Profile cover photo
Profile photo
Netsparker
238 followers -
Dead accurate web application security scanner
Dead accurate web application security scanner

238 followers
About
Posts

Post has attachment
The CEO of Netsparker and Byron Acohido a Pulitzer-winning journalist, discuss the value of automatically eliminating false positives with Proof-Based Scanning. #websecurity #podcast #interview

During The Last Watchdog Podcast, Ferruh Mavituna also explains how Netsparker's ability to scan at scale is ideal for enterprise-level application security.

https://www.netsparker.com/blog/news/netsparker-and-the-digital-transformation-in-security/?utm_source=plus.google.com&utm_medium=social&utm_content=last+watchdog+digital+transformation&utm_campaign=netsparker+social+media
Add a comment...

Post has attachment
Listen to the ITSP magazine interview at the RSA Conference 2018, during which our CEO Ferruh Mavituna discusses how Netsparker Cloud can be integrated with your SDLC and DevOps environments to create a more perfect workflow. #sdlc #automation #appsec

You can also expect to learn how Netsparker has enabled large organisations to have a much lower security cost path.

https://www.netsparker.com/blog/news/netsparker-interview-at-rsa-conference-2018/?utm_source=plus.google.com&utm_medium=social&utm_content=itsp+magazine+interview&utm_campaign=netsparker+social+media
Add a comment...

Post has attachment
osquery Injection is a vulnerability caused by a misuse of the library, just like SQL Injection or Memcache Injection. #osquery #vulnerabilities #Security

For an explanation of how malicious queries can be executed by an attacker, check out the article here:

https://www.netsparker.com/blog/web-security/osquery-injection/?utm_source=plus.google.com&utm_medium=social&utm_content=osquery+injection&utm_campaign=netsparker+social+media
Add a comment...

Post has attachment
Sumeru uses our dead accurate web application vulnerability scanner to scan civilian and government applications built on a variety of web frameworks and running on different types of servers with ease despite the variety. #casestudy #appsec #websecurity

What does your business use to ensure your web applications are secure?

https://www.netsparker.com/blog/news/sumeru-solutions-netsparker-case-study-automation-rapid-configurability/?utm_source=plus.google.com&utm_medium=social&utm_content=sumeru+case+study&utm_campaign=netsparker+social+media
Add a comment...

Post has attachment
We're excited to be at the Black Hat USA Conference in Las Vegas, from the 8th of August to the 9th of August 2018. #BHUSA #Security #websec

Come and learn about our market leading web application security scanner. We will be at booth #1171. Follow the link below for more information:

https://www.netsparker.com/blog/events/exhibiting-black-hat-usa-2018/?utm_source=plus.google.com&utm_medium=social&utm_content=black+hat+2018&utm_campaign=netsparker+social+media
Add a comment...

Post has attachment
Server-Side Template Injection (SSTI) is an attack that allows attackers to execute arbitrary server-side functions. #ssti #vulnerabilities #Security

For the methods developers can use to prevent such attacks, check out the article here:

https://www.netsparker.com/blog/web-security/server-side-template-injection/?utm_source=plus.google.com&utm_medium=social&utm_content=server+side+template+injection&utm_campaign=netsparker+social+media
Add a comment...

Post has attachment
Our security researcher gives a detailed account of how he found an Authentication Bypass Vulnerability in CMS Made Simple. #Security #CyberSecurity #bestpractice

How was one missing character sufficient to result in an Authentication Bypass, and ultimately Remote Code Execution (RCE)?

https://www.netsparker.com/blog/web-security/type-juggling-authentication-bypass-cms-made-simple/?utm_source=plus.google.com&utm_medium=social&utm_content=authentication+bypass+cms+made+simple&utm_campaign=netsparker+social+media
Add a comment...

Post has attachment
Add a comment...

Post has attachment
Add a comment...

Post has attachment
Sumeru chose Netsparker because it automatically verifies and identifies vulnerabilities, saving time and resources that would otherwise be spent performing manual testing. #casestudy #webapp #automation

Once Netsparker was used the lead pen tester stated: “Netsparker is our tool of choice for scanning large web applications and it’s great at finding SQL Injection vulnerabilities.”

https://www.netsparker.com/blog/news/sumeru-solutions-netsparker-case-study-automation-rapid-configurability/?utm_source=plus.google.com&utm_medium=social&utm_content=sumeru+case+study&utm_campaign=netsparker+social+media
Add a comment...
Wait while more posts are being loaded