Vulnerability exploitation now primary origin of data breaches | Computer Weekly
Briefly

Vulnerability exploitation now primary origin of data breaches | Computer Weekly
"Approximately 31% - close to a third - of all data breaches now begin with the exploitation of some form of software vulnerability by a malicious actor, surpassing credential theft as the number one network entry point for the first time."
"Verizon said the rapid weaponisation of known vulnerabilities was creating a capacity crisis for cyber professionals, underscoring an "urgent need" to prioritise the fundamental tenets of cyber security and risk management."
""While the velocity of cyber threats - driven by AI and faster vulnerability exploitation - is increasing, the foundational principles of security and strong risk management remain the most effective defence," said Daniel Lawson, Verizon Business senior vice president of global solutions. "The DBIR reinforces that these fundamentals still hold as organizations strive for resilience.""
""31% of breaches now start with an unpatched vulnerability, overtaking stolen credentials as the number one way in. Only 26% of Cisa Kev vulnerabilities were fully remediated last year, and the median tim""
About 31% of data breaches begin with exploitation of software vulnerabilities, surpassing credential theft as the leading network entry point. Findings from Verizon’s 19th annual Data Breach Investigations Report indicate AI is accelerating threat velocity and vulnerability exploitation. The report warns of a capacity crisis for cyber professionals and calls for urgent prioritization of core security principles and risk management. Recommendations for 2026 include preparing for increased patching demands, integrating AI into secure-by-design approaches, and using AI within defense-in-depth strategies. Vulnerability management pain points are reinforced by low remediation rates for CISA KEV vulnerabilities and a median time to remediate that remains too long.
Read at ComputerWeekly.com
Unable to calculate read time
[
|
]