Get a demo Acunetix Website Security Scanner Get a demo
  • Product
  • Why Acunetix?
    • Solutions
      • INDUSTRIES
        • IT & Telecom
        • Government
        • Financial Services
        • Education
        • Healthcare
      • ROLES
        • CTO & CISO
        • Engineering Manager
        • Security Engineer
        • DevSecOps
    • Case Studies
    • Customers
    • Testimonials
  • Pricing
  • About Us
    • Our story
    • In the news
    • Careers
    • Contact
  • Resources
    • Blog
    • Webinars
    • White papers
    • Buyer’s guide
    • Partners
    • Documentation
  • Get a demo

Acunetix Web Security Blog

Articles, news, and events from leading web security experts.

WEB SECURITY ZONE FAQS & DOCUMENTATION NEWS RELEASES EVENT WHITEPAPERS CASE STUDIES

In the headlines: Juniper backdoor, BBC hack, Steam attack, UK surveillance bill, and more

Web Security Zone | January 6, 2016 by Acunetix

Juniper backdoor mystery, NSA are at least partly to blame Last week, tech company Juniper Networks who sell corporate networking solutions, disclosed that they had discovered two unauthorised encryption backdoors in their firewalls. Encryption backdoors will immediately grab attention as one of the surveillance methods…

Read more

Authenticated scans more effective! How?

Product Articles | January 5, 2016 by Juxhin Dyrmishi Brigjaj

The majority of web applications today make use of a login mechanism where the user must supply a set of credentials in order to navigate to authenticated areas of the web application. This allows access to restricted content and content that is customised to the…

Read more

Website hack: Help, my website has been hacked! What to do now?

Web Security Zone | December 30, 2015 by Ian Muscat

Here we identify 4 practical steps SMEs can plan for and implement when they become a victim of a website hack. With the massive growth in cyber-crime, it’s a sad fact that it’s highly likely to become a question of ‘when’ rather than ‘if’. Below…

Read more

Defence in Depth – Final Part – Update software, Isolate services

Web Security Zone | December 28, 2015 by Ian Muscat

Update software and components Whether it’s a server’s operating system, a web server, a database server or even a client-side JavaScript library, an application should not be running software with known vulnerabilities. Updating, removing or replacing software or components with known vulnerabilities sounds obvious, but…

Read more

Defence in Depth – Part 4 – Validate everything, Parameterize SQL queries

Web Security Zone | December 21, 2015 by Ian Muscat

Trust no one, validate everything Unfortunately, most vulnerabilities at the application layer can’t simply be patched by applying an update. In order to fix web application vulnerabilities, software engineers often need to correct mistakes within the application code. It’s therefore ideal for software engineers to…

Read more

New Acunetix update includes security checks for Joomla! Core RCE, improved XXE tests and more

Product Releases | December 17, 2015 by Ian Muscat

New updates have been released that test for a new Joomla! remote code execution vulnerability affecting versions 1.5.0 through 3.4.5 CVE-2015-8562. Other updates also include improved XML External Entity (XXE) testing, multiple Cross-site Scripting tests in commonly used libraries and other improvements/bug fixes. Below is the…

Read more

Webroot report shows SMBs unprepared to counter cyber security attacks

Web Security Zone | December 15, 2015 by Acunetix

A number of big name retailers, insurance providers and companies have hit the headlines with their cyber attacks and data breaches over the last year or two. But what about the small and medium businesses? There’s no doubt they have their own security incidents but…

Read more

In the headlines: Mr Grey hacker, Vtech hack, US government office hack and more

Web Security Zone | December 10, 2015 by Acunetix

FBI hunting ‘Mr Grey’ hacker and his 1.2 billion stolen logins In a massive botnet operation which stole data from over 420,000 websites, the FBI are now zoning in on one member of a Russian crime ring known as ‘CyberVor’, with their target being known…

Read more

Defence in Depth – Part 3 – The Least Privilege Principle

Web Security Zone | December 8, 2015 by Ian Muscat

An application does not need to use the root (MySQL), sa (Microsoft SQL Server), postgres (PostgreSQL) or SYSDBA (Oracle Database) to connect to the database. Likewise, it’s a bad idea to run daemons or services as root (Linux) or Administrator (Microsoft Windows), unless there is…

Read more

  • 1
  • …
  • 67
  • 68
  • 69
  • 70
  • 71
  • …
  • 139
  • 69 / 139
Subscribe by Email

Get the latest content on web security in your inbox each week.

We respect your privacy

Learn More
  • IIS Security
  • Apache Troubleshooting
  • Security Scanner
  • DAST vs SAST
  • Threats, Vulnerabilities, & Risks
  • Vulnerability Assessment vs Pen Testing
  • Server Security
  • Google Hacking
Blog Categories
  • Articles
  • Web Security Zone
  • News
  • Events
  • Product Releases
  • Product Articles
Client: AWS
Client: Cognizant
Client: Garmin
Client: Airforce
Client: NASA
Client: American Express
Product Information
  • AcuSensor Technology
  • AcuMonitor Technology
  • Acunetix Integrations
  • Vulnerability Scanner
  • Support Plans
Use Cases
  • Penetration Testing Software
  • Website Security Scanner
  • External Vulnerability Scanner
  • Web Application Security
  • Vulnerability Management Software
Website Security
  • Cross-site Scripting
  • SQL Injection
  • Reflected XSS
  • CSRF Attacks
  • Directory Traversal
Learn More
  • White Papers
  • TLS Security
  • WordPress Security
  • Web Service Security
  • Prevent SQL Injection
Company
  • About Us
  • Customers
  • Become a Partner
  • Careers
  • Contact
Documentation
  • Case Studies
  • Documentation
  • Videos
  • Vulnerability Index
  • Webinars
  • Login
  • Invicti Subscription Services Agreement
  • Privacy Policy
  • Terms of Use
  • Sitemap
  • Find us on Facebook
  • Follow us on Twiter
  • Follow us on LinkedIn

© Acunetix 2025, by Invicti