Netsparker Standard 5.4 – September 2019 Update

Netsparker Standard 5.4 – September 2019 Update

| | update
We’re delighted to announce the release of Netsparker Standard 5.4. The highlights of this release are: Custom Security Checks via a Scripting feature HMAC Authentication Support via a Scripting feature Other new features include Web Cache Deception Security Checks, Manual Authentication and new Send To Actions integrations. Security Checks We ... Read More
September 2019 Update for Netsparker Enterprise

September 2019 Update for Netsparker Enterprise

We're delighted to announce a Netsparker Enterprise update. The highlights in this update are support for internal agents and bulk operations, and new issue tracking integrations and API endpoints. Other updated features in September 2019 for Netsparker Enterprise include support for data exporting, a technical contact change option, a scan ... Read More
Joe Gillespie, Netsparker - ESW #148

Joe Gillespie is Interviewed About Netsparker for Enterprise Security Weekly #148

Joe Gillespie is the Enterprise Account Executive at Netsparker. He was interviewed by hosts Paul Asadoorian, Matt Alderman and Lee Neely live at Black Hat USA 2019, for the second segment of Enterprise Security Weekly #148. They asked Joe about his background and how he started working with Netsparker. Then, ... Read More
What Is the Low Orbit Ion Cannon (LOIC)?

What Is the Low Orbit Ion Cannon (LOIC)?

The Low Orbit Ion Cannon (LOIC) is a network stress testing application created by Praetox Technologies. It is used as an attack tool in DoS/DDoS attacks. LOIC is a Windows application that was written in C# and it is currently available as an open-source project on Sourceforge and other platforms ... Read More
What is a Man-in-the-Middle Attack and How To Avoid It?

What is a Man-in-the-Middle Attack and How To Avoid It?

A man-in-the-middle attack (MiTM) happens when an attacker modifies a connection so that it goes through their computer. They can steal sensitive information and change data on the fly. For example, imagine that someone takes over your connection when you log into your online bank account or when you buy ... Read More
Announcing the Enterprise Web Security Best Practices Whitepaper

Announcing the Enterprise Web Security Best Practices Whitepaper

If your enterprise has a fully-manned web security team, you can consider yourself lucky, at least for now. Cybersecurity Ventures predicts that by 2021, there will be 3.5 million unfilled cybersecurity job positions. To realize how many people this means, imagine the current population of Berlin, the second largest city ... Read More
Netsparker 10th Anniversary Inforgraphic

Celebrating 10 Years of Netsparker

It is hard to believe that Netsparker is ten years old, this month! Back in 2009, Ferruh Mavituna, then a visionary web security researcher, launched into the web application security marketplace with our revolutionary web vulnerability scanner. Since then, we’ve helped hundreds of SMEs and enterprises prevent dangerous security breaches ... Read More
inFactor Scans with Netsparker Following Every Code Deployment

inFactor Scans with Netsparker Following Every Code Deployment

“At inFactor, we believe that our security-focused culture is fundamental in helping protect our platform and customers. Netsparker enables our team to quickly identify vulnerabilities by launching scans after code gets committed. This is vital in helping us ensure we catch vulnerabilities early in our development process.” - Eric Wright, ... Read More
Sven Morgenroth Talks About How Facebook Stored Millions of Passwords in Plain Text on Hack Naked News #212

Sven Morgenroth Talks About How Facebook Stored Millions of Passwords in Plain Text on Hack Naked News #212

Sven Morgenroth, a security researcher at Netsparker, was interviewed by Paul Asadoorian for Hack Naked News #212. Sven talked about the leak that revealed how Facebook had been storing hundreds of millions of users’ passwords in plain text. Even though Facebook have claimed that there’s no proof anyone outside of ... Read More
Announcing the Deobfuscating JavaScript White Paper

Announcing the Deobfuscating JavaScript White Paper

The topic of this white paper is an example of how to deobfuscate JavaScript code as it's often used in phishing pages. Deobfuscation is the process used to convert a program that has deliberately been made difficult to read (‘obfuscated’), into one that is more straightforward and simple to understand ... Read More
Loading...