One in four business web apps has a 'high-risk' flaw
Many business applications such as websites, webmail or wikis are vulnerable to attack.
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
You are now subscribed
Your newsletter sign-up was successful
One in four business web applications have at least one high-risk security issue, according to a report.
Analysing the web applications on behalf of its public and private sector clients around the world, NTA Monitor found that 27 per cent of all those tested had a high-risk issue, comparing to 17 per cent the previous year.
NTA looked at a wide range of industry sectors, and saw that the biggest change came with its charity and not-for-profit clients, where the average number of vulnerabilities for each web app more than tripled since last year to 15 per cent.
The sector with the highest number of high-risk vulnerabilities - those that could allow an attacker to gain network access - was services, which had an average of two high-risk flaws per test.
The most secure industry sectors were utilities and legal, as they were the only ones to have no high-level risks.
NTA found that the most common attacks against web application flaws were SQL injection, cross-site scripting and cross-request forgery.
SQL injection was the only one of these that was in the top three high-risk attacks from last year's report.
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
Roy Hills, technical director at NTA Monitor, said that user-supplied data needed to be cleaned before it was returned to the browser or stored in the database.
"This reduces the threat of SQL injection, which is a consistently prevalent high-risk throughout 2008 and 2009," he said in a statement.
"SQL injection enables attackers to modify the database queries initiated from an application so users can delete, create or update database records."
-
Mistral CEO Arthur Mensch thinks 50% of SaaS solutions could be supplanted by AINews Mensch’s comments come amidst rising concerns about the impact of AI on traditional software
-
Westcon-Comstor and UiPath forge closer ties in EU growth driveNews The duo have announced a new pan-European distribution deal to drive services-led AI automation growth
-
Millions of developers could be impacted by flaws in Visual Studio Code extensions – here's what you need to know and how to protect yourselfNews The VS Code vulnerabilities highlight broader IDE security risks, said OX Security
-
CVEs are set to top 50,000 this year, marking a record high – here’s how CISOs and security teams can prepare for a looming onslaughtNews While the CVE figures might be daunting, they won't all be relevant to your organization
-
Microsoft patches six zero-days targeting Windows, Word, and more – here’s what you need to knowNews Patch Tuesday update targets large number of vulnerabilities already being used by attackers
-
Experts welcome EU-led alternative to MITRE's vulnerability tracking schemeNews The EU-led framework will reduce reliance on US-based MITRE vulnerability reporting database
-
Veeam patches Backup & Replication vulnerabilities, urges users to updateNews The vulnerabilities affect Veeam Backup & Replication 13.0.1.180 and all earlier version 13 builds – but not previous versions.
-
Two Fortinet vulnerabilities are being exploited in the wild – patch nowNews Arctic Wolf and Rapid7 said security teams should act immediately to mitigate the Fortinet vulnerabilities
-
Everything you need to know about Google and Apple’s emergency zero-day patchesNews A serious zero-day bug was spotted in Chrome systems that impacts Apple users too, forcing both companies to issue emergency patches
-
Security experts claim the CVE Program isn’t up to scratch anymore — inaccurate scores and lengthy delays mean the system needs updatedNews CVE data is vital in combating emerging threats, yet inaccurate ratings and lengthy wait times are placing enterprises at risk