Author: Lukas Rossi

Autobahn Security > Articles by: Lukas Rossi
A white desk is shown from above, with, from left to right, an open laptop and two computer screens on it. In the center of the image, we see a person's hands operating a keyboard and mouse.

Revolutionizing SIEM Tools with Breach and Attack Simulation: Enhancing Detection and Response in IT Security

Introduction  Security Information and Event Management (SIEM) tools have long played a critical role in cybersecurity, providing organizations with the ability to collect, analyze, and correlate data from various sources to detect and respond to threats. However, as the cybersecurity…

Read More
The image is shot from above. It shows a man's hands clasped together over an open Macbook laptop places on a while table. A desk plant peeks in from the top left corner of the image.

A CISO’s Guide to Breach and Attack Simulation: Maximizing ROI on Your Cybersecurity Investments

Introduction  In the realm of cybersecurity, change is the only constant. The rapid pace of digitalization, coupled with the surge of advanced cyberthreats, continually reshapes the landscape, bringing unprecedented complexity. As a Chief Information Security Officer (CISO), the challenge extends…

Read More
A picture of a guy holding a magnifier

Internet-facing asset discovery: what is it and how does it help me?

Explore internet-facing asset discovery to protect your business by identifying and securing exposed online assets. Ransomware, state-directed cybercriminals and the dark web gangs — in today's world, it's crucial for companies to safeguard their assets from cyber threats. Ensuring the…

Read More
A picture of 2 men running depicting the issue of legacy booking systems disclosing travelers’ private information.

Legacy booking systems disclose travelers’ private information

Travel bookings worldwide are maintained in a handful of systems. The three largest Global Distributed Systems (GDS) Amadeus, Sabre, and Travelport administer more than 90% of flight reservations as well as numerous hotel, car, and other travel bookings. Today’s GDSs…

Read More
A picture of a world's globe attached to a blog article about KPIs in Cyber Security: Measuring Hackability. The picture depicts a new metric called the hackability score that enables companies to measure their hackability, compare their organization to others, and track their progress with one easy-to-understand KPI.

KPIs in Cyber Security: Measuring Hackability

Why could you measure Hackability as a KPI in cybersecurity? Cyber security has recently gained significantly in importance for businesses. In its annual Cyber Security Breaches Survey, the UK Department for Digital, Culture, Media and Sport (DCMS) found that 82%…

Read More
A picture of steel chains with one of the chains in red depicting how the blockchain ecosystem has a patch problem.

The blockchain ecosystem has a patch problem

SRLabs research suggests that security vulnerabilities remain unpatched for many Ethereum blockchain participants for extended periods of time, putting the blockchain ecosystem at risk. Crypto currencies provide a popular alternative to centralized payment systems, and promise transactions between mutually anonymous…

Read More
A screenshot of a black programming screen with with several lines of code with one in red depicting how RCS exposes mobile users to hackers

How RCS exposes mobile users to hackers

In 2019, Google and several mobile operators started implementing a new communication technology, Rich Communication Services (RCS) [1]. RCS replaced traditional calling and SMS, serving as their replacement in the communication landscape. The technology included also new messaging possibilities and…

Read More
A picture of an exposed private camera showing a man in his room working attached to a blog article about how the cloud exposes private IP cameras.

The Cloud exposes your private IP cameras

In 2016, was hit by a huge DDoS attack. Shortly thereafter, DNS provider Dyn went down, leaving many web applications unreachable. The Mirai malware drove the attacks by searching for devices with default credentials running telnet services, compromising them…

Read More