HomeCII/OTReport Reveals 1% of Security Flaws Account for Most Cyberattacks in 2025

Report Reveals 1% of Security Flaws Account for Most Cyberattacks in 2025

Published on

spot_img

New Report Reveals Alarming Trends in Cybersecurity Vulnerabilities

A recent investigation has shed light on a troubling aspect of cybersecurity, revealing that despite the thousands of security flaws reported yearly, most go unused. The findings come from the 2026 Exploit Intelligence Report released by the research firm VulnCheck, which provides a comprehensive analysis of attacker behavior over the past year. According to the report, out of approximately 48,000 security vulnerabilities (Common Vulnerabilities and Exposures, or CVEs) reported in 2025, only a mere 1% were exploited in real-world attacks. However, this small percentage of vulnerabilities had been subjected to exploitation at astonishing speed and intensity.

Key CVEs Under Fire: The Routinely Targeted List

VulnCheck’s research, shared exclusively with Hackread.com, highlights specific flaws that have become prime targets for hackers. At the forefront of this concerning list is React2Shell (CVE-2025-55182), a significant vulnerability that allows attackers to evade security measures on widely-used web platforms. After its discovery, some hacker groups were seen attempting to exploit this flaw within mere hours.

Moreover, business software has come under increased scrutiny, with vulnerabilities in Microsoft SharePoint (CVE-2025-53770) and SAP NetWeaver (CVE-2025-31324) being reported among the most frequently abused. Notably, the flaw affecting SAP had attracted attention as early as January 2025, a time when many organizations were unaware of its existence—indicating a troubling trend of preemptive exploit attempts well before flaws are officially documented.

The report emphasizes that many of these attacks are classified as zero-days, meaning victims are targeted before any potential fix could be implemented. Alarmingly, 56.4% of flaws associated with ransomware had been identified via these unforeseen attacks, contributing to a growing trend that leaves organizations vulnerable as they struggle to keep pace with threat actors.

Jacob Baines, the Chief Technology Officer at VulnCheck, remarked that although the number of frequently exploited vulnerabilities is relatively small, “those vulnerabilities are being weaponized faster and at greater scale.” This statement underscores the escalating sophistication and rapidity of cybercriminals exploiting even the slightest oversight in software security.

Global Rivals and Ransomware Gangs

The report further provides insight into the players behind these attacks. It indicates that threat actors linked to China experienced a staggering 52% increase in activity last year, in contrast to a 13% decline observed in other named state groups. The activities of Iranian groups, on the other hand, have noticeably diminished.

In addition to state-sponsored actors, notorious ransomware groups—including Cl0p, DragonForce, Earth Lamia, and RomCom—continue to maintain high levels of activity. These groups are increasingly targeting initial access points, employing more refined strategies to extract sensitive data from their targets. The report thereby illustrates a complex landscape of cybersecurity threats, suggesting that malicious entities are not solely motivated by financial gain but may also engage in sophisticated espionage.

The Rise of AI Slop

A noteworthy trend cited within the report is the increase in what the authors refer to as "AI-generated slop." In 2025, VulnCheck recorded over 14,400 exploits linked to roughly 10,480 unique flaws, representing a 16.5% rise compared to the previous year. The proliferation of AI-generated code—often faulty and ineffective—poses a unique risk by inundating networks with false signals. This saturation complicates the task for human defenders who must differentiate between genuine threats and misleading noise.

The danger persists as the report indicates that in the previous year, 884 vulnerabilities were added to VulnCheck’s database of known exploits, with nearly half being newly discovered in 2025. Approximately one-third of ransomware-related flaws still lacked a public fix as 2026 commenced, highlighting the immense challenge organizations face in staying ahead of cybercriminal tactics.

The overarching conclusion of the report is glaringly clear: although the detection of vulnerabilities is on the rise, the capacity to remediate these flaws and fully protect systems remains insufficient and outpaced by the ever-evolving strategies of cybercriminals. The urgent question for stakeholders remains how to bridge this widening gap in cybersecurity.

Source link

Latest articles

Strategies to Reduce MTTR by Enhancing Threat Visibility in Your SOC

Understanding Mean Time to Respond (MTTR): A Metric of Organizational Resilience In today’s dynamic corporate...

Entra ID OAuth Consent Grants ChatGPT Access to Emails

Research Uncovers Security Risks in App Permissions: The Case of ChatGPT In a digital age...

Claude Previously Stole Mexican Data

Hacker Exploits Anthropic's AI to Launch Phishing Campaign A recent incident has revealed the vulnerabilities...

More like this

Strategies to Reduce MTTR by Enhancing Threat Visibility in Your SOC

Understanding Mean Time to Respond (MTTR): A Metric of Organizational Resilience In today’s dynamic corporate...

Entra ID OAuth Consent Grants ChatGPT Access to Emails

Research Uncovers Security Risks in App Permissions: The Case of ChatGPT In a digital age...

Claude Previously Stole Mexican Data

Hacker Exploits Anthropic's AI to Launch Phishing Campaign A recent incident has revealed the vulnerabilities...