Four ways to combat the cybersecurity skills gap

Four ways to combat the cybersecurity skills gap

The lack of cybersecurity talent is nothing new. It’s a problem that all businesses have been facing for several years and it’s getting worse. There have been many proposals on how to narrow the gap, but so far all efforts have been futile. Let’s have... Read more The post Four ... Read More
Critical alert – Spring4Shell RCE (CVE-2022-22965 in Spring)

Critical alert – Spring4Shell RCE (CVE-2022-22965 in Spring)

On March 31, 2022, a serious zero-day vulnerability was discovered in the Spring framework core, which is an open-source framework for building enterprise Java applications. The vulnerability, dubbed Spring4Shell (similar to Log4Shell) or Springshell, was identified as CVE-2022-22965 (at the time of writing, not yet... Read more The post Critical ... Read More
DevSecOps vs. SecDevOps

DevSecOps vs. SecDevOps

DevSecOps is a relatively new approach to continuous software development processes in agile environments. It is an extension of DevOps (Development + Operations) that includes the automation of security. The order of component terms in the DevSecOps name, however, may lead to incorrect application security approaches. That... Read more The post DevSecOps ... Read More
7 reasons why development teams skip security steps

7 reasons why development teams skip security steps

The Fall 2021 Invicti AppSec Indicator has made us aware of an incredibly high percentage of development teams that have admitted to skipping security steps. There is a 70% chance that this happens in your business, leaving your web applications exposed to malicious hacker attacks.... Read more The post 7 ... Read More
2021 – the year in review

2021 – the year in review

As 2021 comes to an end, it is time to sum up the year to see what it meant for Acunetix, Invicti, and the web application security industry. The rise of Invicti 2021 was the year when Acunetix became a brand of Invicti Security. The... Read more The post 2021 ... Read More
Critical alert – Log4Shell (CVE-2021-44228 in Log4j) – possibly the biggest impact vulnerability ever

Critical alert – Log4Shell (CVE-2021-44228 in Log4j) – possibly the biggest impact vulnerability ever

On December 10, 2021, a serious vulnerability was discovered in the Apache Log4j framework, which is commonly used by most Java installations. The vulnerability, dubbed Log4Shell or LogJam, was identified in the NVD as CVE-2021-44228 and, to quote one of Acunetix original creators and primary... Read more The post Critical ... Read More
The false sense of security in the cloud

The false sense of security in the cloud

Businesses like yours have different reasons to move to the cloud. Some do it primarily to save on hardware. Others go further and outsource services to reduce the need for their own resources. Those who want to outsource administration and related services often believe that... Read more The post The ... Read More
Secure coding practices – the three key principles

Secure coding practices – the three key principles

All security vulnerabilities are the result of human error. Most web application vulnerabilities and API security issues are introduced by developers. Therefore, the best approach to building secure applications is to do all that is possible to avoid introducing such errors in the first place instead of... Read more The post Secure ... Read More
Code security is not enough!

Code security is not enough!

Recently, I came across an article that referred to web application security as code security and I hope it was just a slip of the tongue. If you really think web application security is the same as code security, you are leaving a gaping hole... Read more The post Code ... Read More
You are the only one who can secure and protect your web applications

You are the only one who can secure and protect your web applications

Security-related vocabulary includes a lot of words with imprecise meanings. Two such terms that give me a headache when used in the web application security context are the verbs to secure and to protect. But this headache is nothing compared to the one I get... Read more The post You ... Read More