{"id":43976,"date":"2026-02-26T23:53:13","date_gmt":"2026-02-26T15:53:13","guid":{"rendered":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/2026\/02\/26\/report-finds-just-1-of-security-flaws-drive-most-cyberattacks-in-2025\/"},"modified":"2026-02-26T23:53:13","modified_gmt":"2026-02-26T15:53:13","slug":"report-finds-just-1-of-security-flaws-drive-most-cyberattacks-in-2025","status":"publish","type":"post","link":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/2026\/02\/26\/report-finds-just-1-of-security-flaws-drive-most-cyberattacks-in-2025\/","title":{"rendered":"Report Finds Just 1% of Security Flaws Drive Most Cyberattacks in 2025"},"content":{"rendered":"\n<p>While thousands of security flaws are reported every year, a new investigation has found that the vast majority are never actually used. Instead, a small group of &#8220;routinely targeted&#8221; flaws are doing almost all the damage.<\/p>\n<p>The 2026 Exploit Intelligence Report, released today by the research firm VulnCheck, provides a detailed look at how attackers behaved over the past year. According to researchers, of the 48,000 security flaws (CVEs) reported in 2025, a mere 1% were actually used in real-world attacks. However, those few flaws were hit with incredible speed and force.<\/p>\n<h3><strong>Key CVEs Under Fire: The Routinely Targeted List<\/strong><\/h3>\n<p>The research, which was shared exclusively with Hackread.com, identifies the specific flaws that have become favourites for hackers. Topping the list is <a href=\"https:\/\/hackread.com\/github-scanner-react2shell-cve-2025-55182-malware\/\" target=\"_blank\" rel=\"noreferrer noopener\">React2Shell<\/a> (<a href=\"https:\/\/hackread.com\/react2shell-vulnerability-cve-2025-55182-analysis\/\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2025-55182<\/a>), which allows attackers to bypass security on popular web platforms. Some groups attempted to use this flaw within hours of its discovery.<\/p>\n<p>Business software is also under heavy fire. Flaws in Microsoft SharePoint (<a href=\"https:\/\/hackread.com\/microsoft-hackers-exploit-sharepoint-flaws-patch-now\/\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2025-53770<\/a>) and SAP NetWeaver (<a href=\"https:\/\/hackread.com\/sap-netweaver-vulnerability-auto-color-malware-us-firm\/\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2025-31324<\/a>) were among the most abused. For the SAP flaw, the timeline is surprising because hackers were spotted poking at it in January 2025, three months before it was officially reported.<\/p>\n<p>Many of these attacks are zero-days, which means the victims are hit before a fix is even available. In fact, 56.4% of ransomware-linked flaws were first identified through these surprise attacks.<\/p>\n<p>Jacob Baines, Chief Technology Officer at VulnCheck, <a href=\"https:\/\/www.vulncheck.com\/blog\/2026-vulncheck-exploit-intelligence-report\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">noted<\/a> that while the number of targeted flaws is small, &#8220;those vulnerabilities are being weaponised faster and at greater scale.&#8221;<\/p>\n<h3><strong>Global Rivals and Ransomware Gangs<\/strong><\/h3>\n<p>The <a href=\"https:\/\/wwv.vulncheck.com\/2026-vulncheck-exploit-intelligence-report\" target=\"_blank\" rel=\"noopener\">report<\/a> also sheds light on who exactly is pulling the strings. China-linked threat actors saw a massive 52% increase in activity last year, even as overall activity from named state groups fell by 13%. Meanwhile, activity from Iranian groups declined. It isn&#8217;t just government groups making moves. Notorious ransomware families like <a href=\"https:\/\/hackread.com\/cl0p-ransomware-nhs-uk-washington-post-breach\/\" target=\"_blank\" rel=\"noreferrer noopener\">Cl0p<\/a>, DragonForce, Earth Lamia, and <a href=\"https:\/\/hackread.com\/russian-hackers-firefox-windows-0-days-backdoor\/\" target=\"_blank\" rel=\"noreferrer noopener\">RomCom<\/a> remain highly active. These groups now specifically target initial access points to steal data more effectively.<\/p>\n<div>\n<figure><a href=\"https:\/\/hackread.com\/wp-content\/uploads\/2026\/02\/The-Deadly-1_-How-Hackers-Pick-the-Years-Most-Lethal-Security-Flaws.png\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"768\" src=\"https:\/\/hackread.com\/wp-content\/uploads\/2026\/02\/The-Deadly-1_-How-Hackers-Pick-the-Years-Most-Lethal-Security-Flaws-1024x768.png\" style=\"width:571px;height:auto\" srcset=\"https:\/\/hackread.com\/wp-content\/uploads\/2026\/02\/The-Deadly-1_-How-Hackers-Pick-the-Years-Most-Lethal-Security-Flaws-1024x768.png 1024w, https:\/\/hackread.com\/wp-content\/uploads\/2026\/02\/The-Deadly-1_-How-Hackers-Pick-the-Years-Most-Lethal-Security-Flaws-300x225.png 300w, https:\/\/hackread.com\/wp-content\/uploads\/2026\/02\/The-Deadly-1_-How-Hackers-Pick-the-Years-Most-Lethal-Security-Flaws-768x576.png 768w, https:\/\/hackread.com\/wp-content\/uploads\/2026\/02\/The-Deadly-1_-How-Hackers-Pick-the-Years-Most-Lethal-Security-Flaws-1536x1152.png 1536w, https:\/\/hackread.com\/wp-content\/uploads\/2026\/02\/The-Deadly-1_-How-Hackers-Pick-the-Years-Most-Lethal-Security-Flaws-2048x1536.png 2048w, https:\/\/hackread.com\/wp-content\/uploads\/2026\/02\/The-Deadly-1_-How-Hackers-Pick-the-Years-Most-Lethal-Security-Flaws-200x150.png 200w, https:\/\/hackread.com\/wp-content\/uploads\/2026\/02\/The-Deadly-1_-How-Hackers-Pick-the-Years-Most-Lethal-Security-Flaws-260x195.png 260w, https:\/\/hackread.com\/wp-content\/uploads\/2026\/02\/The-Deadly-1_-How-Hackers-Pick-the-Years-Most-Lethal-Security-Flaws-380x285.png 380w, https:\/\/hackread.com\/wp-content\/uploads\/2026\/02\/The-Deadly-1_-How-Hackers-Pick-the-Years-Most-Lethal-Security-Flaws-800x600.png 800w, https:\/\/hackread.com\/wp-content\/uploads\/2026\/02\/The-Deadly-1_-How-Hackers-Pick-the-Years-Most-Lethal-Security-Flaws-1160x870.png 1160w, https:\/\/hackread.com\/wp-content\/uploads\/2026\/02\/The-Deadly-1_-How-Hackers-Pick-the-Years-Most-Lethal-Security-Flaws.png 2133w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" alt=\"Report Finds Just 1% of Security Flaws Drive Most Cyberattacks in 2025\" \/><\/a><\/figure>\n<\/p><\/div>\n<h3><strong>The Rise of AI Slop<\/strong><\/h3>\n<p>In 2025, VulnCheck tracked over 14,400 exploits for roughly 10,480 unique flaws, a 16.5% increase from the previous year. Much of this surge is due to AI-generated slop, which refers to fake or broken code created by AI. While this code often doesn\u2019t work, it floods the internet with false signals, making it harder for human defenders to spot real threats.<\/p>\n<div style='margin: 8px auto; text-align: center; display: block; clear: both;'> <script async src=\"https:\/\/pagead2.googlesyndication.com\/pagead\/js\/adsbygoogle.js?client=ca-pub-3675825324474978\"      crossorigin=\"anonymous\"><\/script>  <ins      style=\"display:inline-block;width:300px;height:250px\"      data-ad-client=\"ca-pub-3675825324474978\"      data-ad-slot=\"3421156210\"><\/ins> <script>      (adsbygoogle = window.adsbygoogle || []).push({}); <\/script><\/div>\n<p>The danger remains immediate, as last year, 884 vulnerabilities were added to the firm&#8217;s known exploited dataset, with nearly half being brand-new discoveries from 2025. It is worth noting that about one-third of <a href=\"https:\/\/hackread.com\/north-korean-lazarus-group-medusa-ransomware\/\" target=\"_blank\" rel=\"noreferrer noopener\">ransomware<\/a> flaws still had no public fix available by the start of 2026.<\/p>\n<p>In the end, the report suggests that while we are discovering more flaws than ever, our ability to fix them isn&#8217;t keeping up with the speed of the criminals.<\/p>\n<div >\n<div>\n<div>\n<div>\n<h5> \t\t\t\t\t\t<a href=\"https:\/\/hackread.com\/author\/deeba\/\" rel=\"author\"> \t\t\t\t\t\t\tDeeba Ahmed\t\t\t\t\t\t<\/a> \t\t\t\t\t<\/h5>\n<div> \t\t\t\t\t\t\t<a href=\"https:\/\/hackread.com\/author\/deeba\/\" rel=\"author\"> \t\t\t\t\t\t\t\t<img src='https:\/\/secure.gravatar.com\/avatar\/9fefbe13a37a8aeb4620dfe89bb7feabd9433643ff382b6b882f27837a4cfb72?s=80&#038;d=mm&#038;r=g' srcset='https:\/\/secure.gravatar.com\/avatar\/9fefbe13a37a8aeb4620dfe89bb7feabd9433643ff382b6b882f27837a4cfb72?s=160&#038;d=mm&#038;r=g 2x' height='80' width='80' alt=\"Report Finds Just 1% of Security Flaws Drive Most Cyberattacks in 2025\" \/>\t\t\t\t\t\t\t<\/a> \t\t\t\t\t\t<\/div>\n<div>\n<div> \t\t\t\t\t\t\t\tDeeba is a veteran cybersecurity reporter at Hackread.com with over a decade of experience covering cybercrime, vulnerabilities, and security events. Her expertise and in-depth analysis make her a key contributor to the platform\u2019s trusted coverage.\t\t\t\t\t\t\t<\/div>\n<div>\n<div> \t\t<a href=\"https:\/\/hackread.com\/author\/deeba\/\" target=\"\"> \t\t\tView Posts\t\t<\/a> \t<\/div>\n<\/p><\/div>\n<\/p><\/div>\n<\/p><\/div>\n<\/p><\/div>\n<\/p><\/div>\n<\/p><\/div>\n","protected":false},"excerpt":{"rendered":"<p>While thousands of security flaws are reported every ye [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4],"tags":[],"class_list":["post-43976","post","type-post","status-publish","format-standard","hentry","category-hackread"],"_links":{"self":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/posts\/43976","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/comments?post=43976"}],"version-history":[{"count":0,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/posts\/43976\/revisions"}],"wp:attachment":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/media?parent=43976"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/categories?post=43976"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/tags?post=43976"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}