Germany, Switzerland and the Netherlands are the fastest to secure their vulnerable Citrix systems 22/01/2020

Since 11.01.2020, Alpha Strike Labs of Limes Security GmbH has been performing scans for vulnerable Citrix systems with the vulnerability CVE-2019-19781, which according to current media reports and Twitter comments is already being actively exploited. For scan acquisition, they use the DCS scan network with over 1000 different search nodes [1], which was presented at […]

MORE
Limes Security and Alpha Strike Labs merge to become the leading OT security service provider in the DACH region 05/12/2019

Limes Security, an established Austrian security consulting company in the OT sector (Hagenberg/Vienna) and Alpha Strike Labs, an innovative German-Austrian security company (Berlin/Vienna), are joining forces for a common future. “The aim of the merger is to expand our competences and resources and to grow into one of the leading companies for OT security in […]

MORE
If the source code reveals sensitive data … 03/12/2019

In the course of penetration tests [ #link to article ] Limes Security very often also analyses client applications. It is irrelevant whether these are installed and executed on a computer system, a smartphone or an embedded system. Again, and again, the experts at Limes succeed in extracting sensitive data such as passwords, cryptographic keys, […]

MORE
„Goddag fra København“ 28/11/2019

Limes Security protects your industrial plants against cyber attacks – soon also increasingly in Nordic Europe. Since its foundation, Limes Security (based in Austria) has been internationally active as a cyber security consulting company – especially so in all of Europe. Limes has a long history with Denmark, as Siemens Gamesa Renewable Energy – formerly […]

MORE
Lifecycle Requirements for Industrial Systems #Part 1 “Automated vulnerability testing” 20/11/2019

In the area of ISO/IEC 62443-4-1 (Secure product development lifecycle requirements), so-called vulnerability tests are indispensable. In the 4-1 standard, this is defined under ‘Practice 5 – Security verification and validation testing’ in the requirement ‘SVV-3 Vulnerability testing’. The process of “Vulnerability Testing” requires that at least the following areas are considered: Unexpected malicious input: […]

MORE