This blog will serve as a spring board for understanding what hackers can do with unpatched security vulnerabilities and poorly deployed software. We’ll talk about who is largely at risk (ie..organizations using a specific technology, organizations within a specific industry, IT groups that don’t have their firewalls configured properly or that aren’t running a backup system, etc.), potential or actual compromise, and how to mitigate. The attacks or vulnerabilities discussed here are known and/or have either been already carried out or are currently being developed in the attacker community. This should give security professionals a basis for understanding the impact and threats that these unpatched security holes bring to their customers or enterprise and help them assess their individual threat. We will also offer commentary on the impact these attacks can have on their business. Related content opinion Start in the Middle By Security Renegades Oct 10, 2008 5 mins IT Leadership opinion Confessions of a Security Optimist By Security Renegades Apr 25, 2008 3 mins Core Java opinion Have we all become "Patch Crazy?" By Security Renegades Dec 03, 2007 3 mins Core Java opinion When DDoS Attacks Become Personal By Security Renegades Nov 20, 2007 5 mins Data and Information Security Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe