[{"data":1,"prerenderedAt":1242},["ShallowReactive",2],{"index":3,"all-posts":135,"quotes":1215},{"id":4,"title":5,"body":6,"description":7,"extension":8,"landing":9,"meta":53,"navigation":54,"path":55,"platform":56,"seo":81,"stem":82,"threatcon":83,"whitepapers":110,"__hash__":134},"index\u002F0.index.yml","VulnCheck - Outpace Adversaries",null,"Vulnerability intelligence that predicts avenues of attack with speed and accuracy.","yml",{"headline":10,"stats":11,"chart":18},"The cyber threat landscape has changed.",{"from":12,"to":15},{"year":13,"value":14},2020,"1.6 years",{"year":16,"value":17},2025,"21 days",{"title":19,"description":20,"footer":21,"data":22},"From Vulnerability to Exploitation","TTE (Time-to-Exploit) measures the gap between CVE disclosure and confirmed exploitation","Year Published, KEVs, Average Time to Exploitation",[23,28,33,38,43,48],{"year":24,"mean":25,"weaponized":26,"label":27},"2020",567,268,"1.6y",{"year":29,"mean":30,"weaponized":31,"label":32},"2021",227.5,350,"7.6mo",{"year":34,"mean":35,"weaponized":36,"label":37},"2022",365,359,"1y",{"year":39,"mean":40,"weaponized":41,"label":42},"2023",131.5,404,"4.4mo",{"year":44,"mean":45,"weaponized":46,"label":47},"2024",24,436,"24d",{"year":49,"mean":50,"weaponized":51,"label":52},"2025",21,449,"21d",{},true,"\u002F",{"headline":57,"title":58,"features":59,"links":80},"VulnCheck Platform","Exploit Intelligence for Vulnerability Prioritization",[60,65,70,75],{"icon":61,"title":62,"description":63,"to":64},"i-mdi-text-box-search","Exploit & Vulnerability Intelligence","Early access to new vulnerability information not found in the NVD along with dozens of unique fields.","\u002Fproduct\u002Fexploit-intelligence",{"icon":66,"title":67,"description":68,"to":69},"i-mdi-door-open","Initial Access Intelligence","In-house developed exploit PoCs, packet captures, and Suricata signatures to defend against initial access vulnerabilities.","\u002Fproduct\u002Finitial-access-intelligence",{"icon":71,"title":72,"description":73,"to":74},"i-mdi-ip-network-outline","IP Intelligence","Detection of potentially vulnerable systems, attacker command & control (C2) infrastructure, and honeypots.","\u002Fproduct\u002Fip-intelligence",{"icon":76,"title":77,"description":78,"to":79},"i-mdi-bird","Canary Intelligence","Data from globally deployed Internet sensors revealing the first signs of vulnerability exploitation.","\u002Fproduct\u002Fcanary-intelligence",[],{"title":5,"description":7},"0.index",{"headline":84,"title":85,"description":86,"features":87,"links":104},"BACK FOR YEAR TWO","A MOVEMENT TO COUNTER EMERGING THREATS","Year one proved the need. Year two raises the bar. Join the leaders defining how we counter emerging threats.",[88,94,99],{"icon":89,"title":90,"description":91,"to":92,"target":93},"i-mdi-microphone","Keynote Speaker","THREATCON1 welcomes Gen. Paul M. Nakasone  Former Commander, U.S. Cyber Command & Former Director of the National Security Agency. A recognized authority on cyber operations and national security, General Nakasone continues to advance dialogue and research on emerging global security challenges, inspiring innovation and leadership in this critical field.","https:\u002F\u002Fwww.threatcon1.org\u002F","_blank",{"icon":95,"title":96,"description":97,"to":98,"target":93},"i-mdi-flag","Capture the Flag","Powered by Skillbit, the THREATCON1 CTF challenges participants with a mix of trivia, PCAP analysis, reverse engineering, and exploitation tasks. Teams are welcome, so bring your crew or join up with others on-site. Prizes will be awarded to the top performers.","https:\u002F\u002Fwww.threatcon1.org\u002Fctf",{"icon":100,"title":101,"description":102,"to":103,"target":93},"i-mdi-globe","Regional Events","THREATCON1 is hitting the road. Join us for an evening of drinks, conversation, and connections with cyber threat response leaders in London on June 3 and Las Vegas on August 5. These evenings are where the real conversations happen: informal, unfiltered, and among the people shaping how we defend what matters most.","https:\u002F\u002Fwww.threatcon1.org\u002Fgolf-tournament",[105],{"label":106,"trailingIcon":107,"target":108,"to":109},"Call for Sponsors","i-mdi-arrow-right","","https:\u002F\u002Fwww.vulncheck.com\u002Fevents\u002Fthreatcon1-2026-cfs",[111,117,123,129],{"title":112,"subtitle":113,"img":114,"cta":115,"link":116,"external":54},"The 2026 VulnCheck Exploit Intelligence Report","In 2025, barely 1% of disclosed vulnerabilities were exploited in the wild. Yet those that were exploited were operationalized quickly, attracted diverse threat actors, and often caused outsized damage before organizations had a chance to respond. This report identifies which vulnerabilities mattered, why attackers targeted them, and where timing failures left organizations exposed.","\u002Fresources\u002F2026-VEIR-Report-Cover.png","Download The Report","https:\u002F\u002Fwwv.vulncheck.com\u002F2026-vulncheck-exploit-intelligence-report",{"title":118,"subtitle":119,"img":120,"cta":121,"link":122,"external":54},"Speed Matters in Vulnerability Analysis","Learn how to apply VulnCheck NVD++ to reliable workflows and product enrichment with speed, precision and accuracy.","\u002Fthumbnails\u002Fnvd-danger-backlog.png","Download Vulnerability Analysis","https:\u002F\u002Fwwv.vulncheck.com\u002Fnvd-backlog-report",{"title":124,"subtitle":125,"img":126,"cta":127,"link":128,"external":54},"Enrich Your Cyber Platform with Exploit Intelligence","This guide will help unlock use cases for cybersecurity product teams to enrich platform value with the best exploit intelligence in the industry.","\u002Fthumbnails\u002Frethinking-vulnerability-exploit-intelligence.png","Download White Paper","https:\u002F\u002Fwwv.vulncheck.com\u002Frethinking-intel-cyber-platforms-whitepaper",{"title":130,"subtitle":131,"cta":115,"link":132,"external":54,"img":133},"2026 State of Exploitation: Exploring the Network Edge","Derived from the 2026 State of Exploitation Report, this research examines 181 known exploited network edge device vulnerabilities from 2025 and uncovers a significant gap between where exploitation is actually occurring and what most security teams are tracking. More than three-quarters of these vulnerabilities do not appear in CISA KEV, and nearly half affect devices that vendors no longer support. The devices being targeted are not limited to enterprise firewalls, consumer routers, wireless bridges, and mass-market networking equipment are a major part of the picture.","https:\u002F\u002Fwwv.vulncheck.com\u002F2026-network-edge-device-report","\u002Fresources\u002F2026-network-edge-cover.png","M2vb2jsXPELoFpAthLDVE3kYRxeFduK3woUNqwINlPo",{"news":136,"blog":197,"events":741,"press":887},[137,157,173],{"id":138,"title":139,"authors":6,"body":140,"date":146,"description":147,"extension":148,"link":149,"logo":150,"meta":151,"navigation":54,"path":152,"seo":153,"source":6,"stem":154,"type":155,"__hash__":156},"news\u002Fnews\u002Fvulncheck-recognized-as-a-2025-sinet16-innovator.md","VulnCheck Named as a Prestigious 2025 SINET16 Innovator",{"type":141,"value":142,"toc":143},"minimark",[],{"title":108,"searchDepth":144,"depth":144,"links":145},2,[],"2025-10-15","Company's Unique Approach to Exploit Intelligence Receives Another Elite Industry Recognition","md","\u002Fpress\u002Fvulncheck-recognized-as-a-2025-sinet16-innovator","\u002Fawards\u002Fsinet-16-2025.png",{},"\u002Fnews\u002Fvulncheck-recognized-as-a-2025-sinet16-innovator",{"title":139,"description":147},"news\u002Fvulncheck-recognized-as-a-2025-sinet16-innovator","awards","N2hT7bCf8665cBQ2V36ck33mThVeN9E1JaHVYeoW6dQ",{"id":158,"title":159,"authors":6,"body":160,"date":164,"description":165,"extension":148,"link":166,"logo":167,"meta":168,"navigation":54,"path":169,"seo":170,"source":6,"stem":171,"type":155,"__hash__":172},"news\u002Fnews\u002Fmass-technology-leadership-council-tech-top50-startup-of-the-year-winner.md","The Massachusetts Technology Leadership Council (MTLC) Tech Top 50 Startup of the Year 2025: VulnCheck",{"type":141,"value":161,"toc":162},[],{"title":108,"searchDepth":144,"depth":144,"links":163},[],"2025-03-25","The Massachusetts Technology Leadership Council (MTLC) announced the winners and honorees of its annual Tech Top 50 for 2025 on March 13 which recognizes the leaders powering Massachusetts’ tech ecosystem. VulnCheck won Startup of the Year 2025.","https:\u002F\u002Fwww.mtlc.co\u002F2024-tech-top-50","\u002Fawards\u002Fmtlc_startup_honoree-2025.png",{},"\u002Fnews\u002Fmass-technology-leadership-council-tech-top50-startup-of-the-year-winner",{"title":159,"description":165},"news\u002Fmass-technology-leadership-council-tech-top50-startup-of-the-year-winner","fUU8uG3gWNV_Tltfd586oofmPVnH30h2Z-G8f1IdjU8",{"id":174,"title":175,"authors":6,"body":176,"date":188,"description":189,"extension":148,"link":190,"logo":191,"meta":192,"navigation":54,"path":193,"seo":194,"source":6,"stem":195,"type":155,"__hash__":196},"news\u002Fnews\u002Fforbes-cloud-100.md","Forbes' Cloud 100 List Rising Star",{"type":141,"value":177,"toc":186},[178],[179,180,181],"p",{},[182,183],"img",{"alt":184,"src":185},"alt text","image.png",{"title":108,"searchDepth":144,"depth":144,"links":187},[],"2024-08-05","VulnCheck is honored to be name to the Forbes Cloud 100 List as one of their 20 Rising Stars for our unparalleled vulnerability and exploit data solutions for enterprise, government and cybersecurity solutions providers.","\u002Fpress\u002Fforbes-cloud-100","\u002Fawards\u002Fforbes-cloud-100-2024.jpg",{},"\u002Fnews\u002Fforbes-cloud-100",{"title":175,"description":189},"news\u002Fforbes-cloud-100","riASIyBnmjzsOliPCSL5IQ4_KUI9Ea1uEBzWkiv7Dkk",[198,515,627],{"id":199,"title":200,"articles":6,"authors":201,"body":207,"date":504,"description":505,"extension":148,"image":6,"link":6,"meta":506,"navigation":54,"path":508,"seo":509,"series":6,"stem":510,"subtype":6,"tags":511,"__hash__":514},"blog\u002Fblog\u002Fai-assisted-vulnerability-discovery.md","The First CVE Wave: Signs That AI-Assisted Vulnerability Discovery Is Reshaping Disclosure Volumes",[202],{"name":203,"avatar":204,"link":205,"linkName":206},"Patrick Garrity","https:\u002F\u002Fca.slack-edge.com\u002FT02P16KHNRY-U06EPQ5RXFU-475c2549c30d-512","https:\u002F\u002Fwww.linkedin.com\u002Fin\u002Fpatrickmgarrity\u002F","in\u002Fpatrickmgarrity\u002F",{"type":141,"value":208,"toc":487},[209,215,218,240,251,260,269,272,277,283,286,289,293,296,301,307,310,317,321,326,329,332,353,357,362,365,368,371,377,381,386,389,392,398,402,407,410,413,419,423,427,430,433,439,443,446,448,462,466,469,473,476,479],[179,210,211],{},[182,212],{"alt":213,"src":214},"CVE Growth","\u002Fblog\u002Fai-assisted-vulnerability-discovery\u002Ftop20_cnas_cumulative.png",[179,216,217],{},"Key Takeaways:",[219,220,221,225,228,231,234,237],"ul",{},[222,223,224],"li",{},"CVE disclosure volumes are up sharply year-to-date (YTD) across several software suppliers, including Chrome (+563.2%), VMware (+180.9%), Apache (+170.3%), Mozilla (+156.9%), HPE (+132.3%), and F5 (+113.8%).",[222,226,227],{},"GitHub CVE issuance is also up significantly YTD (+476.07%), with GitHub indicating the increase is spread across many reporters and projects rather than concentrated in one source.",[222,229,230],{},"The increases are consistent with broader use of AI-assisted vulnerability discovery, though the signal is still emerging and not all increases can be directly attributed to AI.",[222,232,233],{},"Public examples from Mozilla, Microsoft, Apache, Curl, and Palo Alto show AI models being used to find, validate, or triage vulnerabilities, with mixed results depending on the project.",[222,235,236],{},"What is less clear is whether these volumes will be sustained, or whether this is a temporary surge as frontier AI models are applied across different code bases.",[222,238,239],{},"Defenders should prepare for higher vulnerability volumes while continuing to use threat intelligence to prioritize emerging threats that are being actively exploited or likely to be.",[179,241,242,243,250],{},"Since the start of this year, I've been watching for evidence of AI-assisted vulnerability discovery in publicly disclosed CVE volumes. The early signals were noisy. Our \"",[244,245,249],"a",{"href":246,"rel":247},"https:\u002F\u002Fwww.vulncheck.com\u002Fadvisories\u002Freport",[248],"nofollow","report a vulnerability","\" service saw a flood of submissions that, frankly, started as slop. But over the past few months, the quality of incoming submissions has noticeably improved, and the underlying volume hasn't subsided.",[179,252,253,254,259],{},"Then on April 7, 2026, Anthropic announced ",[244,255,258],{"href":256,"rel":257},"https:\u002F\u002Fwww.anthropic.com\u002Fproject\u002Fglasswing",[248],"Project Glasswing"," and Claude Mythos Preview, and the conversation shifted hard. Anthropic claimed Mythos had already identified thousands of zero-day vulnerabilities across every major operating system and web browser. Rather than releasing the model publicly, they funneled access to a coalition of partners, including AWS, Apple, Broadcom, Cisco, CrowdStrike, Google, JPMorgan Chase, the Linux Foundation, Microsoft, NVIDIA, and Palo Alto Networks, plus several other organizations.",[179,261,262,263,268],{},"The cybersecurity industry's response was a mix of awe, fear, uncertainty, and doubt, which prompted two questions: At what scale is AI-assisted vulnerability discovery real? And at what scale would we see it in the public disclosure of vulnerabilities? Which led me to building a list tracking ",[244,264,267],{"href":265,"rel":266},"https:\u002F\u002Fwww.vulncheck.com\u002Fblog\u002Fanthropic-glasswing-cves",[248],"Anthropic attributed CVEs"," We are now two Patch Tuesdays past the Glasswing announcement, and the signals are starting to emerge.",[179,270,271],{},"To put the results in perspective, I started by looking at the top 20 CVE Numbering Authorities and their CVE issuance volume over the past five years and found clear indications across several projects of the likely impact AI-assisted vulnerability discovery is having on public disclosures of vulnerabilities.",[273,274,276],"h2",{"id":275},"cve-issuance-trends-top-software-suppliers","CVE Issuance Trends - Top Software Suppliers",[179,278,279],{},[182,280],{"alt":281,"src":282},"Software Supplier Trends","\u002Fblog\u002Fai-assisted-vulnerability-discovery\u002F2026-cve-trends.png",[179,284,285],{},"Digging in a bit deeper, I decided to look at the top Software Suppliers and their year-over-year growth to better understand what significant changes might be happening. From the chart above we can see some notable increases across Chrome (+563.2%), Mozilla (+156.9%), VMware (+180.9%), Apache (+170.3%), HPE (+132.3%), F5 (+113.8%), among several others. In addition to these, GitHub's 476.07% increase highlights accelerated vulnerability disclosure across a high volume of open source projects.",[179,287,288],{},"The evidence appears to point to emerging AI models that have enabled software suppliers and security researchers to discover and remediate vulnerabilities that would have likely gone overlooked otherwise.",[273,290,292],{"id":291},"digging-into-noteworthy-software-suppliers-and-open-source-projects","Digging Into Noteworthy Software Suppliers and Open Source Projects",[179,294,295],{},"To provide some visibility into the emerging trend of AI-assisted vulnerability discovery, we took a deeper look at several of the software suppliers and open source projects.",[297,298,300],"h3",{"id":299},"github-open-source-project","GitHub (Open Source Project)",[179,302,303],{},[182,304],{"alt":305,"src":306},"Github","\u002Fblog\u002Fai-assisted-vulnerability-discovery\u002Fgithub.png",[179,308,309],{},"During the same window in which our submission queue was experiencing its AI-driven surge, GitHub was seeing its own surge in vulnerability reports. Both the volume of findings and the corresponding increase in CVE issuance have been confirmed as real by the GitHub team.\n\"No single reporter accounts for more than ~3% of volume, and no single project accounts for more than ~7%. This isn't one person or one tool, it's a systemic shift in how vulnerability reporting is happening across the ecosystem.\" - Madison Oliver Ficorilli.\nSomething in the ecosystem has changed, and the most likely explanation is the greater availability of AI models that are effective at discovering vulnerabilities in open source software. It also highlights how open source software appears to serve as a testing ground for AI vulnerability discovery tools and an early indicator of what's to come.",[179,311,312,313],{},"References: ",[244,314,315],{"href":315,"rel":316},"https:\u002F\u002Fwww.linkedin.com\u002Fpulse\u002Feveryones-blaming-ai-bad-vulnerability-reports-data-oliver-ficorilli-kvoxc\u002F?trackingId=miFeABHjId5tHsdVftUuaA%3D%3D",[248],[297,318,320],{"id":319},"mozilla","Mozilla",[179,322,323],{},[182,324],{"alt":320,"src":325},"\u002Fblog\u002Fai-assisted-vulnerability-discovery\u002Ffirefox.png",[179,327,328],{},"Mozilla has been one of the more vocal and transparent projects when it comes to AI-assisted vulnerability discovery, and is a participant in Project Glasswing. The Mozilla team stated, \"Since February, the Firefox team has been working around the clock using frontier AI models to find and fix latent security vulnerabilities in the browser.\" They also highlighted their participation in Anthropic's Mythos preview: \"As part of our continued collaboration with Anthropic, we had the opportunity to apply an early version of Claude Mythos Preview to Firefox.\"",[179,330,331],{},"References:",[219,333,334,340,346],{},[222,335,336],{},[244,337,338],{"href":338,"rel":339},"https:\u002F\u002Fblog.mozilla.org\u002Fen\u002Fprivacy-security\u002Fai-security-zero-day-vulnerabilities\u002F",[248],[222,341,342],{},[244,343,344],{"href":344,"rel":345},"https:\u002F\u002Fblog.mozilla.org\u002Fen\u002Ffirefox\u002Fhardening-firefox-anthropic-red-team\u002F",[248],[222,347,348],{},[244,349,352],{"href":350,"rel":351},"https:\u002F\u002Fhacks.mozilla.org\u002F2026\u002F05\u002Fbehind-the-scenes-hardening-firefox\u002F%3E",[248],"https:\u002F\u002Fhacks.mozilla.org\u002F2026\u002F05\u002Fbehind-the-scenes-hardening-firefox\u002F>",[297,354,356],{"id":355},"chrome","Chrome",[179,358,359],{},[182,360],{"alt":356,"src":361},"\u002Fblog\u002Fai-assisted-vulnerability-discovery\u002Fchrome.png",[179,363,364],{},"Chrome experienced a 563% increase in CVE disclosures, one of the most significant upticks we observed, and Google has confirmed its participation in Project Glasswing.",[179,366,367],{},"While we haven't seen concrete confirmation of what tools were used to drive the sudden increase, we suspect it's related to AI discovery tools, likely some combination of Mythos and Google's own AI models. The trend points toward AI-assisted discovery as the most likely driver.",[179,369,370],{},"Additionally, Google's Threat Intelligence Group recently published an article on adversaries leveraging AI for vulnerability exploitation, highlighting that the use of new tools isn't limited to the defender side.",[179,372,312,373],{},[244,374,375],{"href":375,"rel":376},"https:\u002F\u002Fcloud.google.com\u002Fblog\u002Ftopics\u002Fthreat-intelligence\u002Fai-vulnerability-exploitation-initial-access",[248],[297,378,380],{"id":379},"microsoft","Microsoft",[179,382,383],{},[182,384],{"alt":380,"src":385},"\u002Fblog\u002Fai-assisted-vulnerability-discovery\u002Fmicrosoft.png",[179,387,388],{},"Microsoft is a participant in Project Glasswing and has also announced the launch of its own AI discovery tool, clear evidence that AI is making an impact on CVE disclosures. As Microsoft noted, \"The findings in this Patch Tuesday and the retrospective recall on five years of CLFS MSRC cases are evidence that AI vulnerability findings can scale.\"",[179,390,391],{},"This suggests we're likely just at the beginning of higher volumes of CVE disclosures across Microsoft products. It will be interesting to see how far Microsoft's CVE issuance scales over the coming months.",[179,393,312,394],{},[244,395,396],{"href":396,"rel":397},"https:\u002F\u002Fwww.microsoft.com\u002Fen-us\u002Fsecurity\u002Fblog\u002F2026\u002F05\u002F12\u002Fdefense-at-ai-speed-microsofts-new-multi-model-agentic-security-system-tops-leading-industry-benchmark\u002F",[248],[297,399,401],{"id":400},"apache","Apache",[179,403,404],{},[182,405],{"alt":401,"src":406},"\u002Fblog\u002Fai-assisted-vulnerability-discovery\u002Fapache.png",[179,408,409],{},"Apache is a participant in Project Glasswing and is experiencing a 170%+ increase in CVEs published. As Anthropic stated, \"we've donated $1.5M to the Apache Software Foundation to enable the maintainers of open-source software to respond to this changing landscape.\"\nWe thought it would be worthwhile to provide some examples of security researchers using AI tools to assist in their discovery work.\nActiveMQ CVE-2026-34197 was discovered by Naveen Sunkavally with the assistance of Claude and is now known to be exploited in the wild and recently landed on CISA KEV.",[179,411,412],{},"In his words:\n\"These days I always use Claude to take a first pass at source code for vulnerability hunting. I prompt it lightly and set up a target on the network for it to validate findings. A lot of the time, Claude finds interesting stuff but it doesn't quite rise to the level of a CVE I'd bother reporting. In this case, it did a great job, with nothing more than a couple of basic prompts. This was 80% Claude with 20% gift-wrapping by a human.\" - Naveen Sunkavally.",[179,414,312,415],{},[244,416,417],{"href":417,"rel":418},"https:\u002F\u002Fhorizon3.ai\u002Fattack-research\u002Fdisclosures\u002Fcve-2026-34197-activemq-rce-jolokia\u002F",[248],[273,420,422],{"id":421},"other-observations-in-ai-assisted-vulnerability-discovery","Other Observations in AI-Assisted Vulnerability Discovery",[297,424,426],{"id":425},"curl","Curl",[179,428,429],{},"While Curl didn't make our chart for CVE growth (we excluded lower-volume CVE software suppliers), it remains one of the most heavily audited and fuzzed code bases in existence.",[179,431,432],{},"Daniel Stenberg, who maintains Curl, offers a grounded perspective: of the five \"confirmed\" vulnerabilities Mythos initially reported, only one held up as a valid CVE after his security team's review, with the rest being false positives or non-security bugs. He also emphasizes that running multiple AI models over time continues to uncover different bugs and vulnerabilities, and notes that previous AI tools have already driven hundreds of bugfixes in curl. Daniel's blog is well worth the read.",[179,434,312,435],{},[244,436,437],{"href":437,"rel":438},"https:\u002F\u002Fdaniel.haxx.se\u002Fblog\u002F2026\u002F05\u002F11\u002Fmythos-finds-a-curl-vulnerability\u002F",[248],[297,440,442],{"id":441},"palo-alto","Palo Alto",[179,444,445],{},"While Palo Alto didn't make the charts due to lower overall CVE issuance, they've seen a 37% increase in CVE issuance year to date and have been very vocal recently about their use of frontier models.\n\"For over a month, we've been using the latest frontier AI models, including Anthropic's Mythos and Claude Opus 4.7 and OpenAI's GPT-5.5-Cyber as part of the Trusted Access for Cyber program. Our teams have worked tirelessly to learn how to fully leverage the immense power of these models, and to find and fix any vulnerabilities as quickly as possible.\" - Rich Campagna, SVP Palo Alto Networks.",[179,447,331],{},[219,449,450,456],{},[222,451,452],{},[244,453,454],{"href":454,"rel":455},"https:\u002F\u002Fwww.paloaltonetworks.com\u002Fblog\u002F2026\u002F05\u002Fdefenders-guide-frontier-ai-impact-cybersecurity-may-2026-update\u002F",[248],[222,457,458],{},[244,459,460],{"href":460,"rel":461},"https:\u002F\u002Fwww.linkedin.com\u002Ffeed\u002Fupdate\u002Furn:li:activity:7460374274588061696\u002F?utm_source=share&utm_medium=member_desktop&rcm=ACoAAADShEQBPA7bU2zaIIHMTqDWMnEOq7PYu7g",[248],[273,463,465],{"id":464},"a-bit-of-a-reality-check-for-defenders","A Bit of a Reality Check for Defenders",[179,467,468],{},"Vulnerability volumes are clearly trending up, with a short-term spike in public disclosures tied to AI-assisted discovery. What's less clear is whether these volumes will be sustained, or whether this is a temporary surge as better AI models are pointed at different code bases and new models continue to surface vulnerabilities.\nMost defenders are starting to see the initial impact of AI-assisted vulnerabilities in their backlogs and should plan for sustained volumes over time. That reinforces the importance of patching early and often, updating to the latest version when possible, and using threat intelligence to prioritize emerging threats that are being actively exploited or likely to be.",[273,470,472],{"id":471},"about-vulncheck","About VulnCheck",[179,474,475],{},"VulnCheck is helping organizations not just to solve the vulnerability prioritization challenge - we’re working to help equip any product manager, CSIRT\u002FPSIRT or SecOps team and Threat Hunting team to get faster and more accurate with infinite efficiency using VulnCheck solutions.",[179,477,478],{},"We knew that we needed better data, faster across the board, in our industry. So that’s what we deliver to the market. We’re going to continue to deliver key insights on vulnerability management, exploitation and major trends we can extrapolate from our dataset to continuously support practitioners.",[179,480,481,482,486],{},"Are you interested in learning more? If so, VulnCheck's ",[244,483,62],{"href":484,"rel":485},"https:\u002F\u002Fvulncheck.com\u002Fproduct\u002Fexploit-intelligence",[248]," has broad threat actor coverage. Register and demo our data today.",{"title":108,"searchDepth":144,"depth":144,"links":488},[489,490,498,502,503],{"id":275,"depth":144,"text":276},{"id":291,"depth":144,"text":292,"children":491},[492,494,495,496,497],{"id":299,"depth":493,"text":300},3,{"id":319,"depth":493,"text":320},{"id":355,"depth":493,"text":356},{"id":379,"depth":493,"text":380},{"id":400,"depth":493,"text":401},{"id":421,"depth":144,"text":422,"children":499},[500,501],{"id":425,"depth":493,"text":426},{"id":441,"depth":493,"text":442},{"id":464,"depth":144,"text":465},{"id":471,"depth":144,"text":472},"2026-05-14","Public CVE disclosure volumes are surging across major software suppliers and open source projects, and the evidence increasingly points to AI-assisted vulnerability discovery as the driving force.",{"slug":507},"ai-assisted-vulnerability-discovery","\u002Fblog\u002Fai-assisted-vulnerability-discovery",{"title":200,"description":505},"blog\u002Fai-assisted-vulnerability-discovery",[512,513],"cve","ai","i56c41d0uM_8u3hFfEwSUvOhFOcppLgoErErWIXO0Xs",{"id":516,"title":517,"articles":6,"authors":518,"body":524,"date":615,"description":616,"extension":148,"image":617,"link":6,"meta":618,"navigation":54,"path":619,"seo":620,"series":6,"stem":623,"subtype":6,"tags":624,"__hash__":626},"blog\u002Fblog\u002Fvulncheck-exploit-intelligence-app-in-splunkbase.md","Learn How to Operationalize Exploit Intelligence in Splunk with VulnCheck’s New Splunkbase App",[519],{"name":520,"avatar":521,"link":522,"linkName":523},"Kimber Duke","https:\u002F\u002Fca.slack-edge.com\u002FT02P16KHNRY-U07E4RTU9PA-fa22b26ad3c8-512","https:\u002F\u002Fwww.linkedin.com\u002Fin\u002Fkimberduke\u002F","Kimber on LinkedIn",{"type":141,"value":525,"toc":610},[526,529,532,536,539,542,581,585,588,591,595,603],[179,527,528],{},"We’re excited to announce that the VulnCheck Exploit Intelligence App is now available in the Splunkbase Marketplace. This new integration brings real-world exploit and vulnerability intelligence directly into Splunk, making it easier for security teams to enrich CVE data, prioritize remediation and respond faster to emerging threats.",[179,530,531],{},"For teams already using Splunk to centralize investigation and response, this integration is a meaningful step forward in supporting the entire exploitation lifecycle. Static CVSS scores and basic vulnerability metadata do not provide defenders with the necessary context to act quickly. This includes whether a vulnerability is tied to active exploitation, associated with known threat activity or relevant to software running in their environment. The result is too much time spent sorting noise and not enough time focusing on the issues that matter most.",[273,533,535],{"id":534},"what-vulncheck-brings-to-splunk","What VulnCheck Brings to Splunk",[179,537,538],{},"By integrating VulnCheck’s APIs directly into Splunk, security teams gain inventory or SBOM-driven risk analytics, threat actor correlation and enriched vulnerability insights within the workflows they already rely on. This means faster analysis, improved prioritization and more informed remediation decisions based on actual risk instead of theoretical severity alone.",[179,540,541],{},"The VulnCheck Exploit Intelligence App enables Splunk users to operationalize these insights at scale through:",[219,543,544,551,557,563,569,575],{},[222,545,546,550],{},[547,548,549],"strong",{},"CVE Enrichment Engine"," for deeper CVE enrichment with VulnCheck exploitation intelligence",[222,552,553,556],{},[547,554,555],{},"SBOM Risk Analysis"," for uploading and analyzing SPDX or CycloneDX SBOM files",[222,558,559,562],{},[547,560,561],{},"Interactive Dashboards"," including executive overviews, CVE exploration, SBOM risk analysis and reporting",[222,564,565,568],{},[547,566,567],{},"Custom Visualizations"," such as vulnerability priority pyramids, exploitation timelines and threat intelligence displays",[222,570,571,574],{},[547,572,573],{},"Notable Event Integration"," for automatic enrichment of Splunk ES notable events with CVE intelligence",[222,576,577,580],{},[547,578,579],{},"Adaptive Response Actions"," that enrich IP addresses and CVEs from notable events with VulnCheck intelligence data",[273,582,584],{"id":583},"the-impact","The Impact",[179,586,587],{},"The VulnCheck Exploit Intelligence App allows security teams to bring real-world exploit context directly into their daily operations and spend less time pivoting across tools and more time acting on the vulnerabilities that represent real exposure. This ability to speed remediation matters even more at scale.",[179,589,590],{},"VulnCheck collects data from nearly 600 sources and more than 500 million records across all CVEs and vulnerabilities without a CVE. These data sources are curated and delivered in machine-readable formats, giving security teams the most relevant intelligence they can act on quickly in the systems they already depend on.",[273,592,594],{"id":593},"get-started-on-splunkbase-today","Get Started on Splunkbase Today",[179,596,597,598,602],{},"The VulnCheck Exploit Intelligence App is available now in the Splunkbase Marketplace. For organizations using Splunk to investigate threats, manage exposures, and drive response, the app makes it easier to bring exploit-aware vulnerability intelligence directly into existing security workflows. To download, please visit: ",[244,599,600],{"href":600,"rel":601},"https:\u002F\u002Fsplunkbase.splunk.com\u002Fapp\u002F8225",[248],".",[179,604,605,606],{},"For documentation on integrating VulnCheck intelligence into Splunk please visit: ",[244,607,608],{"href":608,"rel":609},"https:\u002F\u002Fdocs.vulncheck.com\u002Fintegrations\u002Fsplunk",[248],{"title":108,"searchDepth":144,"depth":144,"links":611},[612,613,614],{"id":534,"depth":144,"text":535},{"id":583,"depth":144,"text":584},{"id":593,"depth":144,"text":594},"2026-04-20T09:00:00-05:00","Bring real-world exploit and vulnerability intelligence directly into Splunk, making it easier for security teams to enrich CVE data, prioritize remediation and respond faster to emerging threats.","\u002Fblog\u002Fvc-splunkbase-1200x630.png",{},"\u002Fblog\u002Fvulncheck-exploit-intelligence-app-in-splunkbase",{"title":621,"description":622},"VulnCheck Insights: CVE Context at the Hover of Your Cursor","Instead of bouncing between tabs, you now get instant, current context the moment a CVE appears on your screen.","blog\u002Fvulncheck-exploit-intelligence-app-in-splunkbase",[625],"Integrations","TgT0BFsyyuTkuEbYiVmSmP4JApL_OEp2alRM39l7bpw",{"id":628,"title":629,"articles":6,"authors":630,"body":632,"date":731,"description":732,"extension":148,"image":6,"link":6,"meta":733,"navigation":54,"path":735,"seo":736,"series":6,"stem":737,"subtype":6,"tags":738,"__hash__":740},"blog\u002Fblog\u002Fexpanding-vulnerability-enrichment.md","VulnCheck’s Commitment to Expanding Access to Vulnerability Enrichment",[631],{"name":203,"avatar":204,"link":205,"linkName":206},{"type":141,"value":633,"toc":725},[634,640,643,646,657,660,663,667,670,681,684,687,694,698,701,707,711,714,716,718,720],[179,635,636],{},[182,637],{"alt":638,"src":639},"VulnCheck Serving Everyone","\u002Fblog\u002Fexpanding-vulnerability-enrichment\u002Fvulncheck-nist.png",[179,641,642],{},"We've heard concerns about National Institute of Standards and Technology (NIST) NVD's announcement this week clarifying their focus will now be much more limited moving forward.",[179,644,645],{},"Starting on April 15, 2026, NIST will prioritize the following CVEs for enrichment:",[219,647,648,651,654],{},[222,649,650],{},"CVEs appearing in CISA’s Known Exploited Vulnerabilities (KEV) Catalog",[222,652,653],{},"CVEs for software used within the US federal government",[222,655,656],{},"CVEs for critical software as defined by Executive Order 14028",[179,658,659],{},"What this means is that there will be a significant volume of CVEs that will not be enriched by NIST. This news comes after over 2-years of degradation in the NIST NVD enrichment services that started in 2024 after a reduction in funding.",[179,661,662],{},"While we appreciate NIST’s transparency for communicating how they will be prioritizing and resourcing enrichment moving forward, this will continue to exacerbate the data gap that NIST NVD has left across CVE records impacting CPE, CWE and CVSS coverage over the past 2-years, which creates negative security outcomes for organizations in the United States and globally",[273,664,666],{"id":665},"vulnchecks-commitment-to-the-community","VulnCheck's Commitment to The Community",[179,668,669],{},"In response to NIST NVD’s resource constraints in 2024, VulnCheck launched NVD++ on March 13, 2024, a free Community-accessible service providing:",[219,671,672,675,678],{},[222,673,674],{},"Timely access to NIST NVD data (no 503 Service Unavailables)",[222,676,677],{},"NIST NVD 1.0 compliant downloads (no longer supported by NIST)",[222,679,680],{},"Substantially expanded CPE coverage",[179,682,683],{},"Additionally, VulnCheck’s Exploit & Vulnerability Intelligence commercially-available product, already provides broad coverage for CVSS, CVSS-BT, & CPE lookup. One of the measures we took proactively in the past was to add CVSS scores from several vendor advisories to provide near complete coverage in our commercial offering.",[179,685,686],{},"1000’s of organizations have already adopted VulnCheck NVD++ since we have launched the service in addition to our other community offerings including VulnCheck KEV, VulnCheck XDB, and Report a Vulnerability Service.",[179,688,689,690],{},"Anyone can access VulnCheck NVD++ as part of VulnCheck Community for free today at: ",[244,691,692],{"href":692,"rel":693},"https:\u002F\u002Fwww.vulncheck.com\u002Fnvd2",[248],[273,695,697],{"id":696},"vulncheck-automated-cpe-generation","VulnCheck Automated CPE Generation",[179,699,700],{},"VulnCheck continues to outperform NIST NVD CPE enrichment in both volume of CVEs and speed. This chart provides VulnCheck CPE generation vs. NIST NVD over the past year. We remain committed to continuing to expand coverage.",[179,702,703],{},[182,704],{"alt":705,"src":706},"VulnCheck CPE vs. NIST NVD","\u002Fblog\u002Fexpanding-vulnerability-enrichment\u002Fvulncheck-cpe.png",[273,708,710],{"id":709},"expanding-nvd-enrichment-moving-forward","Expanding NVD++ Enrichment Moving Forward",[179,712,713],{},"VulnCheck will expand our NVD++ community and commercial enrichments over the next month to add CVSS scores to CVE records to provide timely and near complete CVSS coverage.",[273,715,472],{"id":471},[179,717,475],{},[179,719,478],{},[179,721,481,722,486],{},[244,723,62],{"href":484,"rel":724},[248],{"title":108,"searchDepth":144,"depth":144,"links":726},[727,728,729,730],{"id":665,"depth":144,"text":666},{"id":696,"depth":144,"text":697},{"id":709,"depth":144,"text":710},{"id":471,"depth":144,"text":472},"2026-04-16T10:00:00-05:00","In response to NIST NVD's announcement that it will significantly limit CVE enrichment starting April 15, 2026, VulnCheck reaffirms its commitment to filling the data gap through its free NVD++ community service and plans to expand coverage with CVSS scores over the next month",{"slug":734},"expanding-vulnerability-enrichment","\u002Fblog\u002Fexpanding-vulnerability-enrichment",{"title":629,"description":732},"blog\u002Fexpanding-vulnerability-enrichment",[512,739],"nist-nvd","8cA4uhkARDZHCuGktrt-I7sRkQyskN5ZAowKo_6oFWU",[742,804,863],{"id":743,"title":744,"authors":6,"body":745,"date":794,"description":795,"extension":148,"featured":54,"image":796,"meta":797,"navigation":54,"path":798,"seo":799,"stem":802,"__hash__":803},"events\u002Fevents\u002Fhealth-isac-spring-americas-summit-2026.md","Catch VulnCheck at Health-ISAC Americas Spring Summit 2026",{"type":141,"value":746,"toc":791},[747,750,753,759,762,766,771,777,780,785,788],[748,749],"h1",{"id":108},[179,751,752],{},"We are proud to be a Platinum sponsor of Health-ISAC Americas Spring Summit (May 4-8 in Tampa, FL), bringing together healthcare security leaders, innovators, and practitioners focused on strengthening cybersecurity and resilience across the healthcare ecosystem.",[179,754,755,758],{},[547,756,757],{},"Visit Booth #25"," to connect with our team, explore real-world attack trends, and see how VulnCheck helps organizations prioritize vulnerabilities based on active exploitation and adversary behavior.",[179,760,761],{},"Also, be sure to check out our featured session:",[297,763,765],{"id":764},"vulnerability-management-cti-maturing-beyond-cvss-and-epss","Vulnerability Management + CTI: Maturing Beyond CVSS and EPSS",[179,767,768],{},[547,769,770],{},"Thursday, May 7  |  1:30 - 2:10 p.m. ET",[179,772,773,776],{},[547,774,775],{},"Speaker:"," Neal Dennis, Technical Account Manager",[179,778,779],{},"Neal will share insights on the evolving vulnerability landscape and what healthcare organizations need to know to stay ahead of real-world exploitation.",[179,781,782],{},[547,783,784],{},"Abstract:",[179,786,787],{},"We can't patch everything the internet says is bad. But we can have methods in place to more effectively prioritize what is bad for our own organization. Data like CVSS and EPSS should be initial factors in a larger decision-making process, not the final answers. We'll discuss how CTI and Vulnerability management teams can mature their operations together by leveraging better data points to build more effective remediation efforts and make truly intelligent decisions about where resources should be allocated. We'll cover methods on prioritization of threats, how to begin your automation journey, and what data points aid in your effort to create actionable and timely intelligence.",[179,789,790],{},"Don’t miss the chance to connect with our experts and see how VulnCheck helps organizations stay ahead of evolving threats.",{"title":108,"searchDepth":144,"depth":144,"links":792},[793],{"id":764,"depth":493,"text":765},"2026-05-08","May 4-8 in Tampa, FL","\u002Fevents\u002Fhealth-isac-spring-amer-2026.png",{},"\u002Fevents\u002Fhealth-isac-spring-americas-summit-2026",{"title":800,"description":801},"Catch VulnCheck at Health-ISAC Spring Americas Summit 2026","Join VulnCheck at the Health-ISAC Americas Spring Summit 2026, where we proudly serve as a Platinum sponsor from May 4-8 in Tampa, FL. Connect with healthcare security leaders at Booth #25 to explore real-world attack trends and learn how VulnCheck empowers organizations to prioritize vulnerabilities based on active exploitation. Don’t miss our featured session with Neal Dennis on May 7 at 1:30 p.m. ET, where insights on the evolving vulnerability landscape will be shared. Stay ahead of threats and enhance your cybersecurity resilience with VulnCheck!","events\u002Fhealth-isac-spring-americas-summit-2026","Kt10PcYsl6bEd_j3qzJN7qyjpJV-Swq7PZBDulnI0GU",{"id":805,"title":806,"authors":6,"body":807,"date":854,"description":855,"extension":148,"featured":856,"image":857,"meta":858,"navigation":54,"path":859,"seo":860,"stem":861,"__hash__":862},"events\u002Fevents\u002Fmeet-vulncheck-at-blackhat-asia-2026.md","Join VulnCheck at Black Hat Asia",{"type":141,"value":808,"toc":852},[809,820,826,829,849],[179,810,811,812,815,816],{},"VulnCheck is proud to sponsor ",[547,813,814],{},"Black Hat Asia, 21 - 24 April",", at Marina Bay Sands in Singapore. Black Hat Asia brings together cybersecurity leaders, researchers, and practitioners to share cutting-edge insights and defense strategies.  ",[817,818],"span",{"style":819},"font-size:10pt;font-family:Arial,sans-serif;color:#000000;background-color:transparent;font-weight:700;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline;white-space:pre;white-space:pre-wrap;",[179,821,822,823,758],{},"Visit ",[547,824,825],{},"Booth #524 in Hall L4",[179,827,828],{},"Be sure to also check out our featured session:",[179,830,831,834,837,839,840,842,845,846,848],{},[547,832,833],{},"From CVE Lists to Adversary Reality: Rethinking Vulnerability Prioritization",[835,836],"br",{},[547,838,775],{}," Tony Wenzel, Director of Customer Engineering ",[835,841],{},[547,843,844],{},"Date | Time:"," 23 April at 10:15 a.m. GMT+8  ",[835,847],{}," Security teams are flooded with vulnerability data, yet attackers consistently exploit a small, predictable set of weaknesses. The issue isn’t lack of data; it’s lack of real-world context. In this session, Tony explores how vulnerabilities move from disclosure to active exploitation, why traditional prioritization falls short, and how an exposure-driven approach helps teams focus on what attackers are most likely to use, so you can reduce risk faster.  ",[179,850,851],{},"Don’t miss this chance to connect with our experts and see how VulnCheck helps organizations stay ahead of evolving cyber threats.",{"title":108,"searchDepth":144,"depth":144,"links":853},[],"2026-04-21","VulnCheck is proud to sponsor Black Asia, 21 - 24 April, at Marina Bay Sands in Singapore. Black Hat Asia brings together cybersecurity leaders, researchers, and practitioners to share cutting-edge insights and defense strategies.",false,"\u002Fevents\u002Fblackhat.webp",{},"\u002Fevents\u002Fmeet-vulncheck-at-blackhat-asia-2026",{"title":806,"description":855},"events\u002Fmeet-vulncheck-at-blackhat-asia-2026","M6Qi0N2148orct7ktPmsyG9n4MAEyyHor4pspetR3uc",{"id":864,"title":865,"authors":6,"body":866,"date":879,"description":880,"extension":148,"featured":856,"image":881,"meta":882,"navigation":54,"path":883,"seo":884,"stem":885,"__hash__":886},"events\u002Fevents\u002Fcyberuk-2026.md","Discover VulnCheck at CYBERUK 2026",{"type":141,"value":867,"toc":877},[868,871,874],[179,869,870],{},"VulnCheck is proud to sponsor CYBERUK 2026 from 21 - 23 April, the UK government’s flagship cybersecurity event hosted by the National Cyber Security Centre (NCSC).",[179,872,873],{},"Join us at stand B3, where public and private sector leaders come together to strengthen national resilience, accelerate innovation, and explore how VulnCheck provides the exploit and vulnerability intelligence security teams need to move faster and act with confidence.",[179,875,876],{},"Don’t miss this chance to connect with our experts and see firsthand how we are helping organizations stay ahead of evolving cyber threats.",{"title":108,"searchDepth":144,"depth":144,"links":878},[],"2026-04-20","VulnCheck is proud to sponsor CYBERUK 2026, the UK government’s flagship cybersecurity event hosted by the National Cyber Security Centre (NCSC).","\u002Fevents\u002Fcyberuk.jpg",{},"\u002Fevents\u002Fcyberuk-2026",{"title":865,"description":880},"events\u002Fcyberuk-2026","WK6H0eSjCrL0O4Vuy0-ZVIkrJvGoV7SETIR_20MCBAc",[888,1005,1130],{"id":889,"title":890,"articles":6,"authors":891,"body":895,"date":998,"description":999,"extension":148,"meta":1000,"navigation":54,"path":1001,"seo":1002,"stem":1003,"__hash__":1004},"press\u002Fpress\u002Freal-world-exploit-report.md","VulnCheck Exploit Intelligence Report Separates Real-World Exploitation Activity from Theoretical Vulnerability Risk",[892],{"name":893,"avatar":894},"Anthony Bettini","\u002Fteam\u002Fanthony-bettini.jpg",{"type":141,"value":896,"toc":994},[897,912,915,923,926,940,947,954,961,963,983,987],[179,898,899,902,903,902,906,911],{},[547,900,901],{},"LEXINGTON, Mass."," — ",[547,904,905],{},"February 25, 2026",[244,907,910],{"href":908,"rel":909},"https:\u002F\u002Fwww.vulncheck.com\u002F",[248],"VulnCheck",", the exploit intelligence company, today released the 2026 VulnCheck Exploit Intelligence Report (VEIR), a first-of-its-kind analysis of real-world exploitation trends and attacker behavior, along with its inaugural list of the 50 most routinely targeted vulnerabilities of the past year. By separating vulnerability disclosure data from confirmed exploitation, the report is designed to help security teams prioritize remediation based on operational risk instead of raw volume.",[179,913,914],{},"The VEIR shows that while CVE disclosures and public proof-of-concept code increased significantly in 2025, just 1% of vulnerabilities were confirmed to be exploited in the wild, with a small subset driving disproportionate real-world impact. The report is based on data from over two dozen unique VulnCheck indices, more than 500 data sources and proprietary first-party intelligence. It examines attacker behavior and which vulnerabilities drove confirmed compromise during a year marked by AI-generated exploit code, geopolitical tension and uncertainty surrounding core vulnerability programs.",[916,917,920],"author-quote",{"author":918,"position":919},"Jacob Baines","Chief Technology Officer, VulnCheck",[179,921,922],{},"The data shows that exploitation is concentrated in a very small number of vulnerabilities, but those vulnerabilities are being weaponized faster and at greater scale. At the same time, the volume of exploit content, much of it AI-generated slop, is making it harder to distinguish real operational risk from background noise.",[179,924,925],{},"In 2025, VulnCheck tracked more than 14,400 exploits developed for 10,480 unique 2025 CVEs, a 16.5% year-over-year increase in same-year exploit coverage. Much of that growth was associated with AI-generated proof-of-concept code, including nonfunctional or misleading exploit content. Other key findings from the 2026 VEIR report include:",[219,927,928,931,934,937],{},[222,929,930],{},"56.4% of 2025 ransomware CVEs were first identified through active zero-day exploitation, and roughly one-third still lacked public or commercial exploits as of January 2026",[222,932,933],{},"A 13% decrease in new vulnerabilities linked to named state-sponsored groups overall, with China-linked exploit attributions increasing and Iranian-linked activity decreasing",[222,935,936],{},"884 vulnerabilities were added to VulnCheck’s Known Exploited Vulnerabilities dataset with 47.7% carrying 2025 CVE identifiers",[222,938,939],{},"Deep dives into React2Shell, SharePoint exploitation, and ransomware groups including Cl0p, DragonForce, Earth Lamia, and RomCom.",[916,941,944],{"author":942,"position":943},"Caitlin Condon","Vice President of Research, VulnCheck",[179,945,946],{},"Organizations are managing more disclosures than ever, but only a small fraction of those vulnerabilities see active exploitation. The difficulty is identifying that fraction early enough to act. This analysis focuses on confirmed exploitation trends to improve prioritization decisions.",[179,948,949,950,602],{},"The report also includes VulnCheck’s first-ever Routinely Targeted Vulnerabilities list, a rankable set of 50 CVEs disclosed and exploited in 2025 that demonstrated sustained attacker interest. The list is also available separately, along with associated metadata. See the ",[244,951,953],{"href":952},"\u002F2025-routinely-targeted-vulnerabilities","full list here",[179,955,956,957,602],{},"The 2026 VulnCheck Exploit Intelligence Report is ",[244,958,960],{"href":116,"rel":959,"target":93},[248],"available here",[273,962,472],{"id":471},[179,964,965,966,971,972,977,978,602],{},"VulnCheck closes the exploitation-timing gap by enabling security teams to operate on attacker timelines instead of disclosure timelines. By delivering machine-consumable, evidence-driven intelligence on when vulnerabilities become exploitable and how attackers actually use them, VulnCheck helps organizations prepare earlier, respond decisively, and verify exploitation without relying on scores or delayed consensus. Follow the company on ",[244,967,970],{"href":968,"rel":969},"https:\u002F\u002Fwww.linkedin.com\u002Fcompany\u002Fvulncheck\u002F?viewAsMember=true",[248],"LinkedIn"," or ",[244,973,976],{"href":974,"rel":975},"https:\u002F\u002Fx.com\u002Fvulncheckai",[248],"X",". To learn more about VulnCheck, visit ",[244,979,982],{"href":980,"rel":981},"https:\u002F\u002Fvulncheck.com\u002F",[248],"https:\u002F\u002Fvulncheck.com",[273,984,986],{"id":985},"media-contacts","Media Contacts",[179,988,989,990],{},"Jason Vancura\nMarketbridge for VulnCheck\n",[244,991,993],{"href":992},"mailto:vulncheck@marketbridge.com","vulncheck@marketbridge.com",{"title":108,"searchDepth":144,"depth":144,"links":995},[996,997],{"id":471,"depth":144,"text":472},{"id":985,"depth":144,"text":986},"2026-02-25","Analysis Finds 1% of Vulnerabilities Were Exploited in the Wild in 2025 and Identifies the 50 Most Routinely Targeted Flaws of Last Year",{},"\u002Fpress\u002Freal-world-exploit-report",{"title":890,"description":999},"press\u002Freal-world-exploit-report","2qs6UzepF_mzu5lZNbLHsopOx9X2Pei3k8z4aasDvgc",{"id":1006,"title":1007,"articles":1008,"authors":1013,"body":1019,"date":1121,"description":1122,"extension":148,"meta":1123,"navigation":54,"path":1126,"seo":1127,"stem":1128,"__hash__":1129},"press\u002Fpress\u002Fvulncheck-joins-operational-technology-cybersecurity-coalition.md","VulnCheck Joins Operational Technology Cybersecurity Coalition to Advance Real-Time Exploit Intelligence",[1009],{"title":1010,"source":1011,"link":1012,"date":998},"VulnCheck joins OT Cybersecurity Coalition to bolster industrial exploit intelligence, boost vulnerability prioritization","Industrial Cyber","https:\u002F\u002Fwww.vulncheck.com\u002Fpress\u002Fvulncheck-joins-operational-technology-cybersecurity-coalition",[1014],{"name":1015,"avatar":1016,"link":1017,"linkName":1018},"Tom Bain","\u002Fteam\u002Fthomas-bain.jpg","https:\u002F\u002Ftwitter.com\u002Ftmbainjr1","@tmbainjr1",{"type":141,"value":1020,"toc":1117},[1021,1038,1045,1048,1054,1057,1064,1067,1077,1081,1084,1092,1094,1108],[179,1022,1023,1026,1027,1032,1033,1037],{},[547,1024,1025],{},"WASHINGTON, D.C. and LEXINGTON, Mass — Feb. 24, 2026 —"," ",[244,1028,1031],{"href":1029,"rel":1030},"https:\u002F\u002Fwww.otcybercoalition.org\u002F",[248],"The Operational Technology Cybersecurity Coalition"," (OTCC) and ",[244,1034,910],{"href":1035,"rel":1036},"https:\u002F\u002Fwww.vulncheck.com",[248]," today announced that VulnCheck has joined the coalition as its newest member, expanding efforts to strengthen the cybersecurity of operational technology (OT) environments and protect critical infrastructure as threats targeting industrial control systems and network-edge devices continue to increase.",[916,1039,1042],{"author":1040,"position":1041},"Arun Chetty","Vice President at National Grid Partners",[179,1043,1044],{},"There is growing urgency within the critical infrastructure segment to modernize how we prioritize and address potential software vulnerabilities. It’s clear that attackers are moving faster than defenders can triage flaws, and VulnCheck provides continuously updated intelligence at machine speed and with more precision than any other organization we’ve seen. VulnCheck's contribution to the OTCC's efforts in safeguarding critical infrastructure will enrich the global intelligence ecosystem.",[179,1046,1047],{},"The OTCC focuses on improving OT security and advancing policies that strengthen critical infrastructure resilience. Representing the entire OT lifecycle, the OT Cyber Coalition believes that the strongest, most effective approach to securing our nation’s critical infrastructure is one that is open, vendor-neutral, and allows for diverse solutions and information sharing without compromising cybersecurity defenses. VulnCheck delivers threat intelligence solutions that power cybersecurity products and critical response workflows used to protect the global economy, critical infrastructure, enterprises and governments. By joining OTCC, VulnCheck strengthens the group’s ability to ground policy discussions and infrastructure defense strategies in current threat activity.",[916,1049,1051],{"author":893,"position":1050},"Founder and CEO at VulnCheck",[179,1052,1053],{},"Network-edge devices, particularly in OT environments, are among the most highly targeted assets. Greater visibility into exploited flaws and active threats is essential to helping defenders reduce risk in critical infrastructure environments. Through OTCC membership, we can help ensure policymakers and operators have access to timely, actionable exploit intelligence that reflects real-world activity.",[179,1055,1056],{},"VulnCheck provides machine-readable exploit intelligence to help organizations identify and prioritize vulnerabilities that pose an active risk. Its platform analyzes first-party evidence of exploitation and reviews more than 500 million records across all known CVEs from over 500 sources to surface actionable intelligence. Data sources are refreshed multiple times per day, providing updated context on threat actor activity, ransomware associations and publicly available exploit proof-of-concept code. Automating this analysis removes operational bottlenecks and enables security teams to respond more quickly to emerging threats.",[916,1058,1061],{"author":1059,"position":1060},"Tatyana Bolton","Executive Director, OTCC",[179,1062,1063],{},"Operational technology environments face increasingly sophisticated and persistent threats. Adding VulnCheck’s exploit intelligence capabilities strengthens the coalition’s collective ability to inform data-driven public policy discussions and support organizations responsible for securing critical infrastructure.",[179,1065,1066],{},"VulnCheck will participate in S4x26, a conference focused on industrial control systems and operational technology security. VulnCheck representatives will be available onsite, including during the Premium Cabana Session on Wednesday, Feb. 25, from 1 p.m. to 4:30 p.m. ET.",[179,1068,1069,1070,1073,1074,602],{},"To learn more about OTCC and its members, visit ",[244,1071,1029],{"href":1029,"rel":1072},[248],". To learn more about VulnCheck and its exploit and vulnerability intelligence offerings, visit ",[244,1075,908],{"href":908,"rel":1076},[248],[273,1078,1080],{"id":1079},"about-the-operational-technology-cybersecurity-coalition","About the Operational Technology Cybersecurity Coalition",[179,1082,1083],{},"The OTCC is a diverse group of cybersecurity stakeholders dedicated to improving the cybersecurity of operational technology environments and strengthening public policy to secure critical infrastructure across the country.",[179,1085,1086,1087],{},"For more information, visit: ",[244,1088,1091],{"href":1089,"rel":1090},"https:\u002F\u002Fwww.otcybercoalition.orgAbout",[248],"https:\u002F\u002Fwww.otcybercoalition.org",[273,1093,472],{"id":471},[179,1095,1096,1097,1099,1100,971,1104,602],{},"VulnCheck closes the exploitation-timing gap by enabling security teams to operate on attacker timelines instead of disclosure timelines. By delivering machine-consumable, evidence-driven intelligence on when vulnerabilities become exploitable and how attackers actually use them, VulnCheck helps organizations prepare earlier, respond decisively, and verify exploitation ",[835,1098],{},"\nwithout relying on scores or delayed consensus. Follow the company on ",[244,1101,970],{"href":1102,"rel":1103},"https:\u002F\u002Fcts.businesswire.com\u002Fct\u002FCT?id=smartlink&url=https%3A%2F%2Fwww.linkedin.com%2Fcompany%2Fvulncheck%2F%3FviewAsMember%3Dtrue&esheet=54371212&newsitemid=20251207656200&lan=en-US&anchor=LinkedIn&index=5&md5=2cc19508986bfa8f455300e468428594",[248],[244,1105,976],{"href":1106,"rel":1107},"https:\u002F\u002Fcts.businesswire.com\u002Fct\u002FCT?id=smartlink&url=https%3A%2F%2Fx.com%2Fvulncheckai&esheet=54371212&newsitemid=20251207656200&lan=en-US&anchor=X&index=6&md5=3cbb2e44b6fc035002323f68f420d735",[248],[179,1109,1110,1111,1115],{},"To learn more about VulnCheck, visit ",[244,1112,982],{"href":1113,"rel":1114},"https:\u002F\u002Fcts.businesswire.com\u002Fct\u002FCT?id=smartlink&url=https%3A%2F%2Fvulncheck.com%2F&esheet=54371212&newsitemid=20251207656200&lan=en-US&anchor=https%3A%2F%2Fvulncheck.com%2F&index=7&md5=80ab20d77eb3e068827df9bfa30f3792",[248],[547,1116,602],{},{"title":108,"searchDepth":144,"depth":144,"links":1118},[1119,1120],{"id":1079,"depth":144,"text":1080},{"id":471,"depth":144,"text":472},"2026-02-24","Partnership expands collaboration to strengthen operational technology security and critical infrastructure protection",{"type":1124,"slug":1125},"press","vulncheck-joins-operational-technology-cybersecurity-coalition","\u002Fpress\u002Fvulncheck-joins-operational-technology-cybersecurity-coalition",{"title":1007,"description":1122},"press\u002Fvulncheck-joins-operational-technology-cybersecurity-coalition","b_M1ymwra6xS9w6TxHFulxxO_SNl6lPQeOQya21vLGc",{"id":1131,"title":1132,"articles":1133,"authors":1134,"body":1136,"date":1207,"description":1208,"extension":148,"meta":1209,"navigation":54,"path":1211,"seo":1212,"stem":1213,"__hash__":1214},"press\u002Fpress\u002Fvulncheck-establishes-emea-headquarters-in-cheltenham-uk-amid-soaring-global-demand-for-exploit-intelligence.md","VulnCheck Establishes EMEA Headquarters in Cheltenham, UK Amid Soaring Global Demand for Exploit Intelligence",[],[1135],{"name":1015,"avatar":1016,"link":1017,"linkName":1018},{"type":141,"value":1137,"toc":1204},[1138,1147,1153,1156,1163,1166,1172,1175,1182,1189,1192,1196,1199],[179,1139,1140,1026,1143,1146],{},[547,1141,1142],{},"LEXINGTON, Mass., February 19, 2026 —",[244,1144,910],{"href":1145},"www.vulncheck.com",", the exploit intelligence company, today announced it is establishing its EMEA headquarters in Cheltenham, United Kingdom, following a year of regional growth, including 319% year-over-year EMEA ARR growth and 100% customer growth. The move will strengthen VulnCheck’s ability to support customers across Europe, the Middle East and Africa as demand for exploit intelligence increases.",[916,1148,1150],{"author":893,"position":1149},"CEO of VulnCheck",[179,1151,1152],{},"EMEA has quickly become one of our fastest-growing regions globally. Establishing our EMEA headquarters in Cheltenham brings us closer to customers and partners while investing in a well-established U.K. cyber ecosystem. The depth of talent and collaboration here makes it the right location for our continued international growth.",[179,1154,1155],{},"Cheltenham is a key hub within the U.K.’s cyber sector, anchored by a strong public-private security community, leading academic institutions and a fast-growing cluster of cyber companies. VulnCheck’s new office will serve as its regional hub for customer engagement, partnerships and talent expansion, reinforcing the company’s long-term commitment to the U.K. market and beyond.",[916,1157,1160],{"author":1158,"position":1159},"Phil Clement","Head of inward investment, growth and enterprise team at Gloucestershire County Council",[179,1161,1162],{},"I am delighted that U.S. firm VulnCheck have chosen Cheltenham in Gloucestershire for their U.K. base, as they grow the business after a successful fund raise. With demand increasing for cyber risk assessments, the company is well placed to utilise the talent pool in the Gloucestershire cluster and is a welcome addition to our cyber community.",[179,1164,1165],{},"The opening follows VulnCheck’s $25 million Series B funding round led by Sorenson Capital, with participation from National Grid Partners and existing investors, including Ten Eleven Ventures and In-Q-Tel. The investment brings the company’s total funding to $45 million and supports continued product innovation and global expansion.",[916,1167,1169],{"author":1040,"position":1168},"Vice President, National Grid Partners",[179,1170,1171],{},"At National Grid Partners, we invest in technologies that strengthen resilience at scale. VulnCheck’s strong growth across EMEA reflects the urgency of today’s cyber threats and the value of its exploit and vulnerability intelligence platform. We’re excited to support the company’s expansion in the U.K. and beyond.",[179,1173,1174],{},"Last year, VulnCheck was selected as one of four finalists for the 2025 Black Hat Europe Startup Spotlight competition, underscoring its growing recognition within the global cybersecurity community. In 2024, the company participated in international cyber growth initiatives supported by Plexal, accelerating its engagement with the U.K. ecosystem and building relationships that helped pave the way for its Cheltenham expansion. Plexal is an innovation and growth company that strengthens the U.K.’s technology capabilities through collaboration.",[916,1176,1179],{"author":1177,"position":1178},"Saj Huq","CCO at Plexal",[179,1180,1181],{},"We’re excited to welcome VulnCheck to the U.K., having collaborated with the team to support their international expansion. Establishing its EMEA HQ in the U.K. is a fantastic validator of our national cyber sector, which is buzzing with innovation, talent and solutions, so the team will certainly feel at home. VulnCheck is increasingly becoming a key technology partner to mission-critical organisations globally and their decision to grow in the U.K. further underscores the importance of international collaboration and interoperability across global partners. This also further validates Cheltenham's global relevance as a thriving cyber, technology and national security ecosystem – something that we’ve long been committed to supporting at Plexal. We look forward to building our existing relationship with VulnCheck and celebrating their continued success!",[179,1183,1184,1185,602],{},"To learn more about VulnCheck and its exploit intelligence solutions, visit ",[244,1186,1145],{"href":1187,"rel":1188},"http:\u002F\u002Fwww.vulncheck.com",[248],[1190,1191],"hr",{},[297,1193,1194],{"id":471},[547,1195,472],{},[179,1197,1198],{},"VulnCheck closes the exploitation-timing gap by enabling security teams to operate on attacker timelines instead of disclosure timelines. By delivering machine-consumable, evidence-driven intelligence on when vulnerabilities become exploitable and how attackers actually use them, VulnCheck helps organizations prepare earlier, respond decisively, and verify exploitation without relying on scores or delayed consensus. Follow the company on LinkedIn or X.",[179,1200,1110,1201,602],{},[244,1202,1035],{"href":1035,"rel":1203},[248],{"title":108,"searchDepth":144,"depth":144,"links":1205},[1206],{"id":471,"depth":493,"text":472},"2026-02-19","Company expands international presence following 319% year-over-year EMEA ARR growth and 100% customer growth",{"slug":1210},"vulncheck-establishes-emea-headquarters-in-cheltenham-uk-amid-soaring-global-demand-for-exploit-intelligence","\u002Fpress\u002Fvulncheck-establishes-emea-headquarters-in-cheltenham-uk-amid-soaring-global-demand-for-exploit-intelligence",{"title":1132,"description":1208},"press\u002Fvulncheck-establishes-emea-headquarters-in-cheltenham-uk-amid-soaring-global-demand-for-exploit-intelligence","2Uq97nzn4XhrliITx1sCqGuqsXp_yJx9TUf3E9GnHuc",[1216],{"id":1217,"extension":8,"list":1218,"meta":1239,"stem":1240,"__hash__":1241},"quotes\u002Fquotes.yml",[1219,1225,1230,1233],{"quote":1220,"name":1221,"position":1222,"avatar":1223,"index":1224},"VulnCheck’s superpower is its ability to discover vulnerability intelligence that other solutions are unable to access, acquire, and have no ability to find - which is the key to security since you can’t secure what you don’t know about, Its deep and talented team with cross-disciplinary expertise in vulnerability research and exploit development gives them a perspective on the threat landscape that we have not seen anywhere else in the industry. The VulnCheck team is providing unique threat insights with much deeper exploit context that organizations formerly had no ability to find.","Tony Spinelli","Venture Partner at Sorenson Ventures","https:\u002F\u002Fwww.sorensoncapital.com\u002Fwp-content\u002Fuploads\u002F2023\u002F11\u002FTony-Spinelli-cropped-website-headshot.png",1,{"quote":1226,"name":1227,"position":1228,"avatar":1229,"index":144},"The core problem with existing solutions such as NVD is that vulnerability data alone does not give security teams enough context to help them prioritize remediation efforts, By enriching vulnerability data with information about exploit activity, VulnCheck is giving security teams the coveted ability to prioritize remediation of vulnerabilities based on a real-time assessment of exploit weaponization.","Katie Gray","Senior Partner at In-Q-Tel","https:\u002F\u002Fcybersecuritysummit.com\u002Fwp-content\u002Fuploads\u002F2018\u002F07\u002FGray-250x300-1-wpcf_200x240.jpg",{"quote":1231,"name":893,"position":1232,"avatar":894,"index":493},"Our team’s mission is to autonomously gather and leverage exploit and vulnerability intelligence to manage the world’s vulnerabilities at scale,” said Bettini. “The investments we’ve secured show strong confidence in our vision. We are thrilled to be working with these strategic partners to fuel our next stage of growth.","Founder at VulnCheck",{"quote":1234,"name":1235,"position":1236,"avatar":1237,"index":1238},"VulnCheck's hypergrowth highlights its unique ability to address one of today's most pressing organizational challenges. As cybersecurity specialist investors, we backed VulnCheck because the current paradigms for threat intelligence and vulnerability management are fundamentally flawed. They require too much human intervention to distill the information needed to prioritize action. VulnCheck is disrupting these legacy approaches by autonomously collecting and integrating exploit and vulnerability intelligence at scale. Founder Anthony Bettini's unparalleled technical expertise, steady leadership, and disciplined approach to product development further cement the company's position as a game-changer in the industry.","Mark Hatfield","Founder \u002F General Partner, Ten Eleven Ventures","https:\u002F\u002Fwww.1011vc.com\u002Fwp-content\u002Fuploads\u002FTenEleven-Mark-Hatfield-Headshot.png",4,{},"quotes","lhJYzn0xmhA72_zvTMIXRwJRJ8z81BvOwuLTwqiaLfY",1778871861180]