Security Research
Showing results for 
Search instead for 
Do you mean 

HP Security Research Threat Intelligence Briefing - Episode 4

SR-FI_Team ‎06-05-2013 04:17 PM - edited ‎06-05-2013 04:25 PM

Thank you for subscribing to Episode 4 of the HP Security Research Threat Intelligence Briefing. This briefing covers the following topics:


Web-based Malware: This section highlights prominent malware campaigns and exploit kits known to target vulnerabilities in web applications, web browsers and browser plugins. It offers an overview of several recent incidents employing a “watering hole” distribution tactic and the specific vulnerabilities targeted by these campaigns.


Attack Techniques: The emphasis of this section is on explaining the web application security weaknesses that frequently aid in malware infection. It describes how these weaknesses are exploited using different attack techniques for distributing and installing malware. By reviewing the malware infection process from start to finish, this section aims to emphasize the risk posed by insecure web applications to the users.


Declarative Security using HTTP Response Headers: This section explains how developers can take advantage of a declarative security approach for mitigating web-based malware using HTTP response headers. Additionally, detailed information on configuration options and browser support for all the major declarative security headers is included.


This companion report supports Episode 4 of the HP Security Research Threat Intelligence Briefing podcast available on the Web and iTunes. The regular podcasts and the associated companion reports are published through the HP Security Research blog at

0 Kudos
About the Author


Gregorio Degonia
on ‎08-19-2013 08:01 AM
I really like your writing style, wonderful information, regards for putting up :D.
Leave a Comment

We encourage you to share your comments on this post. Comments are moderated and will be reviewed
and posted as promptly as possible during regular business hours

To ensure your comment is published, be sure to follow the Community Guidelines.

Be sure to enter a unique name. You can't reuse a name that's already in use.
Be sure to enter a unique email address. You can't reuse an email address that's already in use.
Type the characters you see in the picture above.Type the words you hear.
Aug 29 - Sep 1
Boston, MA
HPE Big Data Conference 2016
Attend HPE’s Big Data Conference to learn from peers in every industry and hear from Big Data experts and thought leaders in an exciting, energy fille...
Read more
Sep 13-16
National Harbor, MD
HPE Protect 2016
Protect 2016 is our annual conference and is the place to meet the world’s top information security talent, discuss new products and share information...
Read more
View all