Close Menu
Indo Guard OnlineIndo Guard Online
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
What's Hot

New Httpbot Botnet Launches 200+ Precision Ddos Attacks to Game and Technology Sectors

May 16, 2025

10 best practices for effective data protection

May 16, 2025

Rat Remcos delivered via LNK files and mshta in attacks based on PowerShell

May 16, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram YouTube
Indo Guard OnlineIndo Guard Online
Subscribe
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
Indo Guard OnlineIndo Guard Online
Home » 159 CVE, which are operated in Q1 2025 – 28.3% over 24 hours after disclosure
Global Security

159 CVE, which are operated in Q1 2025 – 28.3% over 24 hours after disclosure

AdminBy AdminApril 24, 2025No Comments3 Mins Read
159 CVEs
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link


April 24, 2025Red LakshmananVulnerability / intelligence threats

159 Cves

In the first quarter of 2025, 159 CVE identifiers were noted, which were used in the wild, which compared to 151 in the 4th quarter of 2024.

“We still see how vulnerabilities are used at a rapid pace when 28.3% vulnerabilities are used during the 1st day disclosure CV report Share with Hacker News.

This means 45 security deficiencies that were armed in real attacks during the disclosure day. Fourteen other disadvantages were used within a month, and 45 more disadvantages were abused during the year.

Cybersecurity company said most of the exploited vulnerabilities were identified in content control systems (CMSE), followed by networking devices, operating systems, open source software and server software.

Cybersecurity

The assembly is –

  • Content control systems (CMS) (35)
  • DEPTS Network Edge (29)
  • Operating systems (24)
  • Open source software (14)
  • Server software (14)

The leading suppliers and their products that are operated during the time period are Microsoft Windows (15), Broadcom VMware (6), Cyber ​​PowerPanel (5), Litespeed Technologies (4) and Totolink Routers (4).

“On average, 11.4 Que were disclosed weekly and 53 a month,” Volnchek said. “While Cisa Kev added 80 vulnerabilities for the quarter, only 12 did not show previous public evidence of exploitation.”

Of the 159 vulnerabilities, 25.8% expect or undergo a NIST (NVD) national vulnerability analysis and 3.1% were assigned a new “deferred” status.

According to the recently released verizon Report on Data Investigation In 2025, the operation of vulnerabilities as an initial access stage for data violation increased by 34%, which is 20% of all penetration.

The data collected by Google Mandiant also showed that the feats were the most commonly observed vector of the fifth -year infection, with stolen credentials overtake phishing as the second most commonly observed with the initial vector.

Cybersecurity

“For penetration in which the initial vector of infection was discovered, 33% began with the operation of vulnerability,” Mandiant – Note. “This is a decrease since 2023, during which the exploits represented the original vector for 38% penetration, but almost identical to the feats in 2022, 32%.”

Given this, despite the efforts of the attackers to evade detection, the defenders continue to better determine the compromises.

Global Medium Matty Time that refers to the number of days when the attacker is on the system from compromise to detection, was tied up to 11 days while Increase one day since 2023.

Found this article interesting? Keep track of us further Youter  and LinkedIn To read more exclusive content we publish.





Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Admin
  • Website

Related Posts

New Httpbot Botnet Launches 200+ Precision Ddos Attacks to Game and Technology Sectors

May 16, 2025

10 best practices for effective data protection

May 16, 2025

Rat Remcos delivered via LNK files and mshta in attacks based on PowerShell

May 16, 2025

Researchers put up new flaws of the Intel processor that allows for memory leaks and attacks Spectre V2

May 16, 2025

Learn the smarter way to protect modern applications

May 16, 2025

Meta to train AI on EU users since May 27 without consent; NOIB is threatened by lawsuits

May 15, 2025
Add A Comment
Leave A Reply Cancel Reply

Loading poll ...
Coming Soon
Do You Like Our Website
: {{ tsp_total }}

Subscribe to Updates

Get the latest security news from Indoguardonline.com

Latest Posts

New Httpbot Botnet Launches 200+ Precision Ddos Attacks to Game and Technology Sectors

May 16, 2025

10 best practices for effective data protection

May 16, 2025

Rat Remcos delivered via LNK files and mshta in attacks based on PowerShell

May 16, 2025

Researchers put up new flaws of the Intel processor that allows for memory leaks and attacks Spectre V2

May 16, 2025

Learn the smarter way to protect modern applications

May 16, 2025

Meta to train AI on EU users since May 27 without consent; NOIB is threatened by lawsuits

May 15, 2025

Coinbase agents are bribed, data ~ 1% of users were traced; Attempted extortion of $ 20 million will not succeed

May 15, 2025

NPM malicious package uses Unicode Steganography, Google Calendar as C2 Chroper

May 15, 2025
About Us
About Us

Provide a constantly updating feed of the latest security news and developments specific to Indonesia.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

New Httpbot Botnet Launches 200+ Precision Ddos Attacks to Game and Technology Sectors

May 16, 2025

10 best practices for effective data protection

May 16, 2025

Rat Remcos delivered via LNK files and mshta in attacks based on PowerShell

May 16, 2025
Most Popular

In Indonesia, crippling immigration ransomware breach sparks privacy crisis

July 6, 2024

Why Indonesia’s Data Breach Crisis Calls for Better Security

July 6, 2024

Indonesia’s plan to integrate 27,000 govt apps in one platform welcomed but data security concerns linger

July 6, 2024
© 2025 indoguardonline.com
  • Home
  • About us
  • Contact us
  • Privacy Policy

Type above and press Enter to search. Press Esc to cancel.