What Is SEO Poisoning (Search Engine Poisoning)

What Is SEO Poisoning (Search Engine Poisoning)

Search engine optimization poisoning (SEO poisoning) is a term used to describe two types of activities: Illegitimate techniques used to achieve high search engine ranking, usually (but not only) to attack visitorsExploiting vulnerabilities on existing high-ranking...
Whitepaper: The Future Is the Web! How to Keep It Secure?

Whitepaper: The Future Is the Web! How to Keep It Secure?

The web is everywhere and it’s not an exaggeration. More and more application manufacturers move from dedicated desktop interfaces to web interfaces. You are probably using a web-based email system. Chances are that you are creating your documents using a web...
New build adds ability to scan for latest vulnerabilities, ad-blocking, session headers, and new vulnerability checks

New build adds ability to scan for latest vulnerabilities, ad-blocking, session headers, and new vulnerability checks

Acunetix version 12 (build 12.0.190927120) has been released. This new build introduces a number of updates including ad-blocking in the scanner resulting in faster scans, support for Session HTTP headers, the ability to run scans for vulnerabilities introduced...
Cybersecurity Trends 2019 – Web Security

Cybersecurity Trends 2019 – Web Security

The year 2019 so far has seen its share of major security and data breaches. Unsurprisingly, they were not caused by new cybercriminal techniques but by the same ones that have plagued information security for up to two decades. Social engineering and cyberattacks on...
Is Your Website Hackable? 70% are. Detect and act with Acunetix:Red Team vs. Blue Team Exercises for Web Security

Is Your Website Hackable? 70% are. Detect and act with Acunetix:Red Team vs. Blue Team Exercises for Web Security

One of the best ways to verify the security posture of a business is to perform a mock attack. This principle is behind the concept of penetration testing (manual mock attack) and vulnerability scanning (automatic mock attack). While penetration tests and...