New feature enables vulnerability scanning deeper into web applications AUSTIN, TEXAS – June 16, 2020 – Acunetix, a global leader in automated web application security, has incorporated a brand new feature, the Business Logic Recorder (BLR), into the product. The Business Logic Recorder is a…
Acunetix signs Iberian Distribution Contract with Lidera
Austin, Texas, June 15, 2020 — Acunetix, the pioneer in automated web application security software, announced today that it has selected Lidera, a Madrid-based company as its main distribution partner in Spain and Portugal. Resellers will have the opportunity to sign up with Lidera as…
Step-by-Step Configuration of Acunetix with Jenkins
One of the most important benefits of using Acunetix is the fact that you can integrate it into your SDLC so that you can scan your applications automatically and as early as possible. The earlier you scan and the earlier you eliminate vulnerabilities, the less…
Acunetix Selected as the Best Tool for Sensitive Audits
We have recently asked one of our customers for a review of their experiences with Acunetix. This customer is a group of companies that has more than 80,000 staff worldwide in diverse organizational units. However, due to the sensitive nature of their business (national security),…
Acunetix Selects SYNNEX Corporation as U.S. Distribution Partner
AUSTIN, Texas, June 5, 2020 — Acunetix, the pioneer in automated web application security software, announced today that it has selected SYNNEX Corporation (NYSE: SNX), a leading business process services company, as a distribution partner in the United States. Customers now have the opportunity to…
Easy Access to the 2020 Web Application Vulnerability Report
If you don’t have time to read the whole 2020 Acunetix Web Application Vulnerability Report, we have prepared two comfortable options for you. We want to make sure that you know the current state of web security so that you know what efforts to focus…
What Is the POODLE Attack?
The POODLE attack (Padding Oracle on Downgraded Legacy Encryption) exploits a vulnerability in the SSL 3.0 protocol (CVE-2014-3566). This vulnerability lets an attacker eavesdrop on communication encrypted using SSLv3. The vulnerability is no longer present in the Transport Layer Security protocol (TLS), which is the…
Scanning an Application in Docker Using AcuSensor for Java
The following article shows you how you can run a Java application in a Docker container and then use AcuSensor to run an interactive application security testing (IAST) scan for that application. Step 1: Prepare an Example Application Using Eclipse IDE Go to the menu…
Why Is Directory Listing Dangerous?
Directory listing is a web server function that displays the directory contents when there is no index file in a specific website directory. It is dangerous to leave this function turned on for the web server because it leads to information disclosure. For example, when…