Thursday, February 27, 2025
HomeCVE/vulnerabilityAutomated Web Application Security Tool "Acunetix " Now Available on macOS ...

Automated Web Application Security Tool “Acunetix ” Now Available on macOS & All Major OS

Published on

SIEM as a Service

Follow Us on Google News

Acunetix, a global leader in automated web application security, is now available on macOS. Customers can now harness the full power of Acunetix using their operating system of choice –– Windows, Linux, macOS, or the cloud.

Over 3,000 companies worldwide trust Acunetix to protect their assets, align with their policies, and integrate with the development lifecycle.

Acunetix brings an extensive feature set of automated penetration testing tools, enabling security analysts to perform a complete vulnerability assessment and repair detected issues.

Acunetix pioneered dynamic application security testing (DAST), was the first business-class web application security scanner on Linux, and is now the first on macOS as well.

“Many businesses select macOS because it is perceived as one of the most user-friendly and secure operating systems,” said Nicholas Sciberras, CTO of Acunetix. “Since most business-class security tools are not available on macOS, administrators have to set up dedicated or virtual machines to run these tools, which is both frustrating and can be a security risk in itself,” he Told GBHackers on Security.

Acunetix customers that use macOS have expressed appreciation for being able to scan natively with Acunetix; they report that it provides a smoother and faster scanning experience and more flexibility for small deployments.

“Acunetix scans on macOS are fast and accurate,” said Ondrej Kelka, IT Security Application & Infrastructure Consulting Expert at T-Mobile. 

“Acunetix is the only web application vulnerability scanner that provides interactive application security testing (IAST) together with out-of-band scanning, malware scanning, and much more,” said Sciberras. “We offer an unparalleled range of capabilities and efficiency coupled with outstanding accuracy and depth of scans,” he said. 

If you’d like to see Acunetix in action on macOS, Windows, Linux, or in the cloud, request a demo.

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Lotus Blossom Hacker Group Uses Dropbox, Twitter, and Zimbra for C2 Communications

The Lotus Blossom hacker group, also known as Spring Dragon, Billbug, or Thrip, has...

Squidoor: Multi-Vector Malware Exploiting Outlook API, DNS & ICMP Tunneling for C2

A newly identified malware, dubbed "Squidoor," has emerged as a sophisticated threat targeting government,...

Unpatched Vulnerabilities Attract Cybercriminals as EDR Visibility Remains Limited

Cyber adversaries have evolved into highly organized and professional entities, mirroring the operational efficiency...

Threat Actors Attack Job Seekers of Fortune 500 Companies to Steal Personal Details

In Q3 2024, Cofense Intelligence uncovered a targeted spear-phishing campaign aimed at employees working...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Lotus Blossom Hacker Group Uses Dropbox, Twitter, and Zimbra for C2 Communications

The Lotus Blossom hacker group, also known as Spring Dragon, Billbug, or Thrip, has...

Squidoor: Multi-Vector Malware Exploiting Outlook API, DNS & ICMP Tunneling for C2

A newly identified malware, dubbed "Squidoor," has emerged as a sophisticated threat targeting government,...

Unpatched Vulnerabilities Attract Cybercriminals as EDR Visibility Remains Limited

Cyber adversaries have evolved into highly organized and professional entities, mirroring the operational efficiency...