Most Companies Don’t Think Like Hackers, Leaving Them More Prone to Attacks, Finds Study

The research assesses software vulnerability prioritization based on insights from hacker forums, including the dark web and deep web

WhiteSource, the leader in open source security and license compliance management, andย CYR3CON, which predicts cybersecurity attacks based on AI-gathered intelligence from hacker communities, released in collaboration today their joint research report on security vulnerability prioritization through the eyes of hackers.

As technology constantly advances, software development teams are bombarded with security alerts at an increasing rate. This has made it nearly impossible to remediate every vulnerability, rendering the ability to properly prioritize remediation all the more critical.

This research examines the most common methods software development teams use to prioritize software vulnerabilities for remediation and compares those practices to data gathered from the discussions of hacker communities, including the dark web and deep web.

Key findings inย the reportย include:

  • Software development teams tend to prioritize based on available data such as vulnerability severity score (CVSS), ease of remediation, and publication date, but hackers donโ€™t target vulnerabilities based on these parameters.
  • Hackers are drawn to specific vulnerability types (CWEs), including CWE-20 (Input Validation), CWE-125 (Out-of-bound Read), CWE-79 (XSS), and CWE-200 (Information Leak/Disclosure).
  • Organizations tend to prioritize โ€œfreshโ€ vulnerabilities, while hackers often discuss vulnerabilities for over 6 months following exploitation, with even older vulnerabilities re-emerging in hacker community discussions as they reappear in new exploits or malware.

โ€œAs development teams face an ever-rising number of disclosed vulnerabilities, it becomes impossible to fix everything and itโ€™s imperative that teams focus on addressing the most urgent issues first,โ€ saidย Rami Sass, CEO and co-founder of WhiteSource. โ€œOur research can help organizations adopt a solid prioritization method, and ensure they look beyond just the most accessible data to the data that can best help them fix the security vulnerabilities that could cause the greatest impact, and in turn save them valuable time.โ€

โ€œAll too often companies unknowingly accept risk by using outdated methods of vulnerability prioritization โ€“ and this report sheds light on the shortcomings of those approaches. Combining threat intelligence and machine learning overcomes those shortcomings, highlighting previously unidentified risks in the process,โ€ saidย Paulo Shakarian, CYR3CON CEO & Co-Founder. โ€œOur CyRating score, which originates from our own peer-reviewed scientific research, was designed to scale the process of analyzing vulnerabilities and rapidly shed light on the hackersโ€™ perspective of what they will exploit. Many top-tier teams today use CYR3CON to provide the knowledge they need to conduct this analysis in a manner that scales.โ€

Most Companies Don't Think Like Hackers, Leaving Them More Prone to Attacks, Finds Study -

About Mend.io

Mend.io is a leading application security solution that helps organizations fix less and reduce risk faster. Built for both AI-driven and modern development workflows, Mend.io gives teams visibility into all code โ€“ human-written, AI-generated, open source, third-party and container components โ€“ and helps them prioritize and remediate the risks that matter most.

AI Security & Compliance Assessment

Map your maturity against the global standards. Receive a personalized readiness report in under 5 minutes.