Resource Library
Resource Library
How to choose a vulnerability scanning software
Summary A vulnerability scanner, also known as vulnerability management software or vulnerability assessment software, is a tool used to scan computer systems and networks for security vulnerabilities. In this...
What Is a Zero-Day Vulnerability and How Can It Be Avoided?
In today’s increasingly digital world, security threats are becoming more and more sophisticated. One such threat that can cause serious harm to individuals and businesses alike is a zero-day...
The Best Vulnerability Scanning Tools for Your BusinessÂ
In today’s digital landscape, businesses are more interconnected than ever before, and as a result, more vulnerable to cyber threats. Vulnerability scanning is an essential aspect of any organization’s...
A Comprehensive Guide to Implementing a Vulnerability Management ProcessÂ
In today’s rapidly evolving technological landscape, organizations must be proactive in identifying and mitigating potential security threats. Implementing a robust vulnerability management process is a critical step in ensuring...
The Benefits of Using an Enterprise Vulnerability Management Tool
In today’s increasingly interconnected world, businesses are facing a growing number of cyber threats that can result in significant financial and reputational damage. That is why it is more...
World Backup Day:Â Best practices for small to mid-sized companiesÂ
We constantly hear phrases like ‘data is the new oil’ — and just like oil it needs to be stored carefully. According to research commissioned by Arcserve, 52% of...
Mastering The Top 13 Cyber Attack Vectors: The Ultimate Guide to Safeguarding Your Organization
To effectively shield your organization from cyber attacks, it’s vital to understand cyber attack vectors. After all, how do you know what you should be doing to defend, if...
Internet-facing asset discovery: what is it and how does it help me?
Why should you consider internet-facing asset discovery? Ransomware, state-directed cybercriminals and the dark web gangs — in today’s world, it’s crucial for companies to safeguard their assets from cyber...
Hacking protection – a never- ending competition inside of companies?
Hacking protection – a never- ending competition inside of companies? The topic of hacking guarantees exciting Hollywood moments. In the real world, however, we are making little progress on...
Vulnerability Remediation Made Fast
Vulnerability Remediation Made Fast This blog post tells you how you can speed up your remediation management process using Autobahn Security’s Cyber Fitness Workouts, with another core benefit of...
Vulnerability Management Made Easy
Too many cybersecurity issues generally overwhelm IT staff in remediating the root causes of these flaws. Read in this case study in just 5 minutes how one client could...
Vulnerability Management, make the most of your ongoing efforts with 1 KPI
Did you know that the effects of hard work compound in cybersecurity? The more you train your cyber muscle, the stronger your organization's security posture becomes. To boost efficiency,...
Avoiding status quo bias in cybersecurity
This blog shows how the status quo bias – the human tendency to prefer the current situation – complicates our private and professional lives. We cope with suboptimal decisions...
Five Things to Know about Phishing
This blog post tells you how to avoid getting reeled in by cybercriminals in a phishing attack. The next time your organization receives an email with bait, you will...
The Cloud exposes your private IP cameras
Most remote video cameras are not exposed directly to the internet. However, insecure cloud services put them at a similar risk of becoming part of the next IoT camera...
How RCS exposes mobile users to hackers
In the second half of 2019, Google and a group of mobile operators started implementing a new communication technology, Rich Communication Services (RCS) [1]. RCS is poised to replace...
The blockchain ecosystem has a patch problem
SRLabs research suggests that security vulnerabilities remain unpatched for many Ethereum blockchain participants for extended periods of time, putting the blockchain ecosystem at risk.
KPIs in Cyber Security: Measuring Hackability
Security scanners and tools are usually built around experts. But cyber security effects the entire organization, so the expectations towards monitoring and communicating hackability have evolved. KPIs like Autobahn...
Legacy booking systems disclose travelers’ private information
Travel bookings worldwide are maintained in a handful of systems. The three largest Global Distributed Systems (GDS) Amadeus, Sabre, and Travelport administer more than 90% of flight reservations as...
Banking regulation has an effect on Hackability
Banks are known for their strong security efforts and better-than-average protection from hacking. As we discussed previously when introducing a metric to compare the Hackability of different organizations, banks...
Smart Spies: How Alexa and Google Home expose users to vishing and eavesdropping
UPDATE December 17, 2019: Attacks still possible Six weeks after first publicly discussing the Smart Spies attacks, we performed some retests to see whether Google and Amazon implemented sufficient...
Incorrectly patched ZyXEL vulnerability becomes zero-day again
We dug deeper into the vulnerability and patch for CVE-2020-9054, a pre-auth command injection in ZyXEL NAS devices. We found that the patched vulnerability was still exploit-able due to...
Achieving Telerik Remote Code Execution 100 Times Faster
Learn how a team at SRLabs optimized a vulnerability in the development software Telerik UI from 2017 to create a practical exploit. The research details the optimization techniques deployed,...
4 best practices to bring your vulnerability management to the next level
Learn about four best practices to improve for Vulnerability Management: 1) Data integration 2) Asset detection 3) Vulnerability aggregation and 4) Prioritization.
Outdated payment protocols expose customers and merchants
We must be able to trust payment systems: Payment terminals have conquered nearly every retail outlet and payment cards are as pervasive as cash. Major parts of this critical...