Zacks (2024) – 11,994,223 breached accounts

In June 2024, the investment research company Zacks was allegedly breached, and data was later published to a popular hacking forum. This comes after a separate Zacks data breach confirmed by the organisation in 2023 with the subsequent breach disclosing millions of additional records representing a superset of data from the first incident. The 2024 breach included 12M unique email addresses along with IP and physical addresses, names, usernames, phone numbers and unsalted SHA-256 password hashes. Zacks did not respond to multiple attempts to contact them about the incident.

Read More

Understanding Injection Attacks in Application Security: Types, Tools, and Examples

How Injection Attacks Exploit Web Application Vulnerabilities Injection attacks occur when malicious input is inserted into a web application, exploiting vulnerabilities in unvalidated user input to execute unintended commands. Attackers craft payloads that manipulate how the application processes data, often leading to unauthorized access, data…
Read more
The post Understanding Injection Attacks in Application Security: Types, Tools, and Examples appeared first on Acunetix.

Read More

Strengthen Your Web Applications with HTTP Security Headers

What is a HTTP security header? An HTTP security header is a response header that helps protect web applications by providing browsers with specific instructions on how to handle website content securely. These headers play a crucial role in mitigating various cyber threats, such as…
Read more
The post Strengthen Your Web Applications with HTTP Security Headers appeared first on Acunetix.

Read More

Disabling Directory Listing on Your Web Server – And Why It Matters

By default, some web servers allow directory listing, which means that if no default index file (such as index.html or index.php) is present, the server will display a list of all files and directories in that folder. This can expose sensitive files, scripts, and configurations,…
Read more
The post Disabling Directory Listing on Your Web Server – And Why It Matters appeared first on Acunetix.

Read More

XSS Filter Evasion: How Attackers Bypass XSS Filters – And Why Filtering Alone Isn’t Enough

XSS filter evasion techniques allow attackers to bypass cross-site scripting (XSS) protections designed to block malicious scripts. This article explores some of the most common filter bypass strategies, explains why relying solely on filtering is ineffective, and outlines the best practices for preventing XSS attacks….
Read more
The post XSS Filter Evasion: How Attackers Bypass XSS Filters – And Why Filtering Alone Isn’t Enough appeared first on Acunetix.

Read More

Preventing CSRF Attacks with Anti-CSRF Tokens: Best Practices and Implementation

The most widely used method to prevent cross-site request forgery (CSRF) attacks is the implementation of anti-CSRF tokens. These are unique values generated by a web application and validated with each request to ensure authenticity. CSRF attacks exploit a user’s active session to execute unauthorized…
Read more
The post Preventing CSRF Attacks with Anti-CSRF Tokens: Best Practices and Implementation appeared first on Acunetix.

Read More

Mitigating Fragmented SQL Injection Attacks: Effective Solutions

This blog post breaks down Fragmented SQL Injection, a method hackers use to bypass authentication by manipulating two different input fields at the same time. Our security expert explains why single quotes matter in SQL injection attacks and how using Prepared Statements (also called Parameterized…
Read more
The post Mitigating Fragmented SQL Injection Attacks: Effective Solutions appeared first on Acunetix.

Read More

JSON Web Token Attacks And Vulnerabilities

JSON Web Tokens (JWTs) are a widely used method for securely exchanging data in JSON format. Due to their ability to be digitally signed and verified, they are commonly used for authorization and authentication. However, their security depends entirely on proper implementation—when misconfigured, JWTs can…
Read more
The post JSON Web Token Attacks And Vulnerabilities appeared first on Acunetix.

Read More
X