Close Menu
  • Academy
  • Events
  • Identity
  • International
  • Inventions
  • Startups
    • Sustainability
  • Tech
  • Spanish
What's Hot

How a hardware wallet protects your private key: Security and safety instructions

Cartoonist Paul Pope is more worried about killer robots than AI plagiarism

Review Week: Meta reveals Oakley Smart Glasses

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Academy
  • Events
  • Identity
  • International
  • Inventions
  • Startups
    • Sustainability
  • Tech
  • Spanish
Fyself News
Home » 159 CVEs misappropriated in Q1 2025 – 28.3% within 24 hours of disclosure
Identity

159 CVEs misappropriated in Q1 2025 – 28.3% within 24 hours of disclosure

userBy userApril 24, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

April 24, 2025Ravi LakshmananVulnerability/Threat Intelligence

159 CVE

In the first quarter of 2025, 159 CVE identifiers were flagged as being misused in the wild since 151 quarter of 2024.

“The vulnerabilities continue to believe that the vulnerabilities are being exploited at a fast pace, as 28.3% of vulnerabilities have been exploited within one day of CVE disclosure,” Vulncheck said in a report shared with Hacker News.

This leads to 45 security flaws weaponized in actual attacks within one day of disclosure. Within a month, 14 other flaws were exploited, and within a year, 45 more were abused.

The cybersecurity company said that the majority of the exploited vulnerabilities have been identified in content management systems (CMSES), followed by network edge devices, operating systems, open source software and server software.

Cybersecurity

The breakdown is as follows –

Content Management System (CMS) (35) Network Edge Devices (29) Operating System (24) Open Source Software (14) Server Software (14)

The major vendors and their products exploited during the period are Microsoft Windows (15), Broadcom VMware (6), Cyber ​​Powerpanel (5), Litespeed Technologies (4), and Totolink Routers (4).

“On average, 11.4 kevs were disclosed weekly, with 53 being disclosed per month,” Vulncheck said. “Cisa Kev added 80 vulnerabilities in the quarter, but only 12 people showed no prior public evidence of exploitation.”

Of the 159 vulnerabilities, 25.8% are known to be awaiting or analyzing the NIST National Ulnerability Database (NVD), while 3.1% have been assigned a new “Deferred” status.

According to Verizon’s newly released data breach investigation report in 2025, leveraging vulnerabilities as an initial access step for data breaches has increased by 34%, accounting for 20% of all intrusions.

Data collected by Google-owned Mandiant also revealed that exploits were the most frequently observed early infection vector for the fifth consecutive year, and that stolen qualifications overtook phishing as the second most frequently observed early access vector.

Cybersecurity

“33% started with exploitation of vulnerabilities due to invasions where early infection vectors were identified,” Mandian said. “This is a decline since 2023, during which exploits represented 38% of early invasion vectors, which is roughly the same as the 2022 exploit percentage.”

That said, despite the attackers’ efforts to avoid detection, defenders continue to improve on identifying compromises.

The median global dwell time, which refers to the number of days an attacker has in the system from compromise to detection, is fixed at 11 days, an increase of one day since 2023.

Did you find this article interesting? Follow us on Twitter and LinkedIn to read exclusive content you post.

Source link

Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleNew materials promise flexible thermoelectric semiconductors
Next Article A flaw in the critical Commvault command center allows attackers to execute code remotely
user
  • Website

Related Posts

Spiders scattered behind M&S and cooperative cyberattacks, with up to $592 million in damages

June 21, 2025

Qilin ransomware adds “Cole Lawyer” feature that puts pressure on victims for larger ransoms

June 20, 2025

Television in Iranian states hijacked mid-distance broadcasts amid geopolitical tensions. $90 million stolen from Crypto Heist

June 20, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

How a hardware wallet protects your private key: Security and safety instructions

Cartoonist Paul Pope is more worried about killer robots than AI plagiarism

Review Week: Meta reveals Oakley Smart Glasses

Spiders scattered behind M&S and cooperative cyberattacks, with up to $592 million in damages

Trending Posts

Sana Yousaf, who was the Pakistani Tiktok star shot by gunmen? |Crime News

June 4, 2025

Trump says it’s difficult to make a deal with China’s xi’ amid trade disputes | Donald Trump News

June 4, 2025

Iraq’s Jewish Community Saves Forgotten Shrine Religious News

June 4, 2025

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

How a hardware wallet protects your private key: Security and safety instructions

Top Startups and High-Tech Funding News for the Weekly Ends June 20, 2025

Apple is talking to you to win AI startup confusion

Mira Murati’s AI Startup Thinking Machine Lab emerges from stealth at $20 billion seed and $1 billion valuation

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.