New Research “Exposing the Exploited” Unveils Challenges of the Known Exploited Vulnerability Catalog
Exposing the Exploited details how an over-reliance on legacy information databases and standard guidance drastically underrepresents the global threat landscape.
- Exposing the Exploited details how an over-reliance on legacy information databases and standard guidance drastically underrepresents the global threat landscape.
- View the full release here: https://www.businesswire.com/news/home/20240507143608/en/
Forescout Research - Exposing the Exploited (Graphic: Business Wire)
“Vulnerabilities are being found, weaponized, and exploited in the wild faster than ever before, with 97 0-days exploited in 2023 and already 27 this year,” said Elisa Costante, VP of Research, Forescout Research – Vedere Labs. - While the CISA KEV list is a valuable resource and the most recognized catalog for exploited vulnerabilities, it does have certain limitations.
- Our analysis reveals that the CISA KEV catalog is not exhaustive — we have observed exploited vulnerabilities in the wild that are absent from this catalog.