JSON Web Token Attacks And Vulnerabilities

JSON Web Tokens (JWTs) are a widely used method for securely exchanging data in JSON format. Due to their ability to be digitally signed and verified, they are commonly used for authorization and authentication. However, their security depends entirely on proper implementation—when misconfigured, JWTs can…

Read more

IP Disclosure of Servers Behind WAFs Using WordPress XML-RPC

The XML-RPC protocol was originally designed to simplify cross-platform communication between applications. However, recent security research has revealed that it can be exploited for IP disclosure attacks. This article explores how XML-RPC functions, its vulnerabilities in WordPress, and how attackers can use it to expose…

Read more

Latest product updates

All announcements about Acunetix product updates and new releases are now exclusively available on our changelogs page. For each release, we publish notes to announce new features, new security checks, improvements, and bug fixes. Information about our latest product updates and previous release notes are…

Read more

Acunetix improves default roles

A new Acunetix Premium update has been released for Windows and Linux: 15.4 This Acunetix release improves the default roles. Acunetix offers role-based access control (RBAC) to efficiently manage user access. Thanks to RBAC, you can limit or authorize user access to Acunetix based on the…

Read more