
Security Threat Landscape Still Plagued by Known Issues, says HPTop ten vulnerabilities exploited in 2014 took advantage of known weaknesses in systems implemented years or even decades ago
PALO ALTO, Calif., Feb. 23, 2015 HP today published the 2015 edition of its annual Cyber Risk Report, providing in-depth threat research and analysis around the most pressing security issues plaguing the enterprise during the previous year and indicating likely trends for 2015.
Authored by HP Security Research, the report examines the data indicating the most prevalent vulnerabilities that leave organizations open to security risks. This year's report reveals that well-known issues and misconfigurations contributed to the most formidable threats in 2014.
Many of the biggest security risks are issues we've known about for decades, leaving organizations unnecessarily exposed, said Art Gilliland (@ArtGilliland), senior vice president and general manager, Enterprise Security Products, HP. We can't lose sight of defending against these known vulnerabilities by entrusting security to the next silver bullet technology; rather, organizations must employ fundamental security tactics to address known vulnerabilities and in turn, eliminate significant amounts of risk.
Highlights and key findings
44 percent of known breaches came from vulnerabilities that are 2-4 years old. Attackers continue to leverage well-known techniques to successfully compromise systems and networks. Every one of the top ten vulnerabilities exploited in 2014 took advantage of code written years or even decades ago.
Server misconfigurations were the number one vulnerability. Over and above vulnerabilities such as privacy and cookie security issues, server misconfigurations dominated the list of security concerns in 2014, providing adversaries unnecessary access to files that leave an organization susceptible to an attack.
Additional avenues of attack were introduced via connected devices. In addition to security issues presented via Internet of Things (IoT) devices, 2014 also saw an increase in the level of mobile malware detected. As the computing ecosystem continues to expand, unless enterprises take security into consideration, attackers will continue to find more points of entry.
The primary causes of commonly exploited software vulnerabilities are defects, bugs, and logic flaws. Most vulnerabilities stem from a relatively small number of common software programming errors. Old and new vulnerabilities in software are swiftly exploited by attackers.
Key recommendations
A comprehensive and timely patching strategy should be employed by network defenders to ensure systems are up-to-date with the latest security protections to reduce the likelihood of these attacks succeeding.
Regular penetration testing and verification of configurations by internal and external entities can identify configuration errors before attackers exploit them.
Mitigate risk being introduced to a network prior to the adoption of new technologies. With emerging technologies like Internet of Things (IoT), it is imperative for organizations to protect against potential security vulnerabilities by understanding new avenues of attack before they are exploited.
Collaboration and threat intelligence sharing is key to cooperatively addressing threats across the security industry. This enables organizations to gain insight into adversarial tactics, allowing for more proactive defense, strengthened protections offered in security solutions, and an overall safer environment.
Complementary protection strategy should be adopted with a continuous assume-breach mentality. There is no silver bullet solution, and defenders should implement a complementary, layered set of security tactics to ensure the best defense.
Related videos
Cyber Risk Report 2015: Executive Overview HP Enterprise Security Products General Manager, Art Gilliland, provides an overview of the threat landscape and introduction to this year's report.
Cyber Risk Report 2015: The Past Is Prologue - Tune into a Q&A session featuring Jewel Timpe of HP Security Research to learn more about this year's key findings.
MethodologyThe HP Cyber Risk Report is published annually by HP Security Research, leveraging a number of internal and external sources to identify, research and analyze the findings, including the HP Zero Day Initiative, HP Fortify on Demand security assessments, HP Software Security Research and ReversingLabs. Additional information on the methodology can be found in the full report.
HP enables organizations to take a proactive approach to security, disrupting the life cycle of an attack through prevention and real-time threat detection. With market-leading products, services and innovative research, HP Enterprise Security enables organizations to integrate information correlation, application analysis and network-level defense. Additional information about HP Enterprise Security can be found at www.hp.com/go/esp.
Join HP Software on Linkedin and follow @HPSoftware on Twitter. To learn more about HP Enterprise Security Products on Twitter, please follow @HPsecurity and join HP Enterprise Security on Linkedin.
2015 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. The only warranties for HP products and services are set forth in the express warranty statements accompanying such products and services. Nothing herein should be construed as constituting an additional warranty. HP shall not be liable for technical or editorial errors or omissions contained herein.
Most recent headlines
05/01/2027
Worlds first 802.15.4ab-UWB chip verified by Calterah and Rohde & Schwarz to be ...
01/06/2026
January 6 2026, 05:30 (PST) Dolby Sets the New Standard for Premium Entertainment at CES 2026
Throughout the week, Dolby brings to life the latest innovatio...
02/05/2026
Dalet, a leading technology and service provider for media-rich organizations, t...
01/05/2026
January 5 2026, 18:30 (PST) NBCUniversal's Peacock to Be First Streamer to ...
01/04/2026
January 4 2026, 18:00 (PST) DOLBY AND DOUYIN EMPOWER THE NEXT GENERATON OF CREATORS WITH DOLBY VISION
Douyin Users Can Now Create And Share Videos With Stun...
12/02/2026
Chyron unveils PRIME 5.3, the latest software release of the company's powerful engine for live production graphics. PRIME 5.3 delivers the first official i...
12/02/2026
The vendor's VP of Product Management explains how quality assurance, monito...
12/02/2026
LTN announces the appointment of three experienced executives to lead its new Technology organization: Michal Miskin-Amir as EVP and Head of Technology, Jonatha...
12/02/2026
Riedel Communications has officially opened a new office in Kuala Lumpur, Malays...
12/02/2026
Grass Valley has won a competitive NATO-wide tender to provide the new camera system for NATO's main broadcast studio at its Brussels headquarters. The proj...
12/02/2026
Canon U.S.A announces that the vast majority of broadcast lenses utilized on the NBC live broadcast for the Big Game between New England and Seattle on Sunday w...
12/02/2026
The National Basketball Association (NBA) and NBC Sports announce the entertainm...
12/02/2026
The International Olympic Committee (IOC) announces that beIN MEDIA GROUP ( beIN ), the leading global sports, entertainment and media organisation, has secured...
12/02/2026
The Big 12 Conference and ASB GlassFloor introduces a full LED video sports floor that will debut at the 2026 Phillips 66 Big 12 Men's and Women's Baske...
12/02/2026
ESPN announces Year of the Super Bowl, a sweeping 12-month, multi-platform cel...
12/02/2026
Continuing its commitment to serving the faith-based broadcast and live event community, mobile production company TNDV, a division of Live Media Group, will hi...
12/02/2026
The production team of the long-running German investigative series Achtung Abz...
12/02/2026
Vizrt announces the launch of four Campus Stadium Production Bundles, designed t...
12/02/2026
At NAB Show, LiveU will showcase its broadest IP-video EcoSystem to date, design...
12/02/2026
Welcome to the Sports Video Group's new interview series, Follow the Money, ...
12/02/2026
400 Gbps of bandwidth, layered redundancy, and mobile-first connectivity powered...
12/02/2026
Valentine's Day often comes with a soundtrack. In fact, Spotify data shows that more people used Blend, our shared playlist feature, on February 14, 2025, t...
12/02/2026
Some days you want your music to reflect a specific feeling, memory, or vibe that goes beyond a single artist or genre. You want to do more than listen. You wan...
12/02/2026
Our Medicine S2: Frontline Medicine Through A Blak Lens
12 February, 2026
Media releases
A Bigger, Bolder Second Series showcasing First Nations Frontline ...
12/02/2026
L3Harris' VAMPIRE system fires Thales Belgian-made 70 MM rocket from an FZ60...
12/02/2026
Share
Copy link
Facebook
X
Linkedin
Bluesky
Email...
12/02/2026
Share
Copy link
Facebook
X
Linkedin
Bluesky
Email...
12/02/2026
Share
Copy link
Facebook
X
Linkedin
Bluesky
Email...
12/02/2026
The production team of the long-running German investigative series Achtung Abzocke recently upgraded its cameras for the show's 12th season. The objectiv...
12/02/2026
Leading provider of video streaming solutions, Bitmovin, has appointed Ian Baglow as Co-CEO alongside existing CEO and Co-Founder Stefan Lederer. Under this str...
12/02/2026
Vizrt, a leading viewer engagement platform and a trusted expert in live production technologies, today announces the launch of four Campus Stadium Production B...
12/02/2026
Strategic agreement to deliver S3 cloud storage in Switzerland with full data sovereignty and local control including at the level of individual cantons plu...
12/02/2026
Mad About Video is a leading specialist in video for live events and installations throughout Malta. In operation since 2011, it has evolved from a company focu...
12/02/2026
JAGGAER, a global leader in digital procurement and supplier collaboration solutions, today announced the successful delivery of a procurement digitalization pr...
12/02/2026
At NAB Show, LiveU will showcase its broadest IP-video EcoSystem to date, designed to help broadcasters and content creators embrace digital first operations, d...
12/02/2026
Share
Copy link
Facebook
X
Linkedin
Bluesky
Email...
12/02/2026
Share
Copy link
Facebook
X
Linkedin
Bluesky
Email...
12/02/2026
Share
Copy link
Facebook
X
Linkedin
Bluesky
Email...
12/02/2026
Share
Copy link
Facebook
X
Linkedin
Bluesky
Email...
12/02/2026
Share
Copy link
Facebook
X
Linkedin
Bluesky
Email...
12/02/2026
The six-part crime drama, created by Claire Oakley and produced by Little Door P...
12/02/2026
Wuppertal February 12, 2026
Riedel Opens Kuala Lumpur Office to Strengthen Glo...
12/02/2026
Back to All News
Netflix unveils the trailer for That Night
Entertainment
12 February 2026
GlobalSpain
Link copied to clipboard
WATCH THE TRAILER
DOWNLOA...
12/02/2026
The Digital Product Passport: A New Era of Transparency and Sustainability
Arvato Systems supports companies in getting started with the digital product passp...
12/02/2026
At leading institutions across the globe, the NVIDIA DGX Spark desktop supercomputer is bringing data center class AI to lab benches, faculty offices and studen...
12/02/2026
A diagnostic insight in healthcare. A character's dialogue in an interactive...
12/02/2026
The GeForce NOW sixth-anniversary festivities roll on this February, continuing a monthlong celebration of NVIDIA's cloud gaming service.
This week brings ...
12/02/2026
TIME100 Health list features Scripps Research Professor Darrell Irvine Irvine is recognized for his work in empowering the immune system to fight disease, which...
11/02/2026
FYI: Phone Support Maintenance One thing we pride ourselves on here at Utah Scientific is our 24-hour support included with our signature 10-year hardware warra...
11/02/2026
Leading provider of video streaming solutions, Bitmovin, has appointed Ian Baglow as Co-CEO alongside existing CEO and Co-Founder Stefan Lederer. Under this str...