Quantcast
Channel: Invicti

Guide: Rethinking application security risk for federal agencies

Under pressure to comply with security mandates and make rapid improvements to their security posture, federal organizations are looking for solutions and approaches that combine broad visibility with...

View Article


Image may be NSFW.
Clik here to view.

New research finds 73% of organizations will increase AppSec investment in 2023

 In difficult economic times with the increased risk of bad-actor threats, it’s critical that organizations prioritize investing in zero noise, modern AppSec solutions that demonstrate ROI with...

View Article


Vulnerabilities a routine part of web application releases, survey finds

Teaming up once again with Wakefield Research for the Fall 2022 edition of the Invicti AppSec Indicator, we’ve found that 74% of companies frequently or routinely release software that contains...

View Article

Image may be NSFW.
Clik here to view.

Invicti Malta Cybersecurity Roadshow 2022 at MCAST

At Invicti, we want to be a pillar of the local community, wherever that might be. Our local teams feel driven to give back to communities and embark on initiatives that help us meet this goal. We...

View Article

Cybersecurity awareness is for life, not just for October

For the past 30 days, you’ve likely been inundated with topical reminders about the importance of cybersecurity in all its shapes and aspects. Now, as Cybersecurity Awareness Month draws to a close,...

View Article


Image may be NSFW.
Clik here to view.

OpenSSL 3.0.0–3.0.6 vulnerabilities: Less Heartbleed, more paper cut

Invicti’s Chief Technology Officer and Head of Security Research, Frank Catucci, co-authored this article. Invicti has assessed the risk to its hosted products Invicti Enterprise (formerly Netsparker)...

View Article

Path traversal in Java web applications – announcing the Invicti technical paper

Path traversal/directory traversal vulnerabilities allow malicious hackers to abuse user input to access files on the web server or the application server and obtain sensitive information. The most...

View Article

What you should know about cloud workload protection platforms (CWPP)

The transition to the cloud – and the accompanying transformation in the way applications are developed and deployed – created a need for new security tools. Cloud workload protection platforms (CWPP)...

View Article


Invicti’s automated DAST turns heads at it-sa Expo&Congress 2022

At the end of October 2022, the Invicti crew attended it-sa Expo&Congress – one of the biggest IT security events in Germany and Europe in general. Among the many excellent conversations with...

View Article


The future of cybersecurity: DAST solutions, SBOMs, and APIs to take center...

We all wish we had a cybersecurity crystal ball that would give us deep insight into what’s coming next. From fresh exploits to new attack vectors, things change fast – and those sudden ebbs and flows...

View Article