The document discusses how hackers are exploiting known vulnerabilities to steal servers and data. It summarizes statistics from a recent report that found hacking for financial gain and by hacktivists is increasingly targeting known vulnerabilities that are years old. The document then examines the Heartbleed vulnerability in depth, demonstrating how easy it is to exploit and retrieve private keys and sensitive data. It concludes with recommendations for mitigating risks from known vulnerabilities like patching servers and conducting network scans and vulnerability assessments.