1、Hacker-PoweredSecurity Report8th Edition2024/2025151418Executive SummaryThe Impact of AI on Security Research and Vulnerability ManagementSecurity Researchers Expand Their Expertise Into AI,APIs,and MoreRun a Top-Tier Program That Wont Break the BankTable of ContentsContentThe Top Ten Vulnerabilitie
2、s Need to Change29Media and EntertainmentComputer SoftwareInternet and Online ServicesCrypto and BlockchainTravel and HospitalityFinancial ServicesGovernmentTelecomsRetail and E-commerceTransportationThe Best Defense Has Layers of DepthMeasuring Success:Invest in Returnon MitigationConclusion556063C
3、ontentTable of Contents,Cont.Executive SummaryCyberthreats arealways evolving.So must your defenses.Faster,smarter,andalways ahead.Every organization is a technology organization.Car manufacturers,governmentagencies,and banks do very different things,but they all conduct business digitally.With AI d
4、eploymentsas well as AI-powered threat actorsnow mainstream,thedigital threat landscape is growing and changing faster than ever.Just a few years ago,organizations only had to worry about one OWASP Top 10 list.Now there are OWASP Top 10 lists for mobile security,LLMs and more.Whats next?And how do y
5、ou stay ahead of it all?Weve been watching these trends and reporting on them for over eight years now inthe Hacker-Powered Security Report.Read on to learn about the impact of AI onsecurity research,what the researchers themselves are thinking and seeing,industrytrends,and more.We report on the top
6、 vulnerability types,and how the most resilientcompanies have adopted a defense-in-depth strategy,fortifying every layer of theirsecurity posture and using continuous vulnerability testing throughout the softwaredevelopment life cycle.1|8th Annual Hacker-Powered Security Report|Human-powered,AI-enab