Hackers Now Faster At Exploiting Bugs

Share post:

The average time to exploit bugs has gone down from 42 days in 2020 to 21 days in 2021.

According to Rapid7’s new 2021 Vulnerability Intelligence Report, this signifies a 71% decrease in ‘time to known exploitation.”

Rapid7’s report highlights several startling trends including the fact that 52% of widespread threats started with a zero-day exploit. Unlike the past few years, 85% of zero-day exploits in 2021 targeted many organizations rather than just a few.

The increase in zero-day attacks is fuelled by the proliferation of affiliates supporting the ransomware industry, which is now dominated by the ransomware-as-a-service model.

In 2021, Rapid7 tracked 33 flaws considered to be “widespread,” 10 flaws “exploited in the wild,” 7 “impending” flaws.

The “widespread” flaws include enterprise software from SAP, Zyxel, SonicWall, Accession, VMware, Microsoft Exchange (the ProxyLogon bugs), F5, GitLan, Pulse Connect, QNAP, Forgerock, Microsoft Windows, Kaseya, SolarWinds, Atlassian, Zoho, Apache HTTP Server, and Apache Log4j.

The US Cybersecurity and Infrastructure Security Agency’s constant update of flaws and patch warnings have however been significant in bringing these flaws into the limelight.

For more information, read the original story in ZDNet.

SUBSCRIBE NOW

Related articles

North Korean hacker infiltrates US security vendor, loads malware

KnowBe4, a US-based security vendor, unknowingly hired a North Korean hacker who attempted to introduce malware into the...

CrowdStrike releases an update from initial Post Incident Review: Hashtag Trending Special Edition for Thursday July 25, 2024

Security vendor CrowdStrike released an update on from their initial Post Incident Review today. The first, and most surprising...

Security vendor CrowdStrike issues an update from their initial Post Incident Review

Security vendor CrowdStrike released an update from their initial Post Incident Review (PIR) today. The company's CEO has...

CrowdStrike CEO summoned by Homeland Security committee over software disaster

CrowdStrike CEO George Kurtz has been called to testify before the U.S. House Committee on Homeland Security following...

Become a member

New, Relevant Tech Stories. Our article selection is done by industry professionals. Our writers summarize them to give you the key takeaways