Resource Library
Resource Library
FEATURED CONTENT
This blog post tells you how you can speed up your remediation management process using Autobahn Security’s Cyber Fitness Workouts.
FEATURED CONTENT
Threats and vulnerabilities are on the rise. But many companies are not aware of their security level. Read in this article how your Hackability Score prioritizes issues for your IT team and why you benefit fourfold from just 1 single KPI.Â
World Backup Day:Â Best practices for small to mid-sized companiesÂ
We constantly hear phrases like ‘data is the new oil’ — and just like oil it needs to be stored carefully. According to research commissioned by Arcserve, 52% of...
Mastering The Top 13 Cyber Attack Vectors: The Ultimate Guide to Safeguarding Your Organization
To effectively shield your organization from cyber attacks, it’s vital to understand cyber attack vectors. After all, how do you know what you should be doing to defend, if...
Internet-facing asset discovery: what is it and how does it help me?
Why should you consider internet-facing asset discovery? Ransomware, state-directed cybercriminals and the dark web gangs — in today’s world, it’s crucial for companies to safeguard their assets from cyber...
Hacking protection – a never- ending competition inside of companies?
Hacking protection – a never- ending competition inside of companies? The topic of hacking guarantees exciting Hollywood moments. In the real world, however, we are making little progress on...
Vulnerability Remediation Made Fast
Vulnerability Remediation Made Fast This blog post tells you how you can speed up your remediation management process using Autobahn Security’s Cyber Fitness Workouts, with another core benefit of...
Vulnerability Management Made Easy
Too many cybersecurity issues generally overwhelm IT staff in remediating the root causes of these flaws. Read in this case study in just 5 minutes how one client could...
The Hackability Score: 4 reasons why just 1 KPI makes the most of your ongoing vulnerability management
Did you know that the effects of hard work compound in cybersecurity? The more you train your cyber muscle, the stronger your organization's security posture becomes. To boost efficiency,...
What classical mythology can teach us about cybersecurity
This blog shows how the status quo bias – the human tendency to prefer the current situation – complicates our private and professional lives. We cope with suboptimal decisions...
Five Things to Know about Phishing
This blog post tells you how to avoid getting reeled in by cybercriminals in a phishing attack. The next time your organization receives an email with bait, you will...
The Cloud exposes your private IP cameras
Most remote video cameras are not exposed directly to the internet. However, insecure cloud services put them at a similar risk of becoming part of the next IoT camera...
How RCS exposes mobile users to hackers
In the second half of 2019, Google and a group of mobile operators started implementing a new communication technology, Rich Communication Services (RCS) [1]. RCS is poised to replace...
The blockchain ecosystem has a patch problem
SRLabs research suggests that security vulnerabilities remain unpatched for many Ethereum blockchain participants for extended periods of time, putting the blockchain ecosystem at risk.
KPIs in Cyber Security: Measuring Hackability
Security scanners and tools are usually built around experts. But cyber security effects the entire organization, so the expectations towards monitoring and communicating hackability have evolved. KPIs like Autobahn...
Legacy booking systems disclose travelers’ private information
Travel bookings worldwide are maintained in a handful of systems. The three largest Global Distributed Systems (GDS) Amadeus, Sabre, and Travelport administer more than 90% of flight reservations as...
Banking regulation has an effect on Hackability
Banks are known for their strong security efforts and better-than-average protection from hacking. As we discussed previously when introducing a metric to compare the Hackability of different organizations, banks...
Smart Spies: How Alexa and Google Home expose users to vishing and eavesdropping
UPDATE December 17, 2019: Attacks still possible Six weeks after first publicly discussing the Smart Spies attacks, we performed some retests to see whether Google and Amazon implemented sufficient...
Incorrectly patched ZyXEL vulnerability becomes zero-day again
We dug deeper into the vulnerability and patch for CVE-2020-9054, a pre-auth command injection in ZyXEL NAS devices. We found that the patched vulnerability was still exploit-able due to...
Achieving Telerik Remote Code Execution 100 Times Faster
Learn how a team at SRLabs optimized a vulnerability in the development software Telerik UI from 2017 to create a practical exploit. The research details the optimization techniques deployed,...
4 best practices to bring your vulnerability management to the next level
Learn about four best practices to improve for Vulnerability Management: 1) Data integration 2) Asset detection 3) Vulnerability aggregation and 4) Prioritization.
Outdated payment protocols expose customers and merchants
We must be able to trust payment systems: Payment terminals have conquered nearly every retail outlet and payment cards are as pervasive as cash. Major parts of this critical...