Technology NewsTechnology NewsTechnology News
  • Computing
  • AI
  • Robotics
  • Cybersecurity
  • Electric Vehicle
  • Wearables
  • Gaming
  • Space
Reading: Attackers Exploit One-Third of New Vulnerabilities Within a Day
Share
Font ResizerAa
Technology NewsTechnology News
Font ResizerAa
Search
  • Computing
  • AI
  • Robotics
  • Cybersecurity
  • Electric Vehicle
  • Wearables
  • Gaming
  • Space
Follow US
  • Cookie Policy (EU)
  • Contact
  • About
© 2025 NEWSLINKER - Powered by LK SOFTWARE
Cybersecurity

Attackers Exploit One-Third of New Vulnerabilities Within a Day

Highlights

  • Attackers exploit 33% of new vulnerabilities within a day.

  • Content management and network devices are top targets.

  • Timely patching and proactive security are essential.

Kaan Demirel
Last updated: 25 April, 2025 - 2:50 am 2:50 am
Kaan Demirel 4 weeks ago
Share
SHARE

Cyber attackers have intensified their efforts, swiftly exploiting nearly 33% of newly disclosed vulnerabilities within a single day in the first quarter of 2025, according to a recent report by VulnCheck. This rapid exploitation trend highlights the growing urgency for organizations to bolster their cybersecurity defenses and accelerate their vulnerability management practices to safeguard critical systems and data effectively.

Contents
Rapid Exploitation Rates ObservedMost Targeted Systems and SoftwareSources and Analysis of Exploitation Evidence

VulnCheck’s findings support multiple recent industry reports that indicate an increase in exploitation activities. Mandiant reported that exploits were the most common initial infection vector last year, representing one in every three attacks. Similarly, Verizon observed a 34% rise in exploited vulnerabilities, and IBM X-Force noted that exploitation of public-facing applications accounted for 30% of incident response cases.

Rapid Exploitation Rates Observed

During Q1 2025, VulnCheck identified 159 actively exploited vulnerabilities sourced from 50 different origins. Patrick Garrity, a security researcher at VulnCheck, emphasized the critical nature of these findings, stating,

“This demonstrates the need for defenders to move fast on emerging threats while continuing to burn down their vulnerability debt.”

The accelerated exploitation timeline indicates that threat actors are capitalizing on the brief window before organizations can implement necessary patches and security measures.

Most Targeted Systems and Software

Content management systems led the list of newly exploited vulnerabilities, followed closely by network edge devices, operating systems, open-source software, and server software. These categories predominantly include public-facing or user-accessible applications, making them prime targets for attackers seeking to gain unauthorized access or disrupt services. The reliance on such systems across various industries increases the criticality of securing these components promptly.

Sources and Analysis of Exploitation Evidence

Shadowserver was the leading source, providing evidence for 31 actively exploited vulnerabilities, while GreyNoise contributed 17 instances. The Cybersecurity and Infrastructure Security Agency added 12 software defects to its known exploited vulnerabilities catalog during the quarter. Additionally, the National Institute of Standards and Technology’s National Vulnerability Database analyzed nearly 43% of the identified vulnerabilities, with 25% still undergoing review or awaiting analysis.

The persistent targeting of network edge devices, such as VPNs, firewalls, and routers, remains a significant concern. With 29 new known exploited vulnerabilities identified in these critical devices and services in Q1, organizations must prioritize the security of their network perimeters to prevent unauthorized access and potential breaches.

Given the swift exploitation rates, organizations are urged to implement robust vulnerability management strategies, including timely patching, continuous monitoring, and leveraging threat intelligence services. By enhancing their security posture and reducing the time between vulnerability disclosure and remediation, businesses can better defend against the increasingly agile tactics of cyber attackers.

You can follow us on Youtube, Telegram, Facebook, Linkedin, Twitter ( X ), Mastodon and Bluesky

You Might Also Like

Massachusetts Student Admits Guilt in Massive School Data Breach

Telecom Breach Leaves Executives Stunned as Government Faces Backlash

House Bill Proposes Overhaul for Federal Cyber Workforce Training

CIOs Tackle Quantum Threat in Encryption Race

FTC Seeks New Tools to Combat Deepfake Pornography

Share This Article
Facebook Twitter Copy Link Print
Kaan Demirel
By Kaan Demirel
Kaan Demirel is a 28-year-old gaming enthusiast residing in Ankara. After graduating from the Statistics department of METU, he completed his master's degree in computer science. Kaan has a particular interest in strategy and simulation games and spends his free time playing competitive games and continuously learning new things about technology and game development. He is also interested in electric vehicles and cyber security. He works as a content editor at NewsLinker, where he leverages his passion for technology and gaming.
Previous Article CISA Appoints Madhu Gottumukkala as New Deputy Director
Next Article Wordle Unveils April 25 Puzzle with New Clues and Strategies

Stay Connected

6.2kLike
8kFollow
2.3kSubscribe
1.7kFollow

Latest News

Sam Altman Backs Retro Biosciences for Life-Extending Therapies
Technology
TRON1 Robot Expands Capabilities with New Features
Robotics
Simbe Robots Boost Retail Efficiency with AI Innovations
Robotics
Tesla Prepares Massive Robotaxi Rollout in Austin
Electric Vehicle
Orbit 5.0 Powers Up Boston Dynamics’ Spot Robots
Robotics
NEWSLINKER – your premier source for the latest updates in ai, robotics, electric vehicle, gaming, and technology. We are dedicated to bringing you the most accurate, timely, and engaging content from across these dynamic industries. Join us on our journey of discovery and stay informed in this ever-evolving digital age.

ARTIFICAL INTELLIGENCE

  • Can Artificial Intelligence Achieve Consciousness?
  • What is Artificial Intelligence (AI)?
  • How does Artificial Intelligence Work?
  • Will AI Take Over the World?
  • What Is OpenAI?
  • What is Artifical General Intelligence?

ELECTRIC VEHICLE

  • What is Electric Vehicle in Simple Words?
  • How do Electric Cars Work?
  • What is the Advantage and Disadvantage of Electric Cars?
  • Is Electric Car the Future?

RESEARCH

  • Robotics Market Research & Report
  • Everything you need to know about IoT
  • What Is Wearable Technology?
  • What is FANUC Robotics?
  • What is Anthropic AI?
Technology NewsTechnology News
Follow US
About Us   -  Cookie Policy   -   Contact

© 2025 NEWSLINKER. Powered by LK SOFTWARE
Welcome Back!

Sign in to your account

Register Lost your password?