Five Years Of Hardware And Software Threat Evolution