uses cookies to make interactions with the Company’s Websites easy and meaningful. When you visit one of the Company’s Websites,’s servers send a cookie to your computer. Standing alone, cookies do not personally identify you; they merely recognize your Web browser. Unless you choose to identify yourself to, either by responding to a promotional offer, opening an account, or filling out a Web form (such as a “Contact Us” or a “Free Trial” Web form), you remain anonymous to the Company. Please go to our privacy statement for details.


How Attackers Choose Which Vulnerabilities To Exploit

I loved the opening paragraph in a recent article titled, “How Attackers Choose Which Vulnerabilities To Exploit” by Michael Cobb, Contributing Writer at Dark Reading! Here’s the statement:

“It’s an old but true adage: To protect yourself against a criminal, you have to think like a criminal. This certainly applies to IT security professionals working to keep their organizations’ systems and data safe: To protect against a cyber attacker, you have to think like a cyber attacker.”

Think like a hacker

This is a philosophy and approach that is part of our culture and corporate DNA at NopSec. Our software-as-a-service, Unified VRM, grew out of penetration testing and continues to evolve as we learn more about our customers’ environments and make advances in our Intelligent Algorithm, which helps identify, validate, and prioritize vulnerabilities.

As mentioned in the Dark Reading article, and validated by our own experiences, most victims were not preselected but were chosen because the attacker found an easily exploitable weakness. In an earlier post on our blog, “Reduce your odds of needing “incident response” I remarked on the often repeated statement by our CIO, ““Not all vulnerabilities are created equal. The important ones are exploitable.”

Schedule a Product Demo Today!

See how NopSec's security insights and cyber threat exposure management platform can organize your security chaos.