What Are JSON Injections

What Are JSON Injections

The term JSON injection may be used to describe two primary types of security issues: Server-side JSON injection happens when data from an untrusted source is not sanitized by the server and written directly to a JSON stream.Client-side JSON injection happens when...
4 Ways to Combat the Cybersecurity Skills Gap

4 Ways to Combat the Cybersecurity Skills Gap

The lack of cybersecurity talent is nothing new. It’s a problem that all businesses have been facing for several years and it’s getting worse. There have been many proposals on how to narrow the gap, but so far all efforts have been futile. Let’s have a look at what...
Step-By-Step Configuration with Jira

Step-By-Step Configuration with Jira

Jira is a popular issue tracker platform. Vulnerability management teams may use it to manage tasks together with other departments. You can easily integrate Acunetix with Jira (both the on-premise and online Jira versions).Note: Before you proceed any further, ensure...