Time for a bigger bucket—or at least a few hundred small buckets—to catch last year’s security flaws that slipped through the cracks.
Recent data from exploit-intel company VulnCheck revealed a lot more publicly reported vulnerabilities (and attacks on those vulnerabilities) than a year ago—a 20% annual increase, according to the firm, thanks to a greater number of available cyber-sharers out there.
“The sources are evolving and changing,” VulnCheck Security Researcher Patrick Garrity told IT Brew. He sees increased information sharing as a positive development, but one that tech pros have to scramble to digest.
“There’s a lot more organizations involved in information sharing and getting vulnerability exploitation disclosure out quicker, faster,” he said.
VulnCheck, in its Feb 3. report, claimed that 768 common vulnerabilities and exposures (CVEs) were publicly reported in 2024 as exploited—a significant annual uptick, thanks to additional reporting sources from the 2024 RSA conference, alerts from nonprofit Shadowserver, and disclosures from WordPress scanner Wordfence, Garrity said.
KEV’in! One major source of threat intel for IT pros has been the Known Exploited Vulnerabilities (KEV) catalog, established by CISA and considered by the agency to be “the authoritative source of vulnerabilities that have been exploited in the wild.”
VulnCheck’s reports show a majority of reported monthly vulnerabilities were not in the KEV. Garrity sees the KEV as a “good effort” but one “limited in scope.”
Keep reading here.—BH
|