articles

Tornados, Necessity, and the Evolution of Mitigating Controls

According to the National Oceanic and Atmospheric Administration (NOAA), a tornado (also called a twister, whirlwind, or cyclone) is a…

1 year ago

What Is SEO Poisoning (Search Engine Poisoning)

Search engine optimization poisoning (SEO poisoning) is a term used to describe two types of activities: Illegitimate techniques used to…

1 year ago

Common Password Vulnerabilities and How to Avoid Them

Weak passwords and password reuse are still some of the most serious concerns for cybersecurity. There are several ways to…

1 year ago

How To Build a Cyber Incident Response Plan

No matter how well you manage your cybersecurity, there is always a chance that you will become a victim of…

1 year ago

What Is DNS Cache Poisoning

DNS cache poisoning is a type of DNS spoofing attack where the attacker stores fake data in a DNS resolver…

1 year ago

How to Use Excluded Hours

Acunetix provides additional functionality for managing your scans. You may encounter a situation, where scans should not interfere with scheduled…

1 year ago

HTTP Security: A Security-Focused Introduction to HTTP

HTTP is a ubiquitous protocol and is one of the cornerstones of the web. If you are a newcomer to…

1 year ago

Cybersecurity Trends 2019 – Web Security

The year 2019 so far has seen its share of major security and data breaches. Unsurprisingly, they were not caused…

1 year ago

Data Breaches Due to Exposed Databases

The recent massive breach of sensitive Ecuador population data is yet another case, where there was no actual hack involved.…

1 year ago

Using Logs to Investigate – SQL Injection Attack Example

A log file is an extremely valuable piece of information that is provided by a server. Almost all servers, services,…

1 year ago