Monday, December 4, 2023

Automated Web Application Security Tool “Acunetix ” Now Available on macOS & All Major OS

Acunetix, a global leader in automated web application security, is now available on macOS. Customers can now harness the full power of Acunetix using their operating system of choice –– Windows, Linux, macOS, or the cloud.

Over 3,000 companies worldwide trust Acunetix to protect their assets, align with their policies, and integrate with the development lifecycle.

Acunetix brings an extensive feature set of automated penetration testing tools, enabling security analysts to perform a complete vulnerability assessment and repair detected issues.

Acunetix pioneered dynamic application security testing (DAST), was the first business-class web application security scanner on Linux, and is now the first on macOS as well.

“Many businesses select macOS because it is perceived as one of the most user-friendly and secure operating systems,” said Nicholas Sciberras, CTO of Acunetix. “Since most business-class security tools are not available on macOS, administrators have to set up dedicated or virtual machines to run these tools, which is both frustrating and can be a security risk in itself,” he Told GBHackers on Security.

Acunetix customers that use macOS have expressed appreciation for being able to scan natively with Acunetix; they report that it provides a smoother and faster scanning experience and more flexibility for small deployments.

“Acunetix scans on macOS are fast and accurate,” said Ondrej Kelka, IT Security Application & Infrastructure Consulting Expert at T-Mobile. 

“Acunetix is the only web application vulnerability scanner that provides interactive application security testing (IAST) together with out-of-band scanning, malware scanning, and much more,” said Sciberras. “We offer an unparalleled range of capabilities and efficiency coupled with outstanding accuracy and depth of scans,” he said. 

If you’d like to see Acunetix in action on macOS, Windows, Linux, or in the cloud, request a demo.

Website

Latest articles

Hackers Use Weaponized Documents to Attack U.S. Aerospace Industry

An American aerospace company has been the target of a commercial cyberespionage campaign dubbed...

Active Attacks Targeting Google Chrome & ownCloud Flaws: CISA Warns

The CISA announced two known exploited vulnerabilities active attacks targeting Google Chrome & own...

Cactus Ransomware Exploiting Qlik Sense code execution Vulnerability

A new Cactus Ransomware was exploited in the code execution vulnerability to Qlik Sense...

Hackers Bypass Antivirus with ScrubCrypt Tool to Install RedLine Malware

The ScrubCrypt obfuscation tool has been discovered to be utilized in attacks to disseminate the RedLine Stealer...

Hotel’s Booking.com Hacked Logins Let Attacker Steal Guest Credit Cards

According to a recent report by Secureworks, a well-planned and advanced phishing attack was...

Critical Zoom Vulnerability Let Attackers Take Over Meetings

Zoom, the most widely used video conferencing platform has been discovered with a critical...

Hackers Using Weaponized Invoice to Deliver LUMMA Malware

Hackers use weaponized invoices to exploit trust in financial transactions, embedding malware or malicious...
Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

API Attack Simulation Webinar

Live API Attack Simulation

In the upcoming webinar, Karthik Krishnamoorthy, CTO and Vivek Gopalan, VP of Products at Indusface demonstrate how APIs could be hacked.The session will cover:an exploit of OWASP API Top 10 vulnerability, a brute force account take-over (ATO) attack on API, a DDoS attack on an API, how a WAAP could bolster security over an API gateway

Related Articles