One in four business web apps has a 'high-risk' flaw
Many business applications such as websites, webmail or wikis are vulnerable to attack.
One in four business web applications have at least one high-risk security issue, according to a report.
Analysing the web applications on behalf of its public and private sector clients around the world, NTA Monitor found that 27 per cent of all those tested had a high-risk issue, comparing to 17 per cent the previous year.
NTA looked at a wide range of industry sectors, and saw that the biggest change came with its charity and not-for-profit clients, where the average number of vulnerabilities for each web app more than tripled since last year to 15 per cent.
The sector with the highest number of high-risk vulnerabilities - those that could allow an attacker to gain network access - was services, which had an average of two high-risk flaws per test.
The most secure industry sectors were utilities and legal, as they were the only ones to have no high-level risks.
NTA found that the most common attacks against web application flaws were SQL injection, cross-site scripting and cross-request forgery.
SQL injection was the only one of these that was in the top three high-risk attacks from last year's report.
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
Roy Hills, technical director at NTA Monitor, said that user-supplied data needed to be cleaned before it was returned to the browser or stored in the database.
"This reduces the threat of SQL injection, which is a consistently prevalent high-risk throughout 2008 and 2009," he said in a statement.
"SQL injection enables attackers to modify the database queries initiated from an application so users can delete, create or update database records."
-
Gender diversity improvements could be the key to tackling the UK's AI skills shortageNews Encouraging more women to pursue tech careers could plug huge gaps in the AI workforce
-
Researchers claim Salt Typhoon masterminds learned their trade at Cisco Network AcademyNews The Salt Typhoon hacker group has targeted telecoms operators and US National Guard networks in recent years
-
Security experts claim the CVE Program isn’t up to scratch anymore — inaccurate scores and lengthy delays mean the system needs updatedNews CVE data is vital in combating emerging threats, yet inaccurate ratings and lengthy wait times are placing enterprises at risk
-
IBM AIX users urged to patch immediately as researchers sound alarm on critical flawsNews Network administrators should patch the four IBM AIX flaws as soon as possible
-
Critical Dell Storage Manager flaws could let hackers access sensitive data – patch nowNews A trio of flaws in Dell Storage Manager has prompted a customer alert
-
Flaw in Lenovo’s customer service AI chatbot could let hackers run malicious code, breach networksNews Hackers abusing the Lenovo flaw could inject malicious code with just a single prompt
-
Industry welcomes the NCSC’s new Vulnerability Research Initiative – but does it go far enough?News The cybersecurity agency will work with external researchers to uncover potential security holes in hardware and software
-
Hackers are targeting Ivanti VPN users again – here’s what you need to knowNews Ivanti has re-patched a security flaw in its Connect Secure VPN appliances that's been exploited by a China-linked espionage group since at least the middle of March.
-
Broadcom issues urgent alert over three VMware zero-daysNews The firm says it has information to suggest all three are being exploited in the wild
-
Nakivo backup flaw still present on some systems months after firms’ ‘silent patch’, researchers claimNews Over 200 vulnerable Nakivo backup instances have been identified months after the firm silently patched a security flaw.