This is part-2 of a 2 part series that discusses the evolution from human to machine based DDoS attacks. It specifically delves into how to prepare for such attacks while keeping low positives and negatives to industry standard low. The Evolution of DDoS In the…
Artificial Intelligence (AI) used in DDOS Attacks, Part 1
This is part-1 of a 2 part series that discusses the use of Artificial Intelligence (AI) to compromise web applications. This part introduces the concept of AI and its use for destruction by cybercriminals. The speed at which cybersecurity has evolved over the last decade…
Virginia scanning program (VITA) uses Acunetix to slash vulnerabilities in web apps
The Virginia Information Technologies Agency (VITA) announced that it cut the number of high-risk vulnerabilities affecting its web applications by 30 percent in one year by implementing a vulnerability-scanning program that includes the use of Acunetix. VITA’s Web Application Vulnerability Scanning Program, implemented in 2016,…
Highlights from RSA Conference 2018
The Acunetix team has returned from RSA Conference 2018 held once again at the Moscone Business Centre in San Francisco. This week-long conference was attended by security professionals from around the globe. Juxhin Dyrmishi Brigjaj from the Acunetix Development team, Kurt Giacchino, Technical Support, Eric…
Acunetix included in SANS Institute Course SEC460
Enterprise Threat and Vulnerability Assessment London UK, April 2018 – Training on Acunetix use is now available within the SANS Institute Course, SEC460: Enterprise Threat and Vulnerability Assessment, the premier course focused on building technical vulnerability assessment skills and techniques, while highlighting time-tested practical approaches…
Sail Smooth with Cloud Threats, Part 2 – Cloud APIs
This is part-2 of a 2 part series that continues to discuss cloud threats and how they affect web applications in the cloud. The following addresses insecure API’s and Management Plane, deepening the threat landscape. Management Plane – Security Perspective The cloud API management plane…
Sail Smooth with Cloud Threats – Cloud Security Issues
This is part-1 of a 2 part series that introduces the cloud and the types of threats and cloud security issues that opens the web application to compromisation. The following post addresses hypervisor breakouts, also known as VM escape. Cloud Introduction Cloud computing is the…
Acunetix heads to University for KSU Careers Week
The University of Malta Student Council organises a yearly expo that primarily aims at bridging the gap between students and their potential employers while creating an environment to forge professional relationships that will shape their academia and careers. Through this expo, KSU student council provides…
Acunetix Receives Software Informer Editor’s Pick Award
Software Informer’s Editor Pedro Castro scores Acunetix Web Vulnerability Scanner 4.4 out of 5 in points and awards it the Editor’s Pick Award for excellence. “All in all, there is no doubt that Acunetix Web Vulnerability Scanner belongs to the must-have group of security software.It…