It comes as no surprise that the value of the application security market has risen dramatically in the last few years. Simple deduction tells us bigger cyber-attacks = more money spent on cyber defense. However, the latest claim by market analysts is that by 2021,…
Scanning non-public web applications with Acunetix Online
The Software Development Life Cycle (SDLC) is full of challenges — developers have strict deadlines for creating functional, scalable, maintainable and testable code. What’s more, that code needs to be secure. Acunetix Online among other features, acts as an IP vulnerability scanner and can automatically…
Verizon Data Breach Investigations Report 2016
So, it’s that time of year again. The Verizon Data Breach Investigations Report is out and its time for us to take a good look and analyze their results. The cover, which is dark featuring an illuminati-style symbol and the pull out statistic of ‘89%…
GoDaddy Blind XSS vulnerability – How to detect it and other Out-of-Band Vulnerabilities
Recently, security researcher Matthew Bryant discovered a blind cross-site scripting (BXSS) vulnerability in GoDaddy’s customer support portal —that is the portal accessible only to GoDaddy customer service representatives, not customers. New post: Poisoning the Well – Compromising GoDaddy Customer Support With Blind XSS – https://t.co/uEJWPU8Y4O —…
In the headlines: ImageMagick vulnerability, HIV patient data leak, Brazilian WhatsApp suspension and more
ImageMagick vulnerability being exploited in the wild Following its reveal last week, hackers are leaping on the ImageMagick vulnerability, which could allow an attacker to execute code on servers using the the vulnerable library frequently used to crop or resize images. ImageMagick is a popular…
PCI-DSS 3.2 released – Summary of Changes
The new version of PCI-DSS 3.2 has just been released, so having been through it with a fine toothcomb here are the most noteworthy changes, additions and clarifications, in the order in which they appear in the report. This new standard 3.2 is due to…
JBoss Ransomware Vulnerability Attacks
In recent weeks there have been multiple reports regarding a ransomware campaign, known as SamSam, targeting vulnerable JBoss (now known as WildFly) application servers. An official report released by Cisco Talos states that there have been approximately 3.2 million machines hosting the vulnerable versions of…
In the headlines: UK surveillance policies leak; DDoS attacks; Australia’s Cyber Security Strategy; Facebook hack, and more
UK surveillance policies leaked online UK privacy campaigners Privacy International have managed to get their hands on, and subsequently have released a set of UK surveillance policies. What these policies reveal are the extent to which government agencies such as MI5 and GCHQ have access…
Mitigating extension vulnerabilities in template-based applications
There are over 43,900 official plugins available for WordPress, another 6,200 for Joomla! and 33,700 for Drupal, not to mention the countless other platforms that are freely and easily accessible. The plugins’ abilities range from adding photos for a personal website to complex development collaboration…