Automated Web Application Security Tool “Acunetix ” Now Available on macOS & All Major OS

Acunetix, a global leader in automated web application security, is now available on macOS. Customers can now harness the full power of Acunetix using their operating system of choice –– Windows, Linux, macOS, or the cloud.

Over 3,000 companies worldwide trust Acunetix to protect their assets, align with their policies, and integrate with the development lifecycle.

Acunetix brings an extensive feature set of automated penetration testing tools, enabling security analysts to perform a complete vulnerability assessment and repair detected issues.

Acunetix pioneered dynamic application security testing (DAST), was the first business-class web application security scanner on Linux, and is now the first on macOS as well.

“Many businesses select macOS because it is perceived as one of the most user-friendly and secure operating systems,” said Nicholas Sciberras, CTO of Acunetix. “Since most business-class security tools are not available on macOS, administrators have to set up dedicated or virtual machines to run these tools, which is both frustrating and can be a security risk in itself,” he Told GBHackers on Security.

Acunetix customers that use macOS have expressed appreciation for being able to scan natively with Acunetix; they report that it provides a smoother and faster scanning experience and more flexibility for small deployments.

“Acunetix scans on macOS are fast and accurate,” said Ondrej Kelka, IT Security Application & Infrastructure Consulting Expert at T-Mobile. 

“Acunetix is the only web application vulnerability scanner that provides interactive application security testing (IAST) together with out-of-band scanning, malware scanning, and much more,” said Sciberras. “We offer an unparalleled range of capabilities and efficiency coupled with outstanding accuracy and depth of scans,” he said. 

If you’d like to see Acunetix in action on macOS, Windows, Linux, or in the cloud, request a demo.

Balaji

BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Recent Posts

Lotus Blossom Hacker Group Uses Dropbox, Twitter, and Zimbra for C2 Communications

The Lotus Blossom hacker group, also known as Spring Dragon, Billbug, or Thrip, has been…

1 hour ago

Squidoor: Multi-Vector Malware Exploiting Outlook API, DNS & ICMP Tunneling for C2

A newly identified malware, dubbed "Squidoor," has emerged as a sophisticated threat targeting government, defense,…

1 hour ago

Unpatched Vulnerabilities Attract Cybercriminals as EDR Visibility Remains Limited

Cyber adversaries have evolved into highly organized and professional entities, mirroring the operational efficiency of…

1 hour ago

Threat Actors Attack Job Seekers of Fortune 500 Companies to Steal Personal Details

In Q3 2024, Cofense Intelligence uncovered a targeted spear-phishing campaign aimed at employees working in…

2 hours ago

DragonForce Attacks Critical Infrastructure to Exfiltrate Data and Halt Operations

The DragonForce ransomware group has launched a significant cyberattack on critical infrastructure in Saudi Arabia,…

2 hours ago

New Malware Uses Legitimate Antivirus Driver to Bypass All System Protections

In a concerning development, cybersecurity researchers at Trellix have uncovered a sophisticated malware campaign that…

2 hours ago