Dec 11, 2025 • PortSwigger Research
DAST without disruption: Burp Suite DAST winter update 2025
This article announces the winter 2025 update for Burp Suite DAST, focusing on enhancing application security testing without disrupting development...
Executive Summary
This article announces the winter 2025 update for Burp Suite DAST, focusing on enhancing application security testing without disrupting development workflows. It highlights common challenges faced by AppSec teams, including limited scanning windows, fragile authentication mechanisms, and expansive API estates. The update aims to address these issues by improving scanning efficiency and integration capabilities. However, the text does not identify any specific cyber threats, threat actors, or malware families. There are no reported incidents, vulnerabilities, or active campaigns discussed within the content. Consequently, no immediate mitigation strategies against adversarial actions are provided. The content serves purely as a product enhancement notification for security professionals utilizing dynamic application security testing tools. Organizations should view this as an operational update rather than a threat intelligence alert requiring immediate defensive action against external adversaries.
Summary
AppSec teams are under constant pressure to secure fast-moving applications without slowing anything down. But scanning windows, fragile authentication, and sprawling API estates often get in the way
Published Analysis
This article announces the winter 2025 update for Burp Suite DAST, focusing on enhancing application security testing without disrupting development workflows. It highlights common challenges faced by AppSec teams, including limited scanning windows, fragile authentication mechanisms, and expansive API estates. The update aims to address these issues by improving scanning efficiency and integration capabilities. However, the text does not identify any specific cyber threats, threat actors, or malware families. There are no reported incidents, vulnerabilities, or active campaigns discussed within the content. Consequently, no immediate mitigation strategies against adversarial actions are provided. The content serves purely as a product enhancement notification for security professionals utilizing dynamic application security testing tools. Organizations should view this as an operational update rather than a threat intelligence alert requiring immediate defensive action against external adversaries. AppSec teams are under constant pressure to secure fast-moving applications without slowing anything down. But scanning windows, fragile authentication, and sprawling API estates often get in the way AppSec teams are under constant pressure to secure fast-moving applications without slowing anything down. But scanning windows, fragile authentication, and sprawling API estates often get in the way