Two Factor Authentication (2FA) adds an extra level of security when logging into Acunetix. When 2FA is enabled, anyone accessing the Acunetix will need to make use of a 2FA Authentication app to login to Acunetix.This article explains how to enable 2FA for your Acunetix account. Login to Acunetix and change to your Profile page […]
How do I reset 2FA for my account?
There are situations that require 2FA to be reset. This can happen when the device used for 2FA authentication is lost, broken and not accessible any longer. In such an eventuality, you will need to do one of the following: If you are an Acunetix Administrator, you will need to use the Acunetix Administrative Password […]
What is the cost of a data breach?
If your company isn’t taking important steps to protect against a potential data breach, it might be time to worry – attacks on businesses and organizations are increasing, and so are their costs. According to a new study by the Ponemon Institute, an average cost of a “regular” breach ranges from $2.2 million to $6.9 […]
OWASP EU and CEBIT DE Highlights
The Acunetix team is back from two successful events in the EU, namely OWASP AppSec held in London, UK and CEBIT held in Hannover, Germany. This was the first time that Acunetix exhibited at CEBIT. Regional Sales Executives and Technical Support personnel were present at both events to meet with partners and customers in the […]
New build introduces HTTP Responses in Alerts, adds manual intervention, vulnerability checks in Cisco ASA, Apache Tomcat
Acunetix v12 (build 12.0.180725167) has been released. This new build adds detection for vulnerabilities in Cisco ASA, Apache Tomcat, Altassian Jira, Spring, JBoss and misconfigured nginx installations. The new build also includes HTTP Responses in the vulnerability alerts, and re-introduces manual intervention in the Login Sequence Recorder and a good number of additional updates and […]
A Security-focused Introduction to HTTP, Part 2
This is the second part of a two part series on HTTP basics. In this second part, we cover several attributes of the HTTP protocol such as encoding, HTTP headers and authentication in more detail. Query strings The query string is defined using the question mark (?) character after the URL within an HTTP request. […]
HTTP Security: A Security-focused Introduction to HTTP, Part 1
This is the first part in a two part series on HTTP security and HTTP basics. In this first part we bring you overview of the HTTP protocol. HTTP is a ubiquitous protocol and is one of the cornerstones of the web. If you are a newcomer to web application security, a sound knowledge of […]
How many users can be created in Acunetix?
Acunetix is a multi-user system. The first account that is created is the main admin account, also referred to as the root account. This main admin account can create additional users, giving a role to each user account and configuring which Scan Targets can be scanned or reported on. More information on creating and managing […]
Will my Target settings and scan data be retained when upgrading from Acunetix v11 to Acunetix v12?
When you install Acunetix v12 on the same machine as Acunetix v11, your Acunetix settings, Targets, Scan and Report data will all be retained. You will just need to install Acunetix v12 on the same machine as Acunetix v11,and your Acunetix installation will be upgraded automatically. Follow the instructions in [link to previous article] for […]
How many Targets can I configure in Acunetix?
Please email this question along with your license key to sales@acunetix.com


Formed in 2009, the Archive Team (not to be confused with the archive.org Archive-It Team) is a rogue archivist collective dedicated to saving copies of rapidly dying or deleted websites for the sake of history and digital heritage. The group is 100% composed of volunteers and interested parties, and has expanded into a large amount of related projects for saving online and digital history.
