|
@
acunetix
Worldwide
|
|
The official Twitter page for Acunetix, a global leader in web application security, and your source for ensuring the security of your web assets.
|
|
|
1.428
Tweetovi
|
664
Pratim
|
6.221
Osobe koje vas prate
|
| Tweetovi |
|
Acunetix
@acunetix
|
6 h |
|
Acunetix v13 comes with an improved user interface and introduces innovations such as the SmartScan engine, malware detection functionality, comprehensive network scanning, proof-of-exploit, incremental scanning, and more. #update #MalwareDetection acunetix.com/blog/news/acun…
|
||
|
|
||
|
Acunetix
@acunetix
|
3. velj |
|
All web application security issues are introduced by developers. Therefore, the best approach to building secure software is to do all that is possible to avoid introducing such errors in the first place instead of fixing them. #SDLC #Security #AppSec acunetix.com/blog/web-secur…
|
||
|
|
||
|
Acunetix
@acunetix
|
30. sij |
|
Your company may be contacted by a non-malicious hacker who found a vulnerability on your website. Here is what you should do in response to such a message to avoid public uncoordinated vulnerability disclosure. #Advisory #Security #VulnerabilityDisclosure acunetix.com/blog/web-secur…
|
||
|
|
||
|
Acunetix
@acunetix
|
27. sij |
|
HTML injections are vulnerabilities that are very similar to Cross-site Scripting (XSS). The delivery mechanisms are exactly the same but the injected content is pure HTML tags, not a script like in the case of XSS. #HTMLinjections #XSS #vulnerabilities acunetix.com/blog/web-secur…
|
||
|
|
||
|
Acunetix
@acunetix
|
24. sij |
|
Acunetix is pleased to announce that they have on boarded their first Advanced Reseller in Malta, VeraCloud. They achieved Advanced Reseller status, meaning they will be enjoying more benefits from the Acunetix partner program. #infosec #security #partner veracloud.eu
|
||
|
|
||
|
Acunetix
@acunetix
|
23. sij |
|
The two primary methods of avoiding Cross-site Scripting (XSS) vulnerabilities are XSS filtering and XSS escaping. However, XSS filtering is not recommended because it can usually be evaded using clever tricks. #XSS #Vulnerabilities #CyberSecurity
acunetix.com/blog/web-secur…
|
||
|
|
||
|
Acunetix
@acunetix
|
21. sij |
|
When you build web apps, you often use multiple back-end web services to interface between client-side and server-side applications. For example, enterprises use functional subdomains to distribute static content or application logic between API requests.
acunetix.com/blog/docs/how-…
|
||
|
|
||
|
Acunetix
@acunetix
|
20. sij |
|
The term "cookie poisoning" is used in different contexts to describe attacks that aim to manipulate, intercept, or forge the content of HTTP cookies. Learn more about types of cookie poisoning and how to prevent it.
#hacking #http #cookie #cybersecurity
bit.ly/2TFfI7h
|
||
|
|
||
|
Acunetix
@acunetix
|
13. sij |
|
Unvalidated redirects and forwards cannot harm your web application but they can harm your reputation by helping attackers lure users to malware sites. #phishing #CyberSecurity #UnvalidatedRedirects acunetix.com/blog/web-secur…
|
||
|
|
||
|
Acunetix
@acunetix
|
9. sij |
|
Acunetix will be exhibiting at the @RSAConference 2020 on February 24–28 in San Francisco. Join us at booth #6365 in the North Expo.
We also invite you to a presentation about the benefits of IAST. #RSAC #security #rsac2020
acunetix.com/blog/events/rs…
|
||
|
|
||
|
Acunetix
@acunetix
|
6. sij |
|
An integer overflow is a type of an arithmetic overflow error when the result of an integer operation does not fit within the allocated memory space. Instead of an error in the program, it usually causes the result to be unexpected. #IntegerOverflow acunetix.com/blog/web-secur…
|
||
|
|
||
|
Acunetix
@acunetix
|
2. sij |
|
Every website and web app can be hacked, given enough time and resources. What makes a web asset hackable is not just vulnerabilities. Read more to learn who may pose a threat to your web assets and why would they attack them. #security #AppSec #WebSec acunetix.com/blog/web-secur…
|
||
|
|
||
|
Acunetix
@acunetix
|
30. pro |
|
The year 2019 has been very exciting for Acunetix with many changes and unprecedented growth. This is a compilation of some of the most popular articles and publications for this year from the Acunetix blog.
#cybersecurity #YearInReview #HappyNewYear
bit.ly/2QwJCra
|
||
|
|
||
|
Acunetix
@acunetix
|
23. pro |
|
We would like to wish you the happiest holidays and all the best in the new year. May your celebrations be safe and secure and may any vulnerabilities in the next year be efficiently discovered.
#happyholidays #infosec #cybersecurity
bit.ly/2Qf2g6v
|
||
|
|
||
|
Acunetix
@acunetix
|
19. pro |
|
In this article, we describe the server-side and the client-side JSON injections.
#JSON #JavaScript #hacking #cybersecurity
bit.ly/38XeoC2
|
||
|
|
||
|
Acunetix
@acunetix
|
16. pro |
|
The lack of cybersecurity talent is a problem that businesses have been facing for several years. Let's have a look at what's causing the skills gap, what can be done about it, & the best ways to effectively combat it.
#cybersecurity #talent #skillsgap
bit.ly/2M0VVdL
|
||
|
|
||
|
Acunetix
@acunetix
|
12. pro |
|
Session fixation is a web attack technique. The attacker tricks the user into using a specific session ID to gain access to the user's account.
#hacking #cybersecurity #appsecurity
bit.ly/36tOPGm
|
||
|
|
||
|
Acunetix
@acunetix
|
9. pro |
|
bit.ly/2RyDCQQ The term Google hacking refers to an attack that uses a search engine like Google to find vulnerable web servers and websites. The Google Hacking Database (GHDB) is a public compendium of Google hacking search terms. #GoogleHacking #GHDB #WebSecurity
|
||
|
|
||
|
Acunetix
@acunetix
|
5. pro |
|
bit.ly/34SkoJM @4lemon and Link found an XSS vulnerability in Google using Acunetix. This article describes, how it was found and confirmed. #XSS #Vulnerability #Google
|
||
|
|
||
|
Acunetix
@acunetix
|
2. pro |
|
bit.ly/2P3deM7 Cross-Frame Scripting is a web attack technique that exploits specific browser bugs to eavesdrop on the user through JavaScript. #XFS #XSS #CyberSecurity
|
||
|
|
||