Skip to main content
  1. Home
  2. Computing
  3. News

Hackers now exploit new vulnerabilities in just 15 minutes

Add as a preferred source on Google

Hackers are now ​​moving faster than ever when it comes to scanning vulnerability announcements from software vendors.

Threat actors are actively scanning for vulnerable endpoints within a period of just 15 minutes once a new Common Vulnerabilities and Exposures (CVE) document is published, according to Palo Alto’s 2022 Unit 42 Incident Response Report.

A depiction of a hacker breaking into a system via the use of code.
Getty Images

As reported by Bleeping Computer, the report stresses how hackers are always scanning software vendor bulletin boards, which is where vulnerability announcements are disclosed in the form of CVEs.

Recommended Videos

From here, these threat actors can potentially exploit these details in order to infiltrate a corporate network. It also gives them an opportunity to distribute malicious code remotely.

“The 2022 Attack Surface Management Threat Report found that attackers typically start scanning for vulnerabilities within 15 minutes of a CVE being announced,” the blog post from Palo Alto’s Unit 42 states.

With hackers becoming more dangerous than ever in recent years, it can take them mere minutes to find a weak point in their target’s system. This is naturally made much easier if they’re aided by a report detailing what exactly can be exploited.

Simply put, system administrators will basically have to expedite their process in addressing the security defects and patch them before the hackers manage to find a way in.

Bleeping Computer highlights how scanning doesn’t require a threat actor to have much experience in the activity to be effective. In fact, anyone with a rudimentary understanding of scanning CVEs can perform a search on the web for any publicly disclosed vulnerable endpoints.

They can then offer such information on dark web markets for a fee, which is when hackers who actually know what they’re doing can buy them.

A large monitor displaying a security hacking breach warning.
Stock Depot / Getty Images

Case in point: Unit 42’s report mentioned CVE-2022-1388, a critical unauthenticated remote command execution vulnerability that was affecting F5 BIG-IP products. After the defect was announced on May 4, 2022, a staggering 2,552 scanning and exploitation attempts were detected within just 10 hours of the initial disclosure.

During the first half of 2022, 55% of exploited vulnerabilities in Unit 42 cases are attributed to ProxyShell, followed by Log4Shell (14%), SonicWall CVEs (7%), and ProxyLogon (5%).

Activity involving hackers, malware, and threat actors in general has evolved at an aggressive rate in recent months. For example, individuals and groups have found a way to plant malicious code onto motherboards that is extremely difficult to remove. Even the Microsoft Calculator app isn’t safe from exploitation.

This worrying state of affairs in the cyber security space has prompted Microsoft to launch a new initiative with its Security Experts program.

Zak Islam
Former Contributor
Zak covers the latest news in the technology world, particularly the computing field. A fan of anything pertaining to tech…
ChatGPT will now dole out finance tips if you connect your bank account. I won’t.
ChatGPT can now access your bank account to offer spending analysis and financial planning.
chatgpt-personal-finance

ChatGPT already knows a lot about you. OpenAI now wants to add your finances to that list. The company has launched a personal finance feature for ChatGPT, currently in preview for Pro subscribers in the US at $200 a month. OpenAI says it will expand to Plus users after gathering feedback from this early rollout.

It lets you connect your financial accounts through Plaid, a platform that bridges bank apps with third-party services and works with over 12,000 institutions, including Chase, Fidelity, Schwab, American Express, and more.

Read more
CleanShot X is my favorite Mac utility. Here are 8 features that will convince you, too.
Your Mac's built-in screenshot tool has been holding you back. It's time to upgrade.
Mac running CleanShot X

macOS has a built-in screenshot tool that gets the basics right. You can take a screenshot, record your screen, and even annotate your captures. But the moment you want something more, like scrolling capture, advanced annotation tools, or a quick way to share your screenshots via a link, it starts to fall apart.

That's where CleanShot X comes in. It's a powerful screenshot and screen recording app for Mac that replaces the built-in screenshot tool. It feels as if the developers looked at the screenshot features in macOS and added everything that was missing.

Read more
Wowed by computer-use AI agents? Research says they’re “digital disasters” even for routine tasks
Researchers tested 10 agents and models and found high rates of undesirable actions and real digital damage
ai-agent-handling-office-tasks

AI agents built to run everyday computer tasks have a serious context problem, according to new research from UC Riverside.

The team tested 10 agents and models from major developers, including OpenAI, Anthropic, Meta, Alibaba, and DeepSeek. On average, the agents took undesirable or potentially harmful actions 80% of the time and caused damage 41% of the time.

Read more