Ptechhub
  • News
  • Industries
    • Enterprise IT
    • AI & ML
    • Cybersecurity
    • Finance
    • Telco
  • Brand Hub
    • Lifesight
  • Blogs
No Result
View All Result
  • News
  • Industries
    • Enterprise IT
    • AI & ML
    • Cybersecurity
    • Finance
    • Telco
  • Brand Hub
    • Lifesight
  • Blogs
No Result
View All Result
PtechHub
No Result
View All Result

Software vulnerabilities are being weaponized faster than ever

By CIO Dive by By CIO Dive
February 26, 2026
Home Enterprise IT
Share on FacebookShare on Twitter


Less than 1% of software vulnerabilities were exploited in the wild over the past year, but those flaws are being weaponized faster and on a larger scale than ever before, according to a report released Wednesday by VulnCheck. 

Researchers tracked more than 14,400 exploits linked to about 10,500 unique CVEs in 2025, representing a 16.5% increase from the prior year. A large percentage of that increase was linked proof-of-concept code that was generated by AI. 

Researchers cautioned that much of that AI-generated code was non-functional. 

The results highlight the difficulties security teams have in prioritizing which are the most serious threats that need to be investigated. Threat groups are increasingly able to weaponize flaws before network defenders can apply security patches and take other mitigation measures.

“Defenders have long taken the availability of public exploit code as a significant risk signal,” Caitlin Condon, vice president, security research at VulnCheck, told Cybersecurity Dive. 

Condon said the research shows that an overwhelming amount of AI-generated information is creating problems for defenders trying to judge what are legitimate threats and what can be ignored.

More than 50% of CVEs linked to ransomware were first identified as a result of a zero-day vulnerability.  

React2Shell, tracked as CVE-2025-55182, was the top vulnerability of 2025, with 236 known exploits. 

A Microsoft Sharepoint vulnerability, tracked as CVE-2025-53770, had 36 known exploits.



Source link

By CIO Dive

By CIO Dive

Next Post
Expert Recommends: Prepare for PQC Right Now

Expert Recommends: Prepare for PQC Right Now

Recommended.

Employees Searching Payroll Portals on Google Tricked Into Sending Paychecks to Hackers

Employees Searching Payroll Portals on Google Tricked Into Sending Paychecks to Hackers

May 27, 2025
Bandwidth to Report First Quarter 2025 Financial Results on May 7, 2025

Bandwidth to Report First Quarter 2025 Financial Results on May 7, 2025

April 15, 2025

Trending.

Wesco Declares Quarterly Dividend on Common Stock

Wesco Declares Quarterly Dividend on Common Stock

December 1, 2025
HeyGears Launches Reflex 2 Series 3D Printers – Enabling Users to Go Beyond Prototypes and Start Production

HeyGears Launches Reflex 2 Series 3D Printers – Enabling Users to Go Beyond Prototypes and Start Production

October 24, 2025
⚡ THN Weekly Recap: New Attacks, Old Tricks, Bigger Impact

⚡ THN Weekly Recap: New Attacks, Old Tricks, Bigger Impact

March 10, 2025
Bloody Wolf Targets Uzbekistan, Russia Using NetSupport RAT in Spear-Phishing Campaign

Bloody Wolf Targets Uzbekistan, Russia Using NetSupport RAT in Spear-Phishing Campaign

February 9, 2026
Passwd: A walkthrough of the Google Workspace Password Manager

Passwd: A walkthrough of the Google Workspace Password Manager

December 23, 2025

PTechHub

A tech news platform delivering fresh perspectives, critical insights, and in-depth reporting — beyond the buzz. We cover innovation, policy, and digital culture with clarity, independence, and a sharp editorial edge.

Follow Us

Industries

  • AI & ML
  • Cybersecurity
  • Enterprise IT
  • Finance
  • Telco

Navigation

  • About
  • Advertise
  • Privacy & Policy
  • Contact

Subscribe to Our Newsletter

  • About
  • Advertise
  • Privacy & Policy
  • Contact

Copyright © 2025 | Powered By Porpholio

No Result
View All Result
  • News
  • Industries
    • Enterprise IT
    • AI & ML
    • Cybersecurity
    • Finance
    • Telco
  • Brand Hub
    • Lifesight
  • Blogs

Copyright © 2025 | Powered By Porpholio