A new Acunetix Premium update has been released for Windows and Linux: 15.1 This Acunetix release updates its user interface and the notifications list. The user interface features a new navigation menu, which prioritizes features based on how frequently you may need them. The most…
Acunetix releases support for RHEL 9, updates CWE report, and improves PHP IAST AcuSensor
A new Acunetix Premium update has been released for Windows and Linux: 15.0.221007170. This Acunetix release introduces support for Red Hat Enterprise Linux (RHEL) 9, which has been released earlier this year. The PHP IAST AcuSensor can now be used with web applications that take…
3 reasons why DAST is the best way to begin the web application security journey
To fully secure your web applications, you need several software solutions, specialist internal resources, and external contractors. However, this means significant costs, and not everyone can afford it all at once. How should small businesses start their web application security journey? Let’s have a look…
How scanners find vulnerabilities
DAST vulnerability scanners are not that different from virus scanners. In both cases, the goal of the software is to find something out of the ordinary in the target. A virus scanner scans a computer’s local resources and storage to find potentially malicious software. A…
Acunetix releases IAST support for WebSphere and improves crawling of SPAs
A new Acunetix Premium update has been released for Windows, Linux, and macOS: 14.9.220713150 This Acunetix release introduces IAST support for WebSphere enabling the use of the Java IAST sensor (AcuSensor) with this Java server. In addition, Acunetix DeepScan has been updated to better scan…
5 reasons why web security is important to avoid ransomware
Ransomware has been a source of major problems for many organizations in recent years. Many of them, aware of this situation, attempt to concentrate their efforts on protecting themselves against this class of threats. This often means that they shift their budgets away from web…
7 steps to avoid uncoordinated vulnerability disclosure
Imagine the following situation. You work as a cybersecurity manager for a company that owns the website www.example.com. One day, your sales department receives an email from an unknown individual. The sales department forwards it to you. The email has the following content: You example.com/login.php…
Hackers: The third pillar of security
Every business knows that to maintain security, you need the primary pillar: the right employees. Some businesses know that these employees also need the second pillar: the right tools such as Acunetix and Invicti. However, still, not enough businesses know how to deal with hackers…
Red teaming – 5 tips on how to do it safely
Red team vs blue team exercises are a very effective method to evaluate the security posture of your business. However, red teaming, due to its adversarial approach, carries certain risks that must be taken into consideration, both for the red team and the target business….