Next.js middleware authorization bypass vulnerability: Are you vulnerable?

A critical vulnerability in the Next.js framework, officially disclosed on March 21, 2025, allows attackers to bypass middleware security controls through a simple header manipulation. This post summarizes what we know about CVE-2025-29927, how you can mitigate the vulnerability, and how Acunetix can help you detect and confirm your organization’s risk.
Read more
The post Next.js middleware authorization bypass vulnerability: Are you vulnerable? appeared first on Acunetix.

Read More

Top 10 dynamic application security testing (DAST) tools for 2025

What is DAST and how does it work? Dynamic application security testing (DAST) is a cybersecurity assessment method that analyzes running applications to identify security vulnerabilities. Unlike static application security testing (SAST), which examines source code before deployment, DAST scanning simulates real-world attacks by probing…
Read more
The post Top 10 dynamic application security testing (DAST) tools for 2025 appeared first on Acunetix.

Read More

3 reasons why DAST is the best way to begin the web application security journey

To fully secure your web applications, you need several software solutions, specialist internal resources, and external contractors. However, this means significant costs, and not everyone can afford it all at once. How should small businesses start their web application security journey? Let’s have a look…
Read more
The post 3 reasons why DAST is the best way to begin the web application security journey appeared first on Acunetix.

Read More

How scanners find vulnerabilities

DAST vulnerability scanners are not that different from virus scanners. In both cases, the goal of the software is to find something out of the ordinary in the target. A virus scanner scans a computer’s local resources and storage to find potentially malicious software. A…
Read more
The post How scanners find vulnerabilities appeared first on Acunetix.

Read More

5 reasons why web security is important to avoid ransomware

Ransomware has been a source of major problems for many organizations in recent years. Many of them, aware of this situation, attempt to concentrate their efforts on protecting themselves against this class of threats. This often means that they shift their budgets away from web…
Read more
The post 5 reasons why web security is important to avoid ransomware appeared first on Acunetix.

Read More

7 steps to avoid uncoordinated vulnerability disclosure

Imagine the following situation. You work as a cybersecurity manager for a company that owns the website www.example.com. One day, your sales department receives an email from an unknown individual. The sales department forwards it to you. The email has the following content: You example.com/login.php…
Read more
The post 7 steps to avoid uncoordinated vulnerability disclosure appeared first on Acunetix.

Read More

Hackers: The third pillar of security

Every business knows that to maintain security, you need the primary pillar: the right employees. Some businesses know that these employees also need the second pillar: the right tools such as Acunetix and Invicti. However, still, not enough businesses know how to deal with hackers…
Read more
The post Hackers: The third pillar of security appeared first on Acunetix.

Read More

Red teaming – 5 tips on how to do it safely

Red team vs blue team exercises are a very effective method to evaluate the security posture of your business. However, red teaming, due to its adversarial approach, carries certain risks that must be taken into consideration, both for the red team and the target business….
Read more
The post Red teaming – 5 tips on how to do it safely appeared first on Acunetix.

Read More
X