Acunetix version 12 (build 12.0.180911134) has been released. This new build adds two new AcuMonitor checks, detection of Web Cache Poisoning, Apache Struts RCE, URL rewrite vulnerabilities and Drupal Core Open Redirect. This new build has a good number of updates and some important fixes….
Multi-Cloud Design: The Priority Focus Should be on Application Security, Part 2
This is part-2 of a 2 part series that discusses the risks involved for application security in the new multi-cloud environments. This part introduces the requirements for multi-cloud, the types of multi-clouds and the risks they transport to application security. Requirements for multi-cloud So why…
6 Simple Ways To Protect Your Website From Attackers
If there’s one specific reason why website owners don’t take steps to boost their online security to protect their blogs and websites from attackers, it’s usually because they believe one of two things: They don’t believe their website or blog has anything worth of real…
How to Mitigate XXE Vulnerabilities in Python
What is XML External Entity (XXE)? XML External Entity Injection is often referred to as a variant of Server-side Request Forgery (SSRF). XXE leverages language parsers that parse the widely used data format, XML used in a number of common scenarios such as SOAP &…
New build introduces vulnerability checks for vulnerabilities in Liferay, Apache Shiro, RichFaces, Telerik and Tomcat
Acunetix v12 (build 12.0.180821106) has been released. This new build adds checks for vulnerabilities in Liferay, Apache Shiro, RichFaces, Telerik and Tomcat. The new build also includes a number of updates and fixes. Below is a full list of updates. New vulnerability checks Detection of…
Multi-Cloud Design: The Priority Focus Should be on Application Security, Part 1
This is part 1 of a two part series that discusses the risks involved for application security in the new multi-cloud environments. This part introduces cloud threats to the application, different types of cloud types and finally the latest multi-cloud design. Introduction The World Wide…
European Credential Theft Boom: How You Can Stay Safe
Credential theft has been a cyber-criminal staple since the early days of computing. While there have been fewer cases in the US over the past year, according to data from Blueliv we have seen a 39% spike in Europe. This massive rise should be alarming…
How do I reset 2FA on my account?
There are situations that require 2FA to be reset. This can happen when the device used for 2FA authentication is lost, broken, and not accessible any longer. In such an eventuality, you will need to do one of the following: If you are an Acunetix…
What is the cost of a data breach?
If your company isn’t taking important steps to protect against a potential data breach, it might be time to worry – attacks on businesses and organizations are increasing, and so are their costs. According to a new study by the Ponemon Institute, an average cost…