Scanning a REST API for Vulnerabilities

Scanning a REST API for Vulnerabilities

Many complex web applications are built using REST APIs. Acunetix can help you ensure the security of all your REST APIs just as effectively as in the case of monolithic web applications and websites. In this article, you will learn how to discover and fix... Read more The post Scanning ... Read More
Scanning a SOAP Web Service for Vulnerabilities

Scanning a SOAP Web Service for Vulnerabilities

APIs and web services may seem less popular than websites and web applications but that is not true. Already back in 2018, APIs were responsible for 83% of web traffic worldwide. Most complex applications are based on microservices and microservices are basically web applications communicating... Read more The post Scanning ... Read More
Using Python to Make API Calls to Your Acunetix Installation

Using Python to Make API Calls to Your Acunetix Installation

In addition to several out-of-the-box integrations, Acunetix provides an API, which lets you integrate the scanner with any environment. The Acunetix API lets you use any of the scanner functions with no need to access the scanner UI. As an example, we will show you... Read more The post Using ... Read More
Step-By-Step Configuration with Jira

Step-By-Step Configuration with Jira

You can manage web vulnerabilities internally with Acunetix. However, these vulnerabilities will need to be fixed by developers and the developers may already use an issue management system. Therefore, managing them internally might not be an optimal choice. In such a case, your vulnerability scanner... Read more The post Step-By-Step ... Read More
Tracking a Vulnerability from Detection to Resolution

Tracking a Vulnerability from Detection to Resolution

Acunetix is not just a web vulnerability scanner, it is a full vulnerability management solution. In this article, we want to show you the entire process of finding a vulnerability and then fixing it. You will see how features of Acunetix make this process much... Read more The post Tracking ... Read More
Scanning an Application in Docker Using AcuSensor for Java

Scanning an Application in Docker Using AcuSensor for Java

The following article shows you how you can run a Java application in a Docker container and then use AcuSensor to run an interactive application security testing (IAST) scan for that application. Step 1: Prepare an Example Application Using Eclipse IDE Go to the menu... Read more The post Scanning ... Read More
How to Use the Acunetix Business Logic Recorder

How to Use the Acunetix Business Logic Recorder

The Business Logic Recorder is a new and unique Acunetix feature that lets you test more web applications without extensive manual work or additional non-automated tools. Most automated web vulnerability scanners do not have any mechanisms that let you test applications with complex business logic.... Read more The post How ... Read More

How to Recover from a Hacked Website Event

Any fellow webmaster you may ask who is beyond the novice stage will agree that one of his top priorities will always be keeping his websites secure. However, the number of exploits and tools available to hackers are so vast, and software technologies evolving so rapidly, that it is very ... Read More
Loading...