HP Security Research Blog
The HP Security Research blog provides a platform for security experts from across HP to discuss innovative research, industry observations, and updates on the threat landscape to help organizations proactively identify and manage risk.

Life after Windows Server 2003: Ready or not, here it comes

The impending end of support for Microsoft’s 11-year-old operating system should have businesses formulating a plan for their remaining Windows Server 2003 deployments. We look at what will and won’t happen on July 14, 2015 and how to think about what comes next.

HPSR Threat Intelligence Briefing - Episode 11

Iranian hacker groups and their allies launched increasing numbers of cyber attacks over the last year, despite strict state controls of Internet traffic including: spying, censorship, and filtering laws and technology. 


In this report (see attached report for full content), we examine Iran’s cyber warfare capabilities, particularly the hacker groups that serve as a force multiplier to Iran’s continually expanding cyber presence. The report covers how these groups recruit and train members, the primary actors involved, TTPs, motivations, and indicators of state sponsorship by the regime. Through this analysis, the goal is to educate the reader on the capabilities of these groups and the significance and implications of state sponsorship of underground cyber actors. It also advises potential targets on mitigation strategies in the face of state sponsored cyber activities.


HP Security Research Threat Intelligence Briefing episode 10 - ZDI 2013 in review

It’s that time again, when we look at the vulnerability year that was and muse about the vulnerability year that will be. 2013 was a huge year for the Zero Day Initiative – we purchased more cases this year than in any other since the inception of the ZDI program 10 years ago. And what cases they were – vulnerabilities unearthed in widespread critical software used by enterprises and the greater computing community alike.  In this month’s Threat Briefing we walk 2013’s vulnerabilities, talk vendors, and think out loud about where this is going in 2014.

SEA attack on President’s social media tools

The Syrian Electronic Army continued their western targeted attacks this week by attacking President Barack Obama’s campaign media. Once again, by targeting a third-party and insiders’ email, they were able to modify shortened urls to redirect visitors to their own website, as well as a YouTube video.

One-Third Ain't Bad

Of the Oracle vulnerabilities patched yesterday, HP's Zero Day Initiative (ZDI) researchers were responsible for 33% of Java's most critical issues (CVSS = 10.0) and one of them resolves an issue with Oracle's Middleware technology. All of the corrected Java vulnerabilities allow attackers to bypass the sandbox and execute attacker controlled code.

Oh no! Not another security patch Tuesday blog post!

Patch Tuesday is upon us.  But don’t worry; this isn’t your typical blog post on the latest round of patches. It’s a look at the role the Zero Day Initiative plays in the process...plus some simple advice. Continue reading to join me on this journey. 

What to Expect from #OpPetrol

According to the announcement, the operation will “engage” on June 20, 2013. As we know from past events, actors may be compromising sites now only to release the results as part of the operation. Potential targets may have already seen activity that could later be associated with this announcement.

#OpUSA Lessons Learned

Did your company prepare for #OpUSA?  How much time and resources were spent handling this threat?  Is there such a thing as being overly prepared?  How can you predict the impact of the next threat?

Understanding the Syrian Electronic Army (SEA)

Over the last few years, interest in hacktivist organizations and state sponsored hacking groups has increased greatly around the world. The lines are blurred when comparing independent groups that operate in support of their government or country and those that are directly sanctioned by nation states. The Syrian Electronic Army (SEA) is a group based in Syria, which claims to operate independently in support of Syrian President Bashar al-Assad. 

A pair of intriguing HP Security Research talks in Amsterdam this week

If you happen to be around Amsterdam this week, you might want to come listen to two talks I will give there. One of the at the HackIntheBox conference discusses hacking power plugs, or at least those used to charge electric cars, while the other at an OWASP Netherlands meeting discusses challenges and innovative solutions for pen-testing RESTful web services.


Formation of HP Security Research

We're pleased to announce the formation of HP Security Research (HPSR), a new group that will provide actionable security intelligence through published reports, threat briefings, and content delivered through the HP security product portfolio.

Showing results for 
Search instead for 
Do you mean 
About the Author(s)
  • Head of OpSec Research
  • I am a senior security content developer with Hewlett-Packard Security Research (HPSR). In this role, I write and edit security analysis and supporting content from researchers, including those from HP’s Zero Day Initiative (ZDI) program. The ZDI program augments HP’s Enterprise Security Products with zero-day research through a network of over 3,000 independent researchers around the world. I am also responsible for providing insight into the threat landscape; competitive intelligence to the research team; and providing guidance on the social media roadmap. Part of my role includes speaking publicly and promoting the research and technology of the HPSR.
  • Kernelsmith is senior vulnerability researcher with Hewlett-Packard Security Research (HPSR). In this role, he analyzes and performs root-cause analysis on hundreds of vulnerabilities submitted to the Zero-Day Initiative (ZDI) program. He also tries to automate whenever he can, pulling from the devops and virtualization arenas. Josh is also a developer for the Metasploit Framework and has spoken at a few conferences and holds a few certifications. Prior to joining HP, Smith served in the U.S. Air Force for 10 years and subsequently became a security engineer at the John Hopkins University Applied Physics Laboratory. Smith performed research into weapons systems vulnerabilities as well as evasion and obfuscation techniques to add depth and realism to security device tests. Smith received a B.S. in Aeronautical Engineering from Rensselaer Polytechnic Institute and an M.A. in Management of Information Systems from the University of Great Falls.
  • Security Researcher, Software Security Research
  • Security Researcher, Zero Day Initiative
  • Steve Povolny manages the Digital Vaccine team at HP TippingPoint. The team is composed of security researchers and filter/signature developers for the Intrusion Prevention System.
HP Blog

HP Software Solutions Blog


Follow Us
The opinions expressed above are the personal opinions of the authors, not of HP. By using this site, you accept the Terms of Use and Rules of Participation.