Our Blog

Home / Blog

Massively exploited vulnerabilities in MS Exchange Server

Massively exploited vulnerabilities in MS Exchange Server

Attackers exploit four dangerous vulnerabilities in Microsoft Exchange to get a foothold in the corporate network. Microsoft has issued out-of-band patches for several Exchange Server vulnerabilities. Four of these vulnerabilities, according to the company, are...

Understanding Cookie Poisoning Attacks

Understanding Cookie Poisoning Attacks

Cookie poisoning is a general term for various attacks that aim to manipulate or forge HTTP cookies. Depending on the attack, cookie poisoning might lead to session hijacking, exposure of sensitive information, or taking over a victim’s account. Let’s see what attacks...

World Software Giant Selects Acunetix DAST+IAST for SDLC Testing

World Software Giant Selects Acunetix DAST+IAST for SDLC Testing

It is a common myth that early testing in the SDLC should be based on SAST and passive IAST tools. This myth has been repeated often by sources that do not follow the developments of web application security and are unaware of the evolution of DAST and true...

IT Products 

Netsparker logo
Flexera Logo
Acunetix Logo
Forcepoint Logo
Snow Logo
Ivanti Logo
Progress - ipswitch Logo
Titus Logo
Solarwinds Logo
Endpoint Protector Logo
Kaspersky Logo
Hewlett Packard Enterprise logo
Boldonjames Logo
KnowBe4 Logo

OT Products 

Flexera Logo
Ondeso Logo
Forcepoint Logo
Ivanti Logo
Progress - ipswitch Logo
Kaspersky Logo
Splunk Logo
Symantec logo
CertNexus Logo
Tenable Logo
Rapid1 Logo
Nozomi Logo
G Data Software Logo