Tuesday, April 15, 2025
HomeCVE/vulnerabilityAutomated Web Application Security Tool "Acunetix " Now Available on macOS ...

Automated Web Application Security Tool “Acunetix ” Now Available on macOS & All Major OS

Published on

SIEM as a Service

Follow Us on Google News

Acunetix, a global leader in automated web application security, is now available on macOS. Customers can now harness the full power of Acunetix using their operating system of choice –– Windows, Linux, macOS, or the cloud.

Over 3,000 companies worldwide trust Acunetix to protect their assets, align with their policies, and integrate with the development lifecycle.

Acunetix brings an extensive feature set of automated penetration testing tools, enabling security analysts to perform a complete vulnerability assessment and repair detected issues.

- Advertisement - Google News

Acunetix pioneered dynamic application security testing (DAST), was the first business-class web application security scanner on Linux, and is now the first on macOS as well.

“Many businesses select macOS because it is perceived as one of the most user-friendly and secure operating systems,” said Nicholas Sciberras, CTO of Acunetix. “Since most business-class security tools are not available on macOS, administrators have to set up dedicated or virtual machines to run these tools, which is both frustrating and can be a security risk in itself,” he Told GBHackers on Security.

Acunetix customers that use macOS have expressed appreciation for being able to scan natively with Acunetix; they report that it provides a smoother and faster scanning experience and more flexibility for small deployments.

“Acunetix scans on macOS are fast and accurate,” said Ondrej Kelka, IT Security Application & Infrastructure Consulting Expert at T-Mobile. 

“Acunetix is the only web application vulnerability scanner that provides interactive application security testing (IAST) together with out-of-band scanning, malware scanning, and much more,” said Sciberras. “We offer an unparalleled range of capabilities and efficiency coupled with outstanding accuracy and depth of scans,” he said. 

If you’d like to see Acunetix in action on macOS, Windows, Linux, or in the cloud, request a demo.

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Microsoft Teams File Sharing Unavailable Due to Unexpected Outage

Microsoft Teams users across the globe are experiencing significant disruptions in file-sharing capabilities due...

Cloud Misconfigurations – A Leading Cause of Data Breaches

Cloud computing has transformed the way organizations operate, offering unprecedented scalability, flexibility, and cost...

Security Awareness Metrics That Matter to the CISO

Security awareness has become a critical component of organizational defense strategies, particularly as companies...

New ‘Waiting Thread Hijacking’ Malware Technique Evades Modern Security Measures

Security researchers have unveiled a new malware process injection technique dubbed "Waiting Thread Hijacking"...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Cloud Misconfigurations – A Leading Cause of Data Breaches

Cloud computing has transformed the way organizations operate, offering unprecedented scalability, flexibility, and cost...

Security Awareness Metrics That Matter to the CISO

Security awareness has become a critical component of organizational defense strategies, particularly as companies...

New ‘Waiting Thread Hijacking’ Malware Technique Evades Modern Security Measures

Security researchers have unveiled a new malware process injection technique dubbed "Waiting Thread Hijacking"...