Our Blog
Home / Blog

Massively exploited vulnerabilities in MS Exchange Server
Attackers exploit four dangerous vulnerabilities in Microsoft Exchange to get a foothold in the corporate network. Microsoft has issued out-of-band patches for several Exchange Server vulnerabilities. Four of these vulnerabilities, according to the company, are...

Business applications enhancements, CRE improvements, and more in V16.23.00
Update Overview As part of Device42’s ongoing enhancement of its application dependency mapping functionality, v16.23.00 now includes the ability to create Business Applications directly from multiple devices, view application components that are associated with...

You can’t manage tomorrow’s IT ecosystem with yesterday’s tools
We all know that CIOs and the IT executives who work for them are accustomed to making the impossible happen. But the current trends in IT spend and usage are requiring these leaders to work mathematical miracles that redefine...

Understanding Cookie Poisoning Attacks
Cookie poisoning is a general term for various attacks that aim to manipulate or forge HTTP cookies. Depending on the attack, cookie poisoning might lead to session hijacking, exposure of sensitive information, or taking over a victim’s account. Let’s see what attacks...

World Software Giant Selects Acunetix DAST+IAST for SDLC Testing
It is a common myth that early testing in the SDLC should be based on SAST and passive IAST tools. This myth has been repeated often by sources that do not follow the developments of web application security and are unaware of the evolution of DAST and true...