What is HTTP header injection

What is HTTP header injection

The HTTP header injection vulnerability is a web application security term that refers to a situation when the attacker tricks the web application into inserting extra HTTP headers into legitimate HTTP responses. HTTP header injection is a technique that can be used to facilitate malicious... Read more The post What ... Read More
Web Security Basics: Is Your Web Application Safe?

Web Security Basics: Is Your Web Application Safe?

In our old advertisements, you could often read that 70 percent of websites are hackable. The sad truth is, however, that every website and web application can be hacked, given enough time and resources. What makes a website or web application fall within the 70 percent... Read more The post Web ... Read More
Choosing the web application security solution that is right for you

Choosing the web application security solution that is right for you

Do you have a headache trying to choose the right web application security solution? Well, we sure hope it’s Acunetix, but it might not be! We won’t try to convince you that we are the one – that would be unprofessional because we know nothing... Read more The post Choosing ... Read More
Is it good? Ask the developer!

Is it good? Ask the developer!

We’re so used to the image of the “security guy” who takes care of all the cybersecurity needs in the company that it keeps security siloed and makes progress impossible. We have to get rid of that image and realize that in some cases, notably... Read more The post Is ... Read More
7 web application security best practices

7 web application security best practices

To maintain the best possible security posture and protect your sensitive data against cyberattacks, you cannot just rely on security products alone. Here is a list of seven key elements that we believe should be considered in your web app security strategy. 1. Include everyone in security... Read more The post 7 ... Read More
DIY security – are you doing it right?

DIY security – are you doing it right?

There is no tool in the world that can fully replace a human when it comes to finding web vulnerabilities. A skilled security researcher is always able to find more than an automated scanner. There is just one problem. With a ratio of thousands of... Read more The post DIY ... Read More
Cybersecurity metrics for web applications

Cybersecurity metrics for web applications

Small and mid-sized businesses are able to manage their information security, including web application security, in a very direct fashion. The numbers of assets, vulnerabilities, and incidents are low enough for the security manager to be able to have a clear view of IT security... Read more The post Cybersecurity ... Read More
What is SCA and why you need it

What is SCA and why you need it

The security of your business depends not just on your code but on the entire supply chain, which includes third-party components. The more third-party components you use, the more likely it is that a vulnerability in your web application will be a result of third-party... Read more The post What ... Read More
Do you want your security to be built on excuses?

Do you want your security to be built on excuses?

Opinion: Do you leave your car keys in the ignition just because it’s easier than securing your vehicle? If not, why do you come up with similar excuses when making decisions about the security of your sensitive data and your business reputation? In the cybersecurity... Read more The post Do ... Read More
The effect of President Biden’s security order on web application vendors

The effect of President Biden’s security order on web application vendors

Do you want to sell your web applications to US government agencies? We have bad news and good news. The bad news is: President Biden just made it more difficult for you. The good news is: Acunetix® can make it much easier. The SolarWinds breach... Read more The post The ... Read More