If you took all vulnerability exploitation attempts targeting your organization and grouped them into three buckets of new, active, and dormant - it might look like this.
The blue is the proportion of "active" exploits that your sensors have registered in the recent past.
Exploits represented by the teal area have been attacked in the past but have gone dormant for a time (it's been a while since you've seen them).
The red undercurrent corresponds to new exploits never seen before.
My takeaway? Newly exploited vulns get the most *attention*, but
the older ones get the most *action*.
#vulnerabilitymanagement #vulnerability #vulnerabilities
#vulnerability_exploits #exploit #exploitation #cyberattack #cyberattacks #epss #cvss #kev
This comes from a brand new Cyentia Institute study exploring years of exploitation activity. It's available here with no registration required: https://www.cyentia.com/epss-study/