Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementSecurity NewswireSecurity Enterprise ServicesSecurity Leadership and ManagementLogical SecuritySecurity & Business ResilienceSecurity Education & TrainingCybersecurity News

How to prioritize patching in the exploit storm

By Derek Manky
cyber security freepik

<a href='https://www.freepik.com/photos/technology'>Technology photo created by pressfoto - www.freepik.com</a>

May 12, 2021

COVID made “flatten the curve” a household phrase in 2020, but did you know the concept also applies to vulnerability exploits? It turns out that what’s past is prologue in exploit trends. By tracking which attacks are being exploited the most, organizations discover important information to help proactively determine their vulnerability and risk.

But it is also important to track attacks where activity has increased the most within a specified timeframe. It only takes one critical exploit to cause significant damage and, once inside the network, the attacker will need to move laterally and probably deploy additional exploits. That’s why understanding which exploits have the greatest likelihood of arriving on the network’s doorstep helps organizations prioritize patch management and risk assessment. This remains top of mind as cyber adversaries continue to maximize vulnerabilities, as we have recently seen with DearCry ransomware, for example.

 

Examining the most prevalent exploits

In looking at 1,500 different exploits tracked in the wild in the past two years, FortiGuard Labs researchers have been actively participating in and collaborating with organizations like FIRST and their EPSS model, which is a Special Interest Group. This has enabled FortiGuard Labs to observe a number of different trends that help address patching priority questions.

Previous research found that while 2020 was expected to be a record-breaker in terms of the number of vulnerabilities identified and published in one year, these vulnerabilities also have the lowest rate of exploitation ever observed in the 20-year history of the CVE (Common Vulnerabilities and Exposures) list. Rather, vulnerabilities from 2018 showed the highest exploitation prevalence (65%). In addition, over 25% of firms have reported attempts to exploit CVEs from 2005.

FortiGuard Labs researchers found that in the second half of 2020, exploits against the ELFinder arbitrary file upload bug, a CMS plug-in, surged to between 12% to 20% of organizations, depending on the region. That’s significant, since less than 1% of exploits reach that level of prevalence. Another notable global gainer is a privilege escalation vulnerability affecting multiple Windows Server and Desktop versions.

 

How do you set priorities?

Speed and time-to-attack vary greatly, and those are the uncertainties organizations have to prepare for. Some exploits methodically plod across a smaller population of organizations. And then there are exploits which start out at a crawl but shift into high gear later into the lifecycle.

If it’s your job to help protect your organization from the onslaught of cyber threats, you’ve probably asked some variation of the question, “How long until we get attacked?” And perhaps you’ve been frustrated by the lack of helpful answers. That frustration is understandable, because knowing how long you have until exploits targeting the latest vulnerability spread to your assets is critical in order to prioritize remediation efforts and/or deploy compensating controls to minimize risk.

 

The good news/bad news

While this may sound like a rarity in the cybersecurity world, there is some good news to take away: most exploits have a low probability of being used against organizations. FortiGuard Labs has found that very few vulnerabilities see widespread exploitation in the wild. Among all exploits logged by our sensors over the last two years, only 5% were detected by more than 10% of organizations. Three out of four exploits didn’t reach one in 1,000 firms.

So, if you pick a vulnerability at random, the data demonstrates that there’s about a one in 1,000 chance that any given organization will be attacked via that vulnerability. Only 6% of exploits hit more than 1% of firms within the first month; even after one year, 91% of exploits haven’t crossed that 1% threshold. It’s even less common that exploits reach 10% of the population in those time frames. In fact, most exploits don’t spread very far very fast.

That said, this doesn’t mean you have carte blanche to ignore these vulnerabilities. Some organization has to be that one in 1,000. Cybersecurity teams don’t typically strategize to the middle, or average, scenario in cybersecurity. They focus on the extremes. And the above statistics may not hold true for your organization. Your organization could be one that routinely falls among the targeted (or unlucky) few. And in that case, the stats begin shifting against you.

The maxim “better safe than sorry” applies here. Unless you have reason to believe you won’t see certain exploits, don’t make assumptions. Focus remediation efforts on vulnerabilities with known exploits, and among those, prioritize the ones propagating most quickly in the wild and that are most relevant to your specific footprint. Pay special attention to threats that could affect your mission-critical, high-risk assets. Data routinely shows that you are at risk from only a small fraction of the multitude of vulnerabilities.

 

Data-based security strategy

The echoes of 2020 continue to reverberate into 2021 in both the physical and digital worlds, and they have valuable lessons to teach us if we’ll listen. That’s why it is necessary to look back at the second half of 2020 and gain strategic intel from what the data reveals. It’s also necessary to remember that just one missed patch can rain down all manner of network destruction. Prioritizing exploits comes down to understanding current threat patterns and addressing exploits that are moving the fastest. This strategy will help you move forward into a better, more secure future.

KEYWORDS: cyber security exploits ransomware risk management vulnerability assessment

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Derek manky
As chief of security insights and global threat alliances at FortiGuard Labs, Derek Manky formulates security strategy with more than 15 years of cybersecurity experience. His ultimate goal is to make a positive impact towards the global war on cybercrime. Manky provides thought leadership to the industry and has presented research and strategy worldwide at premier security conferences. As a cybersecurity expert, his work has included meetings with leading political figures and key policy stakeholders, including law enforcement, who help define the future of cyber security. He is actively involved with several global threat intelligence initiatives, including NATO NICP, INTERPOL Expert Working Group, the Cyber Threat Alliance (CTA) working committee and FIRST, all in an effort to shape the future of actionable threat intelligence and proactive security strategy.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Cyber tech background

    Security’s Top Cybersecurity Leaders 2026

    Security magazine’s Top Cybersecurity Leaders 2026 award...
    Security Leadership and Management
  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Columns
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Popular Stories

Person in red hoodie

When Metal Theft Becomes a Life Safety Crisis

Stacked books

Safe Learning 101 Program Supports Schools in Strengthening Campus Security

Diverse Team Collaborating on Business Analysis

12 Tips for Building an Effective Security Budget

Nurse

Why De-Escalation Must Be Part of a Layered Safety Strategy in Healthcare

Two women consulting with a group in background

5 Skills That Will Serve You in Your Security Career

SEC 2026 Benchmark Banner

Events

May 21, 2026

From Referral to Response: Managing Domestic Violence Threats in the Workplace

Domestic violence remains a complex driver of workplace violence, creating high-risk scenarios that require coordination across departments without clear ownership. Learn how threat management teams can manage domestic violence referrals from the start.

June 3, 2026

The Role of AI and Video in Measuring Health, Safety, and Security Standards

OSHA fines grab headlines, but most compliance issues start with everyday operational gaps: missed protocols, unsecured areas, or slow response. Learn how emerging technologies & AI can be leveraged towards a more proactive model of compliance.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
Solutions by Sector webinar promo


The Role of AI and Video - Free Webinar - June 3, 2026

Related Articles

  • cyber_enews

    The five biggest threat trends in the first half of 2020

    See More
  • ransomware - cyber

    Grappling with the onslaught of ransomware attacks

    See More
  • iot-enews

    How to prioritize security and avoid the top 10 IoT stress factors

    See More

Related Products

See More Products
  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • school security.jpg

    School Security: How to Build and Strengthen a School Safety Program

  • The Complete Guide to Physical Security

See More Products

Events

View AllSubmit An Event
  • October 8, 2025

    How to Support the Security Guard Force in Challenging Environments

    ON DEMAND: In this webinar, learn how organizations are fostering trust among their security guard force to improve security posture and the safety of sites, processes and the officers themselves.
View AllSubmit An Event
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media, Inc. and BNP Media II, LLC.

Design, CMS, Hosting & Web Development :: ePublishing