Each year we analyze the most common web application vulnerabilities across thousands of assets and release the annual Invicti Appsec Indicator report. This year the results might surprise you. Watch this webinar on-demand or read the full report.
DAST is an essential part of a well-rounded application security program
Vulnerability management is one of the most important aspects of an information security program. Finding flaws, determining specific risks, and then following through to ensure those risks are minimized or eliminated sounds simple on the surface, but it’s not. Web applications and the overall function…
How to defend against recent attacks on Microsoft Exchange
The latest update of Acunetix Premium introduces a check for the primary Microsoft Exchange vulnerability that enables currently ongoing attacks. Microsoft warns against an organized criminal group known as Hafnium performing mass attacks against government and private entities, primarily in the United States. Initial reports…
World software giant selects Acunetix DAST+IAST for SDLC testing
It is a common myth that early testing in the SDLC should be based on SAST and passive IAST tools. This myth has been repeated often by sources that do not follow the developments of web application security and are unaware of the evolution of…
Frequently asked questions about Acunetix
Will Acunetix remove vulnerabilities from my web application just as my antivirus does? Web application security vulnerabilities are very different from malware. They are programming bugs – introduced by the application creators themselves, not by malicious parties. Therefore, the only way to remove them is…
WAF security – getting the most out of your web application firewall
Web application firewalls (WAFs) are one of many web application security solutions at your disposal. Unfortunately, buyers often don’t understand their purpose and treat them as a direct replacement for other classes of tools, for example, web vulnerability scanners such as Acunetix. The two classes…
Vulnerability scanning tools – why not open-source?
With the immense popularity of open-source software such as Linux, WordPress, or Magento, you might wonder why the situation is so different in the world of web application security. Let’s try to compare open-source vulnerability scanners with commercial solutions and it will soon be clear…
The Acunetix REST API
In addition to the user-friendly Acunetix user interface, all Acunetix functionality is also available through a built-in REST API. The REST API is available immediately upon installation and requires no configuration at all. All you need to do is open the Acunetix GUI to get…
Web API security with Acunetix
It’s no secret – application programming interfaces are everywhere. Many complex web applications are based on microservices, which use APIs to work with one another. Mobile apps and IoT devices also use APIs to communicate with their back-ends. Not to mention that almost every online…