Integrating Netsparker in Your Vulnerability Management Solution

Category: Product Docs & FAQS - Last Updated: Tue, 23 May 2017 - by Robert Abela

Many security professionals use vulnerability management solutions to centralize all the reports generated by automated security tools, hence allowing them to get a better overview of the security state of every component in the IT infrastructure. Netsparker web security scan results can be imported in a number of vulnerability management solutions as explained in this article. Read More

POODLE SSL Vulnerability - The End of Life for SSL 3.0

Category: Releases - Last Updated: Wed, 01 Mar 2017 - by Robert Abela

The newly discovered POODLE SSL vulnerability enables attackers to capture and read traffic encrypted using the SSL 3.0 protocol, which even though is fifteen years old the protocol is still widely supported for backward compatibility. Scan your web servers with Netsparker to check if they are vulnerable to the POODLE SSL vulnerability. Read More

Shellshock Bash Remote Code Execution Vulnerability Explained and How to Detect It

Category: Web Security Readings - Last Updated: Thu, 09 Nov 2017 - by Robert Abela

The Shellshock Bash vulnerability allows an attacker to send operating system commands to the web server operating system, thus allowing the attacker to take over the server. This web security article explains what is the Shellshock vulnerability and how you can automatically check if your web environment is vulnerable to this critical vulnerability. Read More

URL Rewrite Rules and Web Vulnerability Scanners

Category: Web Security Readings - Last Updated: Tue, 23 May 2017 - by Robert Abela

URL Rewrite Rules have become extremely popular in web applications but many web vulnerability scanners fall short of automatically scan such websites. Read this article to learn more on why typical web vulnerability scanners are unable to scan websites which use URL rewrite rules and what Netsparker did to allow users to easily and automatically scan websites with URL rewrite technology enabled. Read More

Netsparker Scan Policies Feature Highlight Video

Category: Product Docs & FAQS - Last Updated: Tue, 23 May 2017 - by Robert Abela

Scan policies in Netsparker allow you to save a specific Netsparker configuration setup so you do not have to configure the scanner each time you scan a different web application, thus saving a lot of time and improving your productivity. By using Scan Policies you can also specify which type of vulnerability checks should be launched during an automated web vulnerability scan. Read More

What Can We Learn from Ebay Hack Attack?

Category: Web Security Readings - Last Updated: Thu, 22 May 2014 - by Robert Abela

ebay just confirmed that one of its services has been hacked and malicious hackers managed to get their hands on a database that contain sensitive user information such as usernames and passwords. Could such attack have been avoided? This article explains what happened and highlights a number of web security best practices to avoid having your websites and web applications hacked. Read More