Only one in 20 vulnerabilities are exploited in the wild, claim researchers

clock • 3 min read

Of 76,000 security flaws unearthed between 2009 and 2018, only 4,183 were exploited in the wilds by attackers

Only 5.5 per cent of all vulnerabilities present in computing systems are ever exploited in the wild. That's according a new study by a joint team of researchers from Cyentia, RAND Corporation, ...

To continue reading this article...

Join Computing

  • Unlimited access to real-time news, analysis and opinion from the technology industry
  • Receive important and breaking news in our daily newsletter
  • Be the first to hear about our events and awards programmes
  • Join live member only interviews with IT leaders at the ‘IT Lounge’; your chance to ask your burning tech questions and have them answered
  • Access to the Computing Delta hub providing market intelligence and research
  • Receive our members-only newsletter with exclusive opinion pieces from senior IT Leaders

Join now

 

Already a Computing member?

Login

You may also like
Cisco fixes critical bugs in Small Business Series switches

Threats and Risks

Proof-of-concept exploit codes are available

clock 18 May 2023 • 3 min read
'A unique integration': How Direct Line Group made the hybrid workspace more efficient and safer

Security

A clear brief is key – but don’t let it become a restriction

clock 24 April 2023 • 3 min read
Zoom fixes dangerous flaw on Mac - for the third time

Threats and Risks

Security researcher finds that the squeaky wheel gets the grease

clock 15 August 2022 • 1 min read

Sign up to our newsletter

The best news, stories, features and photos from the day in one perfectly formed email.

More on Security

Asian Tech Roundup: Pressure grows in US-China trade war

Asian Tech Roundup: Pressure grows in US-China trade war

Plus: Google 'accidentally' deletes pension fund's cloud account

Tom Allen
clock 17 May 2024 • 4 min read
Maritime security: 'Hacking a ship is just like hacking a Tesla but bigger'

Maritime security: 'Hacking a ship is just like hacking a Tesla but bigger'

Cyberattacks on shipping up 400-500% in five years, Lloyds List Intelligence

John Leonard
clock 16 May 2024 • 4 min read
Tories self-refer to ICO over data breach

Tories self-refer to ICO over data breach

Revealed hundreds of personal email addresses by forgetting to BCC

Tom Allen
clock 15 May 2024 • 2 min read