AcunetixOvjeren akaunt

@acunetix

The official Twitter page for Acunetix, a global leader in web security, and your source for ensuring the security of your online assets.

Worldwide
Vrijeme pridruživanja: svibanj 2009.

Tweetovi

Blokirali ste korisnika/cu @acunetix

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @acunetix

  1. All web application security issues are introduced by developers. Therefore, the best approach to building secure software is to do all that is possible to avoid introducing such errors in the first place instead of fixing them.

    Poništi
  2. 30. sij

    Your company may be contacted by a non-malicious hacker who found a vulnerability on your website. Here is what you should do in response to such a message to avoid public uncoordinated vulnerability disclosure.

    Poništi
  3. 27. sij

    HTML injections are vulnerabilities that are very similar to Cross-site Scripting (XSS). The delivery mechanisms are exactly the same but the injected content is pure HTML tags, not a script like in the case of XSS.

    Poništi
  4. 24. sij

    Acunetix is pleased to announce that they have on boarded their first Advanced Reseller in Malta, VeraCloud. They achieved Advanced Reseller status, meaning they will be enjoying more benefits from the Acunetix partner program.

    Poništi
  5. 23. sij

    The two primary methods of avoiding Cross-site Scripting (XSS) vulnerabilities are XSS filtering and XSS escaping. However, XSS filtering is not recommended because it can usually be evaded using clever tricks.

    Poništi
  6. 21. sij

    When you build web apps, you often use multiple back-end web services to interface between client-side and server-side applications. For example, enterprises use functional subdomains to distribute static content or application logic between API requests.

    Poništi
  7. 20. sij

    The term "cookie poisoning" is used in different contexts to describe attacks that aim to manipulate, intercept, or forge the content of HTTP cookies. Learn more about types of cookie poisoning and how to prevent it.

    Poništi
  8. 13. sij

    Unvalidated redirects and forwards cannot harm your web application but they can harm your reputation by helping attackers lure users to malware sites.

    Poništi
  9. 9. sij

    Acunetix will be exhibiting at the 2020 on February 24–28 in San Francisco. Join us at booth #6365 in the North Expo. We also invite you to a presentation about the benefits of IAST.

    Poništi
  10. 6. sij

    An integer overflow is a type of an arithmetic overflow error when the result of an integer operation does not fit within the allocated memory space. Instead of an error in the program, it usually causes the result to be unexpected.

    Poništi
  11. 2. sij

    Every website and web app can be hacked, given enough time and resources. What makes a web asset hackable is not just vulnerabilities. Read more to learn who may pose a threat to your web assets and why would they attack them.

    Poništi
  12. 30. pro 2019.

    The year 2019 has been very exciting for Acunetix with many changes and unprecedented growth. This is a compilation of some of the most popular articles and publications for this year from the Acunetix blog.

    Poništi
  13. 23. pro 2019.

    We would like to wish you the happiest holidays and all the best in the new year. May your celebrations be safe and secure and may any vulnerabilities in the next year be efficiently discovered.

    Poništi
  14. 19. pro 2019.

    In this article, we describe the server-side and the client-side JSON injections.

    Poništi
  15. 16. pro 2019.

    The lack of cybersecurity talent is a problem that businesses have been facing for several years. Let's have a look at what's causing the skills gap, what can be done about it, & the best ways to effectively combat it.

    Poništi
  16. 12. pro 2019.

    Session fixation is a web attack technique. The attacker tricks the user into using a specific session ID to gain access to the user's account.

    Poništi
  17. 9. pro 2019.

    The term Google hacking refers to an attack that uses a search engine like Google to find vulnerable web servers and websites. The Google Hacking Database (GHDB) is a public compendium of Google hacking search terms.

    Poništi
  18. 5. pro 2019.

    and Link found an XSS vulnerability in Google using Acunetix. This article describes, how it was found and confirmed.

    Poništi
  19. 2. pro 2019.

    Cross-Frame Scripting is a web attack technique that exploits specific browser bugs to eavesdrop on the user through JavaScript.

    Poništi
  20. 28. stu 2019.

    In the last few months, our partnership program has been restructured and we have created a dedicated channel team, which resulted in rapid growth – in 2019, the number of our partners has grown by nearly 50 percent.

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·