Technology NewsTechnology NewsTechnology News
  • Computing
  • AI
  • Robotics
  • Cybersecurity
  • Electric Vehicle
  • Wearables
  • Gaming
  • Space
Reading: Attackers Exploit One-Third of New Vulnerabilities Within a Day
Share
Font ResizerAa
Technology NewsTechnology News
Font ResizerAa
Search
  • Computing
  • AI
  • Robotics
  • Cybersecurity
  • Electric Vehicle
  • Wearables
  • Gaming
  • Space
Follow US
  • Cookie Policy (EU)
  • Contact
  • About
© 2025 NEWSLINKER - Powered by LK SOFTWARE
Cybersecurity

Attackers Exploit One-Third of New Vulnerabilities Within a Day

Highlights

  • Attackers exploit 33% of new vulnerabilities within a day.

  • Content management and network devices are top targets.

  • Timely patching and proactive security are essential.

Kaan Demirel
Last updated: 25 April, 2025 - 2:50 am 2:50 am
Kaan Demirel 3 weeks ago
Share
SHARE

Cyber attackers have intensified their efforts, swiftly exploiting nearly 33% of newly disclosed vulnerabilities within a single day in the first quarter of 2025, according to a recent report by VulnCheck. This rapid exploitation trend highlights the growing urgency for organizations to bolster their cybersecurity defenses and accelerate their vulnerability management practices to safeguard critical systems and data effectively.

Contents
Rapid Exploitation Rates ObservedMost Targeted Systems and SoftwareSources and Analysis of Exploitation Evidence

VulnCheck’s findings support multiple recent industry reports that indicate an increase in exploitation activities. Mandiant reported that exploits were the most common initial infection vector last year, representing one in every three attacks. Similarly, Verizon observed a 34% rise in exploited vulnerabilities, and IBM X-Force noted that exploitation of public-facing applications accounted for 30% of incident response cases.

Rapid Exploitation Rates Observed

During Q1 2025, VulnCheck identified 159 actively exploited vulnerabilities sourced from 50 different origins. Patrick Garrity, a security researcher at VulnCheck, emphasized the critical nature of these findings, stating,

“This demonstrates the need for defenders to move fast on emerging threats while continuing to burn down their vulnerability debt.”

The accelerated exploitation timeline indicates that threat actors are capitalizing on the brief window before organizations can implement necessary patches and security measures.

Most Targeted Systems and Software

Content management systems led the list of newly exploited vulnerabilities, followed closely by network edge devices, operating systems, open-source software, and server software. These categories predominantly include public-facing or user-accessible applications, making them prime targets for attackers seeking to gain unauthorized access or disrupt services. The reliance on such systems across various industries increases the criticality of securing these components promptly.

Sources and Analysis of Exploitation Evidence

Shadowserver was the leading source, providing evidence for 31 actively exploited vulnerabilities, while GreyNoise contributed 17 instances. The Cybersecurity and Infrastructure Security Agency added 12 software defects to its known exploited vulnerabilities catalog during the quarter. Additionally, the National Institute of Standards and Technology’s National Vulnerability Database analyzed nearly 43% of the identified vulnerabilities, with 25% still undergoing review or awaiting analysis.

The persistent targeting of network edge devices, such as VPNs, firewalls, and routers, remains a significant concern. With 29 new known exploited vulnerabilities identified in these critical devices and services in Q1, organizations must prioritize the security of their network perimeters to prevent unauthorized access and potential breaches.

Given the swift exploitation rates, organizations are urged to implement robust vulnerability management strategies, including timely patching, continuous monitoring, and leveraging threat intelligence services. By enhancing their security posture and reducing the time between vulnerability disclosure and remediation, businesses can better defend against the increasingly agile tactics of cyber attackers.

You can follow us on Youtube, Telegram, Facebook, Linkedin, Twitter ( X ), Mastodon and Bluesky

You Might Also Like

US Authorities Dismantle Botnets and Indict Foreign Nationals

SonicWall Customers Face Spike in Device Vulnerabilities

Cyberattack Forces PowerSchool to Face Extortion Scandal

CrowdStrike Faces Workforce Reduction Amid Financial Shifts

Authorities Seize DDoS Platforms in Multi-National Operation

Share This Article
Facebook Twitter Copy Link Print
Kaan Demirel
By Kaan Demirel
Kaan Demirel is a 28-year-old gaming enthusiast residing in Ankara. After graduating from the Statistics department of METU, he completed his master's degree in computer science. Kaan has a particular interest in strategy and simulation games and spends his free time playing competitive games and continuously learning new things about technology and game development. He is also interested in electric vehicles and cyber security. He works as a content editor at NewsLinker, where he leverages his passion for technology and gaming.
Previous Article CISA Appoints Madhu Gottumukkala as New Deputy Director
Next Article Wordle Unveils April 25 Puzzle with New Clues and Strategies

Stay Connected

6.2kLike
8kFollow
2.3kSubscribe
1.7kFollow

Latest News

UR15 Boosts Automation Speed in Key Industries
Robotics
NHTSA Questions Tesla’s Robotaxi Plans in Austin
Electric Vehicle
Tesla’s Secretive Test Car Activities Ignite Curiosity
Electric Vehicle
AI Reshapes Global Workforce Dynamics
AI Technology
Nvidia Faces Price Uncertainty Despite Tariff Agreement
Computing
NEWSLINKER – your premier source for the latest updates in ai, robotics, electric vehicle, gaming, and technology. We are dedicated to bringing you the most accurate, timely, and engaging content from across these dynamic industries. Join us on our journey of discovery and stay informed in this ever-evolving digital age.

ARTIFICAL INTELLIGENCE

  • Can Artificial Intelligence Achieve Consciousness?
  • What is Artificial Intelligence (AI)?
  • How does Artificial Intelligence Work?
  • Will AI Take Over the World?
  • What Is OpenAI?
  • What is Artifical General Intelligence?

ELECTRIC VEHICLE

  • What is Electric Vehicle in Simple Words?
  • How do Electric Cars Work?
  • What is the Advantage and Disadvantage of Electric Cars?
  • Is Electric Car the Future?

RESEARCH

  • Robotics Market Research & Report
  • Everything you need to know about IoT
  • What Is Wearable Technology?
  • What is FANUC Robotics?
  • What is Anthropic AI?
Technology NewsTechnology News
Follow US
About Us   -  Cookie Policy   -   Contact

© 2025 NEWSLINKER. Powered by LK SOFTWARE
Welcome Back!

Sign in to your account

Register Lost your password?