Security Experts:

Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Cybercrime

Know What Hackers Know: HP Cyber Risk Report 2015

Hackers build attacks on a huge treasure-trove of existing vulnerabilities, and they find new ways to exploit new technologies like mobile and the Internet of Things.

Hackers build attacks on a huge treasure-trove of existing vulnerabilities, and they find new ways to exploit new technologies like mobile and the Internet of Things.

HP Cyber Risk ReportTo fight back, you need to know what they know. HP Cyber Risk Report 2015, a comprehensive report from HP Security Research, contains more than 70 pages jam packed with data and analysis detailing the threat landscape and how hackers exploit it.

Read it to learn:

• The vulnerability and exploit trends in Windows, Linux, and mobile OSs

• How well-known vulnerabilities continue to open the door to hackers

• The new technologies that introduce new avenues of attack

The breadth and depth of the full report make it a must-read for security professionals.

Download Now

Written By

Click to comment

Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

Cybercrime

Zendesk is informing customers about a data breach that started with an SMS phishing campaign targeting the company’s employees.

Cybercrime

The release of OpenAI’s ChatGPT in late 2022 has demonstrated the potential of AI for both good and bad.

Cyberwarfare

Websites of German airports, administration bodies and banks were hit by DDoS attacks attributed to Russian hacker group Killnet

Network Security

NSA publishes guidance to help system administrators identify and mitigate cyber risks associated with transitioning to IPv6.

Management & Strategy

Industry professionals comment on the recent disruption of the Hive ransomware operation and its hacking by law enforcement.

Cybercrime

The FBI dismantled the network of the prolific Hive ransomware gang and seized infrastructure in Los Angeles that was used for the operation.

Identity & Access

Hackers rarely hack in anymore. They log in using stolen, weak, default, or otherwise compromised credentials. That’s why it’s so critical to break the...