Mandiant researchers found that over 90 zero-day vulnerabilities and more than 40 known vulnerabilities were exploited in the wild.
Vulnerabilities Exploited:
By infosecbulletin
/ Saturday , February 22 2025
On February 19, 2025, the illegal marketplace B1ack's Stash released over 1 million unique stolen credit and debit card details...
Read More
By infosecbulletin
/ Saturday , February 22 2025
Cisco Talos reported that Salt Typhoon, also known as FamousSparrow and GhostEmperor, has been spying on U.S. telecommunication providers using...
Read More
By infosecbulletin
/ Thursday , February 20 2025
A free tool is now available to scan public GitHub repositories for exposed AWS credentials. Security engineer Anmol Singh Yadav created...
Read More
By infosecbulletin
/ Thursday , February 20 2025
An unknown threat cluster has targeted European healthcare organizations, deploying PlugX and ShadowPad. In some cases, these intrusions resulted in...
Read More
By infosecbulletin
/ Thursday , February 20 2025
Citrix has issued security updates for a serious vulnerability in the NetScaler Console and NetScaler Agent that could allow privilege...
Read More
By infosecbulletin
/ Thursday , February 20 2025
The FBI and CISA reported on Wednesday that the ransomware group Ghost has been exploiting software and firmware vulnerabilities as...
Read More
By infosecbulletin
/ Thursday , February 20 2025
Palo Alto Networks has issued urgent warnings about threat actors to exploit vulnerabilities in PAN-OS, the operating system powering its...
Read More
By infosecbulletin
/ Tuesday , February 18 2025
Indian government and educational websites, along with reputable financial brands, have experienced SEO poisoning, causing user traffic to be redirected...
Read More
By infosecbulletin
/ Tuesday , February 18 2025
The Cyber Threat Intelligence Unit of BGD e-GOV CIRT has found 600 vulnerable PRTG instances in Bangladesh, affected by the...
Read More
By infosecbulletin
/ Monday , February 17 2025
Amazon Web Services (AWS) has been named in an FIR after a builder claimed damages to the tune of Rs...
Read More
A comprehensive vulnerability analysis by “Mandiant” for 2023 uncovered “138” actively exploited “security vulnerabilities.”
They identified a significant prevalence of “97 zero-day vulnerabilities” and “41 n-day vulnerabilities” (the latter being exploited following the implementation of their respective patches). (those exploited after patch release).
The key finding was the considerable decrease in “Time-to-Exploit” (“TTE”), which fell to an average of just five days in 2023, compared to “32 days in 2021-2022,” “44 days in 2020-2021,” and “63 days in 2018-2019.”
The ratio of “n-day” to “zero-day” exploits changed to “30:70 in 2023,” down from the earlier ratio of about “38:62,” indicating a marked rise in “zero-day exploitation activities.”
Besides this, for “n-day vulnerabilities” specifically the exploitation timeline showed concerning trends:-
12% (5 vulnerabilities) were exploited within 24 hours of patch release.
29% (12 vulnerabilities) were exploited within a week.
56% were exploited within the first month.
A key case study is “CVE-2023-28121,” a vulnerability in the WooCommerce Payments plugin. This flaw highlighted how the availability of an exploit affected the timing of attacks, which occurred three months after it was disclosed.
Within three days of a weaponized exploit’s release, there were 1.3 million attacks per day.
Oracle Security Update, 334 Vulnerabilities Patched