronic transactions, including purchasing items online or in-person. Some services even allow an individual’s bank account to be linked to the service. Naturally, breaking the security…

Read more

Hunting for XXE in Uber using Acunetix AcuMonitor

Web Security Zone | August 11, 2016 by Ian Muscat

XML External Entity (XXE) vulnerabilities are attacks which involve an attacker abusing an application which parses XML. The attack occurs against an XML parser which has XML entities enabled. If you are not familiar with XML entities, you can think of them as a rarely…

Read more

How to set-up HTTP Authentication (Basic) with Nginx on Ubuntu 16.04

Web Security Zone | August 8, 2016 by Ian Muscat

Restricting portions of a web application or directories on a web server to a small group of trusted users can greatly improve the security of a website or web application. Most web applications provide their own form-based methods for authentication, however, we can also make…

Read more

In the headlines: LastPass vulnerability, Hillary Leaks, remote code execution vuln on Pornhub, and more

Web Security Zone | August 3, 2016 by Acunetix

LastPass password manager vulnerability gives hackers your passwords LastPass is one of the most popular password managers around and can also be added to your browser, allowing you to store and auto fill all your passwords, using just one master password to access them. So…

Read more

EU Network and Information Security Directive sets legal requirement to report breaches

Web Security Zone | August 1, 2016 by Acunetix

The EU have just passed a new directive, the Network and Information Security Directive, which was approved in December of 2015 and passed through last week. The directive comes into force in August of this year, with a 21 month limit to implement it, by…

Read more

Acunetix announce Sino-European Collaboration with JW & Associates

News | July 27, 2016 by Tamara Naudi

Chinese market to benefit from localized web security scanning solution London, UK – July 2016 – Acunetix, a global leader in web application security testing is pleased to announce a Sino-European partnership with JW & Associates in Shanghai, a leading information security service provider, offering…

Read more

4 Tips to kickstart your application security effort

Web Security Zone | July 26, 2016 by Ian Muscat

Securing web applications is not an easy task; especially when the application is constantly changing and business-critical. Identifying where to start could be overwhelming, especially if you’re just dipping your toes in application security. Here are four tips to help you get started. 1. Know your…

Read more

Securing MySQL Server on Ubuntu 16.04 LTS – Configuring MySQL Securely, Part 3

Web Security Zone | July 21, 2016 by Agathoklis Prodromou

In part 2 of this series, we looked at configuring MySQL securely. In this final part we shall continue looking at ways in which to ensure a secure MySQL Configuration. Secure Communications In some cases, we might have the MySQL database server setup on a dedicated…

Read more

  • 1
  • …
  • 60
  • 61
  • 62
  • 63
  • 64
  • …
  • 139
  • 62 / 139
Subscribe by Email

Get the latest content on web security in your inbox each week.

We respect your privacy

Learn More
  • IIS Security
  • Apache Troubleshooting
  • Security Scanner
  • DAST vs SAST
  • Threats, Vulnerabilities, & Risks
  • Vulnerability Assessment vs Pen Testing
  • Server Security
  • Google Hacking
Blog Categories
  • Articles
  • Web Security Zone
  • News
  • Events
  • Product Releases
  • Product Articles
Client: AWS
Client: Cognizant
Client: Garmin
Client: Airforce
Client: NASA
Client: American Express
Product Information
  • AcuSensor Technology
  • AcuMonitor Technology
  • Acunetix Integrations
  • Vulnerability Scanner
  • Support Plans
Use Cases
  • Penetration Testing Software
  • Website Security Scanner
  • External Vulnerability Scanner
  • Web Application Security
  • Vulnerability Management Software
Website Security
  • Cross-site Scripting
  • SQL Injection
  • Reflected XSS
  • CSRF Attacks
  • Directory Traversal
Learn More
  • White Papers
  • TLS Security
  • WordPress Security
  • Web Service Security
  • Prevent SQL Injection
Company
  • About Us
  • Customers
  • Become a Partner
  • Careers
  • Contact
Documentation
  • Case Studies
  • Support
  • Videos
  • Vulnerability Index
  • Webinars
  • Login
  • Invicti Subscription Services Agreement
  • Privacy Policy
  • Terms of Use
  • Sitemap
  • Find us on Facebook
  • Follow us on Twiter
  • Follow us on LinkedIn

© Acunetix 2025, by Invicti