The term security misconfiguration is very generic and applies to any security issue that is not a result of a programming error but a result of a configuration error. Security misconfigurations have been defined as a separate category in the 2017 OWASP Top-10 list (category…
Acunetix update introduces data retention policies, static JavaScript method analysis, user-based timezone settings, and new vulnerability checks
A new Acunetix update has been released for Windows and Linux: 13.0.200911154, and macOS: 13.0.200911171. This Acunetix update introduces data retention policies for scans and vulnerabilities allowing users to focus on current vulnerabilities. It also introduces the detection of paths in JavaScript code using static…
Step-by-Step Configuration with GitLab
You can manage web vulnerabilities internally with Acunetix. However, these vulnerabilities will need to be fixed by developers and the developers may already use an issue management system. Therefore, managing them internally might not be an optimal choice. In such a case, your vulnerability scanner…
The Heartbleed Bug – Old Bugs Die Hard
You would think that after several years, a well-known security vulnerability should no longer be found in production systems. It may, therefore, come as a surprise that famous Internet security issues such as the Heartbleed vulnerability linger on for many years after they have been…
Scanning a REST API for Vulnerabilities
Many complex web applications are built using REST APIs. Acunetix can help you ensure the security of all your REST APIs just as effectively as in the case of monolithic web applications and websites. In this article, you will learn how to discover and fix…
Cross-Origin Resource Sharing (CORS) and the Access-Control-Allow-Origin Header
Modern browsers use the Same-Origin Policy (SOP) by default which means that fetching resources from other origins is not allowed. However, in some situations, such operations are necessary. Cross-Origin Resource Sharing (CORS) was designed to address such situations using HTTP response headers, which include Access-Control-Allow-Origin….
Agile and Secure SDLC – Best Practices
Agile development processes help businesses release software much quicker than it would be possible if using classic design and development cycles such as those based on the waterfall model. Most web applications require an agile methodology because they need to be updated very often and…
HttpOnly Flag – Protecting Cookies against XSS
Cross-site scripting (XSS) attacks are often aimed at stealing session cookies. In such an attack, the cookie value is accessed by a client-side script using JavaScript (document.cookie). However, in everyday use, web applications rarely need to access cookies via JavaScript. Therefore, a method of protecting…
The Power of Modern DAST: Miles Technologies
DAST has come a long way from its humble beginnings. Many businesses searching for web application security solutions are still apprehensive of DAST because they perceive it the way it was many years ago. DAST tools are often described as slow, not automated, not integrated,…