Resource Library
Resource library
Revolutionizing SIEM Tools with Breach and Attack Simulation: Enhancing Detection and Response in IT Security
Introduction Security Information and Event Management (SIEM) tools have long played a critical role in cybersecurity, providing organizations with the ability to collect, analyze, and correlate data from various...
A CISO’s Guide to Breach and Attack Simulation: Maximizing ROI on Your Cybersecurity Investments
Introduction In the realm of cybersecurity, change is the only constant. The rapid pace of digitalization, coupled with the surge of advanced cyberthreats, continually reshapes the landscape, bringing unprecedented...
That little extra for your vulnerability management
In this article, you will learn what is so special about Autobahn Security’s Issue Digestion and why this process plays an essential role in a realistic assessment of your...
Penetration test or vulnerability scan: what’s the difference?
The Problem The danger posed by hackers seems infinite in today’s digital world. The frequency of which companies are affected by cyber-attacks is increasing. This blog article explores the...
5 Easy Steps for Benchmarking Cyber Security
Why benchmark your cyber security? Are you benchmarking everything except your cybersecurity KPIs? You could be missing out on vital information. In this expert paper, we examine how benchmarking...
World Backup Day: Best practices for small to mid-sized companies
We constantly hear phrases like ‘data is the new oil’ — and just like oil it needs to be stored carefully. According to research commissioned by Arcserve, 52% of...
What Is a Zero-Day Vulnerability and How Can It Be Avoided?
In today’s increasingly digital world, security threats are becoming more and more sophisticated. One such threat that can cause serious harm to individuals and businesses alike is a zero-day...
The Best Vulnerability Scanning Tools for Your Business
In today’s digital landscape, businesses are more interconnected than ever before, and as a result, more vulnerable to cyber threats. Vulnerability scanning is an essential aspect of any organization’s...
A Comprehensive Guide to Implementing a Vulnerability Management Process
In today’s rapidly evolving technological landscape, organizations must be proactive in identifying and mitigating potential security threats. Implementing a robust vulnerability management process is a critical step in ensuring...
The Benefits of Using an Enterprise Vulnerability Management Tool
In today’s increasingly interconnected world, businesses are facing a growing number of cyber threats that can result in significant financial and reputational damage. That is why it is more...
Mastering The Top 13 Cyber Attack Vectors: The Ultimate Guide to Safeguarding Your Organization
To effectively shield your organization from cyber attacks, it’s vital to understand cyber attack vectors. After all, how do you know what you should be doing to defend, if...
Internet-facing asset discovery: what is it and how does it help me?
Explore internet-facing asset discovery to protect your business by identifying and securing exposed online assets. Ransomware, state-directed cybercriminals and the dark web gangs — in today’s world, it’s crucial...
Vulnerability Management Made Easy
Too many cybersecurity issues generally overwhelm IT staff in remediating the root causes of these flaws. Read in this case study in just 5 minutes how one client could...
Vulnerability Remediation Made Fast
This blog post tells you how you can speed up your remediation management process using Autobahn Security’s Cyber Fitness Workouts, with another core benefit of making cybersecurity understandable to...
Outdated payment protocols expose customers and merchants
We must be able to trust payment systems: Payment terminals have conquered nearly every retail outlet and payment cards are as pervasive as cash. Major parts of this critical...
Hacking protection – a never- ending competition inside of companies?
The topic of hacking guarantees exciting Hollywood moments. In the real world, however, we are making little progress on hacking prevention. Both for the same reason: The actions of...
4 best practices to bring your vulnerability management to the next level
Learn about four best practices to improve for Vulnerability Management: 1) Data integration 2) Asset detection 3) Vulnerability aggregation and 4) Prioritization.
Achieving Telerik Remote Code Execution 100 Times Faster
Learn how a team at SRLabs optimized a vulnerability in the development software Telerik UI from 2017 to create a practical exploit. The research details the optimization techniques deployed,...
Incorrectly patched ZyXEL vulnerability becomes zero-day again
We dug deeper into the vulnerability and patch for CVE-2020-9054, a pre-auth command injection in ZyXEL NAS devices. We found that the patched vulnerability was still exploit-able due to...
Smart Spies: How Alexa and Google Home expose users to phishing and eavesdropping
UPDATE December 17, 2019: Attacks still possible Six weeks after first publicly discussing the Smart Spies attacks, we performed some retests to see whether Google and Amazon implemented sufficient...
Banking regulation has an effect on Hackability
Banks are known for their strong security efforts and better-than-average protection from hacking. As we discussed previously when introducing a metric to compare the Hackability of different organizations, banks...
Legacy booking systems disclose travelers’ private information
Travel bookings worldwide are maintained in a handful of systems. The three largest Global Distributed Systems (GDS) Amadeus, Sabre, and Travelport administer more than 90% of flight reservations as...
KPIs in Cyber Security: Measuring Hackability
Security scanners and tools are usually built around experts. But cyber security effects the entire organization, so the expectations towards monitoring and communicating hackability have evolved. KPIs like Autobahn...
The blockchain ecosystem has a patch problem
SRLabs research suggests that security vulnerabilities remain unpatched for many Ethereum blockchain participants for extended periods of time, putting the blockchain ecosystem at risk.
How RCS exposes mobile users to hackers
In the second half of 2019, Google and a group of mobile operators started implementing a new communication technology, Rich Communication Services (RCS) [1]. RCS is poised to replace...
The Cloud exposes your private IP cameras
Most remote video cameras are not exposed directly to the internet. However, insecure cloud services put them at a similar risk of becoming part of the next IoT camera...
Five Things to Know about Phishing
This blog post tells you how to avoid getting reeled in by cybercriminals in a phishing attack. The next time your organization receives an email with bait, you will...
Avoiding status quo bias in cybersecurity
This blog shows how the status quo bias – the human tendency to prefer the current situation – complicates our private and professional lives. We cope with suboptimal decisions...
Vulnerability Management, make the most of your ongoing efforts with 1 KPI
Did you know that the effects of hard work compound in cybersecurity? The more you train your cyber muscle, the stronger your organization's security posture becomes. To boost efficiency,...