APIs and web services may seem less popular than websites and web applications but that is not true. Already back in 2018, APIs were responsible for 83% of web traffic worldwide. Most complex applications are based on microservices and microservices are basically web applications communicating…
What Is Broken Link Hijacking
Broken link hijacking (BLH) is a type of web attack. It exploits external links that are no longer valid. If your website or web application uses resources loaded from external URLs or points to such resources and these resources are no longer there (for example…
Enterprise Security Weekly with Mark Ralls, Acunetix President & COO
Mark Ralls, the President and COO of Acunetix, was invited by Paul Asadoorian and Matt Alderman to take part in Enterprise Security Weekly episode 191 aired on July 22, 2020. The episode focused on the evolution of enterprise web applications and the impact of that…
Acunetix Exhibiting at Black Hat USA 2020
Black Hat, founded by Jeff Moss (Dark Tangent), is one of the biggest and best-known cybersecurity conferences in the world. Organized in the USA since 1997 and in Europe and Asia since 2000, it is perceived as aimed at the corporate world but it caters…
Using Python to Make API Calls to Your Acunetix Installation
In addition to several out-of-the-box integrations, Acunetix provides an API, which lets you integrate the scanner with any environment. The Acunetix API lets you use any of the scanner functions with no need to access the scanner UI. As an example, we will show you…
Acunetix Now Available on macOS
Acunetix now available on all major operating systems AUSTIN, TEXAS – July 16, 2020 – Acunetix, a global leader in automated web application security, is now available on macOS. Customers can now harness the full power of Acunetix using their operating system of choice ––…
SQL Injection Cheat Sheet for Developers
In this cheat sheet, we will assume that: You are a developer or you know programming You have limited web application security knowledge You need to know how SQL injection attacks happen You need to know how to fix SQL injection issues in your code…
Acunetix Now Available on macOS
Imagine having the easiest-to-use security scanner on an easiest-to-use operating system – now it’s possible. Acunetix is now available on macOS. You can harness the full power of Acunetix using your operating system of choice, be it Windows, Linux, macOS, or the cloud. You can…
Step-By-Step Configuration with Jira
You can manage web vulnerabilities internally with Acunetix. However, these vulnerabilities will need to be fixed by developers and the developers may already use an issue management system. Therefore, managing them internally might not be an optimal choice. In such a case, your vulnerability scanner…