Ptechhub
  • News
  • Industries
    • Enterprise IT
    • AI & ML
    • Cybersecurity
    • Finance
    • Telco
  • Brand Hub
    • Lifesight
  • Blogs
No Result
View All Result
  • News
  • Industries
    • Enterprise IT
    • AI & ML
    • Cybersecurity
    • Finance
    • Telco
  • Brand Hub
    • Lifesight
  • Blogs
No Result
View All Result
PtechHub
No Result
View All Result

Software vulnerabilities are being weaponized faster than ever

By CIO Dive by By CIO Dive
February 26, 2026
Home Enterprise IT
Share on FacebookShare on Twitter


Less than 1% of software vulnerabilities were exploited in the wild over the past year, but those flaws are being weaponized faster and on a larger scale than ever before, according to a report released Wednesday by VulnCheck. 

Researchers tracked more than 14,400 exploits linked to about 10,500 unique CVEs in 2025, representing a 16.5% increase from the prior year. A large percentage of that increase was linked proof-of-concept code that was generated by AI. 

Researchers cautioned that much of that AI-generated code was non-functional. 

The results highlight the difficulties security teams have in prioritizing which are the most serious threats that need to be investigated. Threat groups are increasingly able to weaponize flaws before network defenders can apply security patches and take other mitigation measures.

“Defenders have long taken the availability of public exploit code as a significant risk signal,” Caitlin Condon, vice president, security research at VulnCheck, told Cybersecurity Dive. 

Condon said the research shows that an overwhelming amount of AI-generated information is creating problems for defenders trying to judge what are legitimate threats and what can be ignored.

More than 50% of CVEs linked to ransomware were first identified as a result of a zero-day vulnerability.  

React2Shell, tracked as CVE-2025-55182, was the top vulnerability of 2025, with 236 known exploits. 

A Microsoft Sharepoint vulnerability, tracked as CVE-2025-53770, had 36 known exploits.



Source link

By CIO Dive

By CIO Dive

Next Post
Expert Recommends: Prepare for PQC Right Now

Expert Recommends: Prepare for PQC Right Now

Recommended.

The Social App – Translr Employs Efficient Strategies to Reduce Trans Gender Disclosure Anxiety

The Social App – Translr Employs Efficient Strategies to Reduce Trans Gender Disclosure Anxiety

August 13, 2025
2026 Partner Program Guide: 5-Star Security Vendor Programs

2026 Partner Program Guide: 5-Star Security Vendor Programs

February 27, 2026

Trending.

Weibo Publishes 2025 Environmental, Social and Governance Report

Weibo Publishes 2025 Environmental, Social and Governance Report

April 28, 2026
It Takes 2 Minutes to Hack the EU’s New Age-Verification App

It Takes 2 Minutes to Hack the EU’s New Age-Verification App

April 18, 2026
CTIA Names Preston Wise Senior Vice President of External and State Affairs

CTIA Names Preston Wise Senior Vice President of External and State Affairs

May 6, 2026
The AI Correction Will Not Be Evenly Distributed | Computer Weekly

The AI Correction Will Not Be Evenly Distributed | Computer Weekly

May 5, 2026
Match Group Announces First Quarter Results

Match Group Announces First Quarter Results

May 5, 2026

PTechHub

A tech news platform delivering fresh perspectives, critical insights, and in-depth reporting — beyond the buzz. We cover innovation, policy, and digital culture with clarity, independence, and a sharp editorial edge.

Follow Us

Industries

  • AI & ML
  • Cybersecurity
  • Enterprise IT
  • Finance
  • Telco

Navigation

  • About
  • Advertise
  • Privacy & Policy
  • Contact

Subscribe to Our Newsletter

  • About
  • Advertise
  • Privacy & Policy
  • Contact

Copyright © 2025 | Powered By Porpholio

No Result
View All Result
  • News
  • Industries
    • Enterprise IT
    • AI & ML
    • Cybersecurity
    • Finance
    • Telco
  • Brand Hub
    • Lifesight
  • Blogs

Copyright © 2025 | Powered By Porpholio