Technology NewsTechnology NewsTechnology News
  • Computing
  • AI
  • Robotics
  • Cybersecurity
  • Electric Vehicle
  • Wearables
  • Gaming
  • Space
Reading: Cyberattackers Target Just 1% of 2025’s 40,000 New Vulnerabilities
Share
Font ResizerAa
Technology NewsTechnology News
Font ResizerAa
Search
  • Computing
  • AI
  • Robotics
  • Cybersecurity
  • Electric Vehicle
  • Wearables
  • Gaming
  • Space
Follow US
  • Cookie Policy (EU)
  • Contact
  • About
© 2025 NEWSLINKER - Powered by LK SOFTWARE
Cybersecurity

Cyberattackers Target Just 1% of 2025’s 40,000 New Vulnerabilities

Highlights

  • Just 1% of 2025’s new vulnerabilities were exploited in real attacks.

  • Major vendors like Microsoft and Ivanti saw the highest incidence of targeted flaws.

  • Prioritizing known exploited threats is essential for effective defense.

Samantha Reed
Last updated: 25 February, 2026 - 4:50 pm 4:50 pm
Samantha Reed 3 hours ago
Share
SHARE

Security professionals entered 2026 confronting an overwhelming landscape of newly documented software flaws, with a staggering 40,000 vulnerabilities reported throughout the previous year. Defenders and organizations found themselves tasked with sifting through vast lists of potential dangers, though only a fraction ever presented real-world risk. Many industry observers expressed growing concern that existing vulnerability scoring systems fail to guide resources effectively, as cybercriminals focus their efforts on a small number of high-value targets.

Contents
How Effective Are Existing Prioritization Methods?Which Products and Vendors Remain Major Targets?What Drives Attackers’ Choices?

Other years saw a similar explosion in vulnerability disclosures but lacked the current year’s stark disparity between sheer volume and those actually leveraged in attacks. Previously, emphasis on Common Vulnerability Scoring System (CVSS) ratings guided patch priorities, yet mounting data challenges this practice. Security teams, once reassured by severity scores, now struggle to keep pace as threat actors concentrate on only a handful of exploits. These developments point to a need for revised strategies in identifying and mitigating genuine threats.

How Effective Are Existing Prioritization Methods?

VulnCheck reported that just 1% of the vulnerabilities tracked in 2025—422 out of more than 40,000—were exploited in real-world incidents, bringing the necessity for improved risk assessment into focus. Many defenders mistakenly allocate resources to countless theoretical or unproven exploits, complicating security workflows. As highlighted by Caitlin Condon, Vice President of Security Research at VulnCheck,

“The growth in CVE volume is ludicrous, not necessarily unfounded, but it’s large. Defenders don’t know what to pay attention to.”

Which Products and Vendors Remain Major Targets?

Networks edge devices and widely deployed technologies faced persistent attacks, with 28% of all newly known exploited vulnerabilities affecting this category. Microsoft products accounted for nine of the top 50 most targeted flaws, while Ivanti, Fortinet, VMware, SonicWall, and Oracle each featured multiple high-profile vulnerabilities. Microsoft’s SharePoint alone suffered from four exploited zero-day vulnerabilities, impacting over 400 organizations, including several U.S. government departments. Meanwhile, the React2Shell flaw in React Server Components accumulated an extensive 236 public exploits soon after its disclosure, impacting numerous organizations worldwide.

What Drives Attackers’ Choices?

Attackers favor vulnerabilities in products occupying privileged positions in network infrastructure, utilizing automated analysis to uncover exploitable flaws in longstanding software code bases. Exploits often originate from both state-sponsored and cybercrime collectives, with most top threats linked to active ransomware and botnet campaigns. Defensive responses, however, lag behind, as patch reversals rapidly fuel new attack methods. Condon commented,

“Threat actors are much more organized presently than we all collectively are on defense.”

Overall research concludes that today’s technology landscape presents systemic challenges that extend beyond any single vendor. High-profile incidents involving Microsoft SharePoint and React2Shell exemplify persistent industry-wide risks. A clear lesson emerges: organizations cannot rely solely on volume-based or severity-driven vulnerability lists but must instead focus on active exploitation intelligence and attack patterns. Treating all newly discovered weaknesses as equally dangerous dilutes the effectiveness of defensive teams and siphons attention from the most pressing threats. Emphasizing coordinated information sharing, continuous monitoring, and adaptive mitigation based on real-world exploit data are vital. By critically reassessing traditional patching and risk assessment strategies in light of recent trends, organizations stand a better chance to protect themselves against the small portion of threats that matter most.

You can follow us on Youtube, Telegram, Facebook, Linkedin, Twitter ( X ), Mastodon and Bluesky

You Might Also Like

CISA Faces Ongoing Strain as Staff Cuts and Leadership Delays Weigh Down Agency

Chinese Law Enforcement Officer Relies on ChatGPT for Cyber Operations

US Court Sends Ex-L3Harris Executive to Prison for Zero-Day Deal

Attackers Breach Networks in Minutes, CrowdStrike Warns

Anthropic Launches AI Security Scanning for Claude Code Users

Share This Article
Facebook Twitter Copy Link Print
Samantha Reed
By Samantha Reed
Samantha Reed is a 40-year-old, New York-based technology and popular science editor with a degree in journalism. After beginning her career at various media outlets, her passion and area of expertise led her to a significant position at Newslinker. Specializing in tracking the latest developments in the world of technology and science, Samantha excels at presenting complex subjects in a clear and understandable manner to her readers. Through her work at Newslinker, she enlightens a knowledge-thirsty audience, highlighting the role of technology and science in our lives.
Previous Article Strava Guides Gym Users Through Enhanced Workout Features
Next Article Linux GPU Driver Upgrades Signal Boost for Gaming Experiences

Stay Connected

6.2kLike
8kFollow
2.3kSubscribe
1.7kFollow

Latest News

Tesla Phases Out Model S and X as Factory Shifts Focus
Electric Vehicle
Tesla Pushes Cybertruck Dual Motor AWD Deliveries to Fall 2026
Electric Vehicle
Sequans Launches 5G eRedCap, Iris RF at MWC 2026
IoT
Aeris and Verizon Business Simplify Global IoT Connectivity Worldwide
IoT
Wayve Secures $1.2B to Launch Robotaxi Trials in London
AI
NEWSLINKER – your premier source for the latest updates in ai, robotics, electric vehicle, gaming, and technology. We are dedicated to bringing you the most accurate, timely, and engaging content from across these dynamic industries. Join us on our journey of discovery and stay informed in this ever-evolving digital age.

ARTIFICAL INTELLIGENCE

  • Can Artificial Intelligence Achieve Consciousness?
  • What is Artificial Intelligence (AI)?
  • How does Artificial Intelligence Work?
  • Will AI Take Over the World?
  • What Is OpenAI?
  • What is Artifical General Intelligence?

ELECTRIC VEHICLE

  • What is Electric Vehicle in Simple Words?
  • How do Electric Cars Work?
  • What is the Advantage and Disadvantage of Electric Cars?
  • Is Electric Car the Future?

RESEARCH

  • Robotics Market Research & Report
  • Everything you need to know about IoT
  • What Is Wearable Technology?
  • What is FANUC Robotics?
  • What is Anthropic AI?
Technology NewsTechnology News
Follow US
About Us   -  Cookie Policy   -   Contact

© 2025 NEWSLINKER. Powered by LK SOFTWARE
Welcome Back!

Sign in to your account

Register Lost your password?