Hackers Exploit Software Flaws within Hours Forcing Urgent Push for Faster Patches

This rapidly shrinking window between vulnerability discovery and active exploitation forces organizations to rethink traditional patching cycles and implement more agile security responses. In April, Microsoft disclosed that a zero-day vulnerability in the Windows Common Log File System (CLFS), tracked as CVE-2025-29824, was actively exploited to deploy ransomware against organizations in multiple sectors, including IT, real estate, financial services, and retail. The race between cybersecurity professionals and malicious hackers has reached alarming speeds in 2025, with new data revealing that more than a quarter of software vulnerabilities are now exploited within 24 hours of disclosure. Despite progress in patching recent vulnerabilities, security experts warn that older, well-known flaws continue to pose significant risks. Similarly, the Onapsis Research Labs documented active exploitation of an SAP zero-day vulnerability (CVE-2025-31324) that began with reconnaissance activity in January 2025 and continued with exploitation attempts in February. The Cybersecurity and Infrastructure Security Agency (CISA) has been maintaining its Known Exploited Vulnerabilities (KEV) catalog, which appears to have a measurable impact. VMware users faced similar challenges when three zero-day vulnerabilities (CVE-2025-22224, CVE-2025-22225, and CVE-2025-22226) were discovered and actively exploited in March. The evidence demonstrates that traditional monthly patch cycles are no longer sufficient to protect against modern threats that can strike within hours of vulnerability disclosure. Security experts recommend several approaches to address the accelerating threat landscape: Many organizations implement regular patch schedules, such as monthly updates. Following the disclosure of the Log4j vulnerability, CISA issued an emergency directive requiring federal agencies to patch immediately or remove affected software from their networks. Recent research indicates that 28.3% of vulnerabilities are now exploited within the first 24 hours after disclosure. Research revealed that organizations patch CVE-listed bugs 3.5 times faster than other vulnerabilities. As exploitation timelines continue to compress, organizations that fail to implement rapid patching capabilities face increasingly significant risks. The time between vulnerability disclosure and exploitation has often collapsed from weeks to hours. Cyber Security News is a Dedicated News Platform For Cyber News, Cyber Attack News, Hacking News & Vulnerability Analysis. Even more telling, vulnerabilities known to be targeted by ransomware actors are patched 2.5 times faster on average than other KEV-listed flaws. Even more concerning, a comprehensive industry study found that 80% of zero-day vulnerabilities-security flaws unknown to vendors-are exploited before patches are released. This leaves security teams no time to react using traditional patch management approaches. Several significant zero-day vulnerabilities in 2025 exemplify this disturbing trend. This persistent vulnerability gap highlights organizations’ ongoing challenges in maintaining comprehensive patch coverage across complex IT environments. The median time for remediation of KEV-listed bugs is 174 days, while the time for non-KEV-list vulnerabilities is 621 days.

This Cyber News was published on cybersecuritynews.com. Publication date: Wed, 14 May 2025 18:00:07 +0000


Cyber News related to Hackers Exploit Software Flaws within Hours Forcing Urgent Push for Faster Patches

Hackers Exploit Software Flaws within Hours Forcing Urgent Push for Faster Patches - This rapidly shrinking window between vulnerability discovery and active exploitation forces organizations to rethink traditional patching cycles and implement more agile security responses. In April, Microsoft disclosed that a zero-day vulnerability ...
1 month ago Cybersecuritynews.com CVE-2025-29824
How Patch Management Software Solves the Update Problem - I've never met an IT leader who doesn't know how important patch management is. At Heimdal, we believe patch management software provides the solution to this problem. Patch management software is a technology that allows businesses to automate the ...
11 months ago Heimdalsecurity.com
Over 1,450 pfSense servers exposed to RCE attacks via bug chain - Roughly 1,450 pfSense instances exposed online are vulnerable to command injection and cross-site scripting flaws that, if chained, could enable attackers to perform remote code execution on the appliance. PfSense is a popular open-source firewall ...
1 year ago Bleepingcomputer.com CVE-2023-42325 CVE-2023-42327 CVE-2023-42326
Discovering SSRF Flaws in Microsoft Azure Services - Microsoft Azure is an incredibly popular cloud computing platform and its services are used around the world. Recently, security researchers uncovered several Server-Side Request Forgery (SSRF) flaws in many of Microsoft Azure’s services. This type ...
2 years ago Securityaffairs.com
Google and Apple Admit Government Spies On Users Via Push Notifications - Government authorities have been snooping on smartphone users via push notifications sent out by applications, wrote a US senator in a letter to the Department of Justice on December 6. Senator Ron Wyden of Oregon has requested that the Department of ...
1 year ago Cysecurity.news
New ISC Security Patches Released for 2021: What You Need to Know - The Internet Systems Consortium (ISC), the largest provider of open-source Internet infrastructure software, has released new security patches designed to mitigate data breaches and other cyber threats. These new security patches, released in January ...
2 years ago Thehackernews.com
Netgear, Hyundai latest X accounts hacked to push crypto drainers - The official Netgear and Hyundai MEA Twitter/X accounts are the latest hijacked to push scams designed to infect potential victims with cryptocurrency wallet drainer malware. While Hyundai has already regained access to their account and has cleaned ...
1 year ago Bleepingcomputer.com
Oracle Security Update - Patch for 378 Vulnerabilities Including Remote Exploits - “Oracle strongly recommends that customers remain on actively-supported versions and apply Critical Patch Update security patches without delay,” the company stated in its advisory. Oracle Database Server versions 19.3-19.26, 21.3-21.17, ...
2 months ago Cybersecuritynews.com
Why Have Big Cybersecurity Hacks Surged in 2023? - Payments made to hackers who hold systems hostage for ransom increased by almost half through September, according to blockchain analytics firm Chainalysis Inc., totaling almost $500 million in payouts. In just the past few months, hackers have ...
1 year ago Bloomberg.com LockBit
Police Can Spy on Your iOS and Android Push Notifications - While Wyden's letter says that governments outside the US have requested people's push notification records, the Federal Bureau of Investigation has done so as well. A February 2021 search warrant application submitted by an FBI agent to the US ...
1 year ago Wired.com
What Is Software Piracy? - Software piracy has become a worldwide issue, with China, the United States and India being the top three offenders. In 2022, 6.2% of people worldwide visited software piracy websites. Software piracy doesn't require a hacker or skilled coder. Any ...
1 year ago Pandasecurity.com
How Hackers Interrupted GTA 5 Online Gameplay on PC - Recently, a cyber-attack on Grand Theft Auto 5 Online on PC caused an interruption to thousands of players’ gameplays. The game was completely taken offline and players couldn’t even access the main gameplay menu. The attack caused an uproar ...
2 years ago Hackread.com
MOVEit Transfer Flaws Push Security Defense Into a Race With Attackers - Attackers appear to be pounding away at a couple of critical bugs that Progress Software disclosed this week in its MOVEit file transfer application, with nearly the same ferocity as they did the zero-day flaw the company disclosed almost exactly a ...
11 months ago Darkreading.com CVE-2024-5806 CVE-2024-5805 CVE-2023-34362
Threat Groups Rush to Exploit JetBrains' TeamCity CI/CD Security Flaws - The cyberthreats to users of JetBrains' TeamCity CI/CD platform continue to mount a week after the company issued two fixes to security vulnerabilities, with one cybersecurity vendor noting a ransomware attack that included exploiting the flaws for ...
1 year ago Securityboulevard.com CVE-2024-27198 CVE-2024-27199 BianLian
GitLab Patches: Severe SAML Authentication Bypass Flaw Fixed - Security Boulevard - In addition to these patches, OmniAuth SAML has been upgraded to version 2.2.1 and Ruby-SAML to 1.17.0. It’s worth mentioning that the issue only impacts self-managed instances; therefore, users of GitLab Dedicated instances do not need to take any ...
8 months ago Securityboulevard.com CVE-2024-45409
Microsoft: Multiple Perforce Server Flaws Allow for Network Takeover - Microsoft has identified four vulnerabilities in the Perforce source-code management platform, the most critical of which gives attackers access to a highly privileged Windows OS account to potentially take over the system via remote code execution ...
1 year ago Darkreading.com CVE-2023-45849 CVE-2023-35767 CVE-2023-45319 CVE-2023-5759
Key software patch testing best practices - To ensure a predictable rollout when a patch is deployed across your network, it is important to test it first in a nonproduction environment. Companies install software and firmware patches to fix bugs, remove vulnerabilities and add new features, ...
1 year ago Techtarget.com
Microsoft Patch Tuesday: Critical Spoofing and Remote Code Execution Flaws - Microsoft on Tuesday rolled out fixes for several critical security flaws in the Windows ecosystem and warned that hackers could target these issues to take complete control of unpatched machines. As part of its regular Patch Tuesday releases, ...
1 year ago Securityweek.com CVE-2023-36019
Google Chrome Six Flaws: Should You be Worried? - Google Chrome is one of the most widely used web browsers around the world, and while it is generally more secure than its predecessors, multiple security flaws have been recently revealed that users should be aware of. Recently, the Google Chrome ...
2 years ago Securityaffairs.com
Hackers exploit WordPress plugin auth bypass hours after disclosure - Hackers started exploiting a high-severity flaw that allows bypassing authentication in the OttoKit (formerly SureTriggers) plugin for WordPress just hours after public disclosure. If you’re using OttoKit/SureTriggers, upgrade to version ...
2 months ago Bleepingcomputer.com CVE-2025-3102
Ivanti discloses new zero-day flaw, releases delayed patches - Ivanti Wednesday released patches for two critical zero-day vulnerabilities that were disclosed earlier this month, but also warned customers of two new flaws, including a new zero-day that's under exploitation in the wild. In a security advisory on ...
1 year ago Techtarget.com CVE-2023-46805 CVE-2024-21887 CVE-2024-21888 CVE-2024-21893
US government is snooping on people via phone push notifications, says senator - Many people don't realize that the instant alert push notifications you get on your phone are routed through Google or Apple's servers, depending on which device you use. So if you have an iPhone or iPad, any push notifications can be seen by Apple, ...
1 year ago Malwarebytes.com
Google links WinRAR exploitation to Russian, Chinese state hackers - Google says that several state-backed hacking groups have joined ongoing attacks exploiting a high-severity vulnerability in WinRAR, a compression software used by over 500 million users, aiming to gain arbitrary code execution on targets' systems. ...
1 year ago Bleepingcomputer.com CVE-2023-38831 CVE-2023-40477 APT28
The Crucial Need for a Secure Software Development Lifecycle in Today's Digital Landscape - In today's increasingly digital world, software is the backbone of business operations, from customer-facing applications to internal processes. The rapid growth of software development has also made organizations more vulnerable to security threats. ...
1 year ago Cyberdefensemagazine.com
Staying Ahead of Adversarial AI with Incident Response Automation - The security operations community constantly seeks advancements in incident response. Consolidating security telemetry data, upgrading your organization's cybersecurity posture, and integrating with various artificial intelligence and machine ...
11 months ago Securityboulevard.com