AcunetixOvjeren akaunt

@acunetix

The official Twitter page for Acunetix, a global leader in web application security, and your source for ensuring the security of your web assets.

Worldwide
Vrijeme pridruživanja: svibanj 2009.

Medijski sadržaj

  1. 27. stu 2019.

    Acunetix will be exhibiting at one of the biggest global iGaming events in the world, Europe, on Nov 27-29, 2019. Join us at the Malta Fairs and Conventions Centre, booth B20, for the latest in web application security!

  2. 15. stu 2019.

    We are excited to announce the launch of our partnership with Newtech today at The Quarter Deck, Hilton.

  3. 14. stu 2019.

    Acunetix is co-exhibiting with our partners at in Sweden. Join us today at our booth to talk about how Acunetix 360 can improve web security in your organization.

  4. 12. ruj 2019.

    Join us at booth S8 at 2019.

  5. 15. srp 2019.

    The High Orbit Ion Cannon (HOIC) is an open source network stress testing application. It is most often used by hacktivists as an attack tool for denial of service (DoS) and distributed denial of service attacks.

  6. 11. srp 2019.

    The Login Sequence Recorder in Acunetix supports converting Selenium Login Scripts into Login Sequence Files, which can then be used within Acunetix. The login actions are taken from the Selenium script.

  7. 9. srp 2019.

    Mozilla, Google, and Cloudflare, are securing the DNS protocol for browser users. However, the DoH standard will make it difficult to supervise the domains that users connect to. What are your thoughts and feelings about DoH?

  8. 9. srp 2019.
  9. 3. srp 2019.

    ORVIBO, a Chinese manufacturer of smart home devices, left a database, containing more than 2 billion user records, unprotected and accessible online through a web interface with no authentication.

  10. 2. srp 2019.
  11. 1. srp 2019.

    OS command injection is a type of injection vulnerability. The payload injected by the attacker is executed as operating system commands.

  12. 28. lip 2019.

    Learn how Email Header Injection or SMTP Header Injection can be exploited by spammers to send email anonymously, and how to detect it automatically.

  13. 25. lip 2019.
  14. 24. lip 2019.

    Current Cybersecurity Market Strong: What’s Driving It?

  15. 20. lip 2019.

    Vulnerabilities in REST APIs expose the same risks as websites, however, it can be challenging for automated web scanners to perform REST API security testing.

  16. 19. lip 2019.

    We compiled a Top-10 list of web applications that were intentionally made vulnerable to Cross-site Scripting (XSS). They were created so that you can learn in practice how attackers exploit vulnerabilities by testing your own malicious code.

  17. 17. lip 2019.

    A buffer overflow vulnerability occurs when you give a program too much data. The excess data corrupts nearby space in memory and may alter other data. As a result, the program might report an error or behave differently.

  18. 13. lip 2019.

    Researchers from Alert Logic found an authentication bypass vulnerability in the WP Live Chat for WordPress plugin. This vulnerability may be used by an attacker to exfiltrate chat logs and manipulate chat sessions.

  19. 11. lip 2019.
  20. 10. lip 2019.

    A Slow HTTP DoS Attack takes advantage of a vulnerability in thread-based web servers which wait for entire HTTP headers to be received before releasing the connection.

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·