Download Netsparker
Pricing
Blog
Contact
Netsparker

Using the Same-Site Cookie Attribute to Prevent CSRF Attacks

Category: Web Security Readings - Tags: same site cookie attribute , csrf , web security reading - Tue, 23 Aug 2016, by Ziyahan Albeniz
This article looks into the details of how the Same-Site cookie attribute works and how it can be used to help prevent malicious cross-site request forgery (CSRF) attacks. Read more...

Subresource Integrity (SRI) for Validating Web Resources Hosted on Third Party Services (CDNs)

Category: Web Security Readings - Tags: web security reading , subresource integrity , sri , cdn - Wed, 29 Jun 2016, by Robert Abela
This article explains what is Subresource Integrity (SRI), how it works and how it helps web application developers ensure a more secure web environment especially when hosting resources on third party servers and services such as Content Delivery Networks (CDNs). Read more...

Tailoring the Web Security Scan Reports to Match Your Organization's Security Policies

This article explains how you can use the Report Policy Editor in Netsparker Desktop to customize the scanner's scan results and reports so they match your organization's security policies. Read more...

Web Application Security Basics - Keeping All Your Software Up To Date

Category: Web Security Readings - Tags: old vulnerable software , keeping software up to date , web security basics - Tue, 19 Apr 2016, by Robert Abela
What can we learn from the Mossack Fonseca hack and the Panama Papers leak? This article highlights the repercussions of ignoring one of the most basic concepts of IT and web application security; not updating your software. Read more...

SQL Injection Cheat Sheet

Category: Web Security Readings - Tags: sql injection , cheat sheet , web security - Thu, 17 Mar 2016, by Ferruh Mavituna
Use our SQL Injection Cheat Sheet to learn about the different variants of the SQL Injection vulnerability. In this cheat sheet you can find detailed technical information about SQL Injection vulnerabilities against MySQL, Microsoft SQL Server, Oracle and PostgreSQL SQL servers. Read more...

Automate More of the Web Application Security Scanning with the New Netsparker Scanners

Category: News - Tags: netsparker press release , web security automation , url rewrite rules , scan policy optimizer - Tue, 19 Jan 2016, by Robert Abela
Announcing the new version of Netsparker Desktop and a new update for Netsparker Cloud. Introducing more automation of the pre-scan process allowing users to easily launch web security scans against hundreds and thousands of websites within just a few minutes. Read more...

Latest Report Points to a 45% Increase in Web Application Attacks

Category: News - Tags: web security news , report - Fri, 27 Nov 2015, by Graham Crawford
The Cloud Security Report 2015 Alert Logic released highlight a 45% increase of attacks on cloud-based web applications. Read this post for more information and statistics. Read more...

Security Weekly and Ferruh Mavituna Talk Automation and Scaling Up Web Application Security

Category: Web Security Readings - Tags: web application security , web security automation , sdlc , scaling up , security weekly , interview - Mon, 23 Nov 2015, by Robert Abela
During episode #442 of Security Weekly, Ferruh Mavituna, Paul Asadoorian, Jeffrey Man and several other web security professionals talk about the challenges of automating web application security and how companies can scale up automated web application security scanning and scan 100s and 1000s of web applications with the least possible resources. Read more...

Understanding the Differences Between Technical and Logical Web Application Vulnerabilities

Web application vulnerabilities can be split within two categories; logical and technical vulnerabilities. This post explains the main differences between these two different vulnerability categories. Read more...

Automatic Configuration of URL Rewrite Rules in Netsparker Web Application Security Scanners

URL rewrite rules are typically difficult to configure and unless configured properly, the target web application is not scanned properly and not all vulnerabilities are detected. With Netsparker web application security scanners you do not need to manually configure URL rewrite rules since the process is all automated. Read more...

Follow us