A light grey illustration of a square hole in the ground with a blue arrow winding around it is shown to represent the concept of zero-day vulnerabilities and the importance of avoiding them

What Is a Zero-Day Vulnerability and How Can It Be Avoided?

In today's increasingly digital world, security threats are becoming more and more sophisticated. One such threat that can cause serious harm to individuals and businesses alike is a zero-day vulnerability. In this article, we'll explore what zero-day vulnerabilities are, the…

Read More
zero-day vulnerabilities

Mastering The Top 13 Cyber Attack Vectors: The Ultimate Guide to Safeguarding Your Organization

To effectively shield your organization from cyber attacks, it's vital to understand cyber attack vectors. After all, how do you know what you should be doing to defend, if you don’t have an idea of the threats?But what are cyber…

Read More
zero-day vulnerabilities

Incorrectly patched ZyXEL vulnerability becomes zero-day again

New vulnerabilities and attack vectors emerge almost daily. Defense teams have a higher chance of fending off attacks when there is less time between hackers' active exploitation and detection. While SRLabs conducts research on both vulnerabilities (e.g., reverse engineering, black…

Read More
Alexa Google home phishing eavesdropping

Smart Spies: How Alexa and Google Home expose users to phishing and eavesdropping

The increasing functionality of smart speakers also leads to a growing attack surface for hackers. In 2019 research by SRLabs unveiled two scenarios hackers might abuse both Alexa or Google Home to spy on users. The vulnerability allows third parties…

Read More
A screenshot of a black programming screen with with several lines of code with one in red depicting how RCS exposes mobile users to hackers

How RCS exposes mobile users to hackers

In 2019, Google and several mobile operators started implementing a new communication technology, Rich Communication Services (RCS) [1]. RCS replaced traditional calling and SMS, serving as their replacement in the communication landscape. The technology included also new messaging possibilities and…

Read More
An illustration of a laptop screen displaying log in portal with username and passwords filled but hidden, the portal window is partly pulled out of the screen with a fishing hook depicting phishing attempts by hackers

Five Things to Know about Phishing

Phishing is the attempt to steal sensitive data through tricking a person into revealing passwords or credit card data or downloading a computer virus. In a particularly unlucky scenario, phishing may become a triple loss, as the victims lose their…

Read More
A picture of a man holding his phone. this image is attached to a blog article titled: Vulnerability Management, make the most of your ongoing efforts with 1 KPI through the Hackability Score that prioritizes issues for IT teams and why benefits fourfold from just 1 single KPI.

Vulnerability Management, make the most of your ongoing efforts with 1 KPI

Threats and vulnerabilities are on the rise. But many companies are not aware of their security level. Read in this article how your Hackability Score prioritizes issues for your IT team and why you benefit fourfold from just 1 single…

Read More
An image with green background and text that says: hacking is steeped in myth because we talk a lot about hackers but rarely with them. this image is attached to a blog article talking about hacking protection – a never- ending competition inside of companies.

Hacking protection – a never- ending competition inside of companies?

The topic of hacking guarantees exciting Hollywood moments. In the real world, however, we are making little progress on hacking prevention. Both for the same reason: The actions of hackers seem to be mysterious because most people know little about…

Read More