Security News > 2020 > June > Fixing all vulnerabilities is unrealistic, you need to zero in on what matters

Fixing all vulnerabilities is unrealistic, you need to zero in on what matters
2020-06-24 03:30

This has made it nearly impossible to remediate every vulnerability, rendering the ability to properly prioritize remediation all the more critical, according to WhiteSource and CYR3CON. This research examines the most common methods software development teams use to prioritize software vulnerabilities for remediation, and compares those practices to data gathered from the discussions of hacker communities, including the dark web and deep web.

Key research findings Software development teams tend to prioritize based on available data such as vulnerability severity score, ease of remediation, and publication date, but hackers don't target vulnerabilities based on these parameters.

Hackers are drawn to specific vulnerability types, including CWE-20, CWE-125, CWE-79, and CWE-200.

Organizations tend to prioritize "Fresh" vulnerabilities, while hackers often discuss vulnerabilities for over 6 months following exploitation, with even older vulnerabilities re-emerging in hacker community discussions as they reappear in new exploits or malware.

"As development teams face an ever-rising number of disclosed vulnerabilities, it becomes impossible to fix everything and it's imperative that teams focus on addressing the most urgent issues first," said Rami Sass, CEO, WhiteSource.


News URL

http://feedproxy.google.com/~r/HelpNetSecurity/~3/se6nRkmJEdg/