Pre-disclosure attacks climb as nearly 29% of exploited flaws are hit before public disclosure

March 21, 20262 min read2 sources
Share:
Pre-disclosure attacks climb as nearly 29% of exploited flaws are hit before public disclosure

Attackers are exploiting more vulnerabilities before defenders even know they exist. VulnCheck found that 28.96% of vulnerabilities observed as exploited in 2025 were attacked before public disclosure, up from 23.6% in 2024, according to a report cited by Infosecurity Magazine.

The increase points to a larger share of exploitation happening in the pre-disclosure window, often described as zero-day activity. While the summary did not name specific CVEs or victim organizations, the trend suggests attackers are finding or acquiring usable exploits earlier, and using them before vendors can issue public advisories or patches.

That matters because many of the most damaging campaigns in recent years have targeted internet-facing systems such as firewalls, gateways, and VPN appliances. When exploitation starts before disclosure, defenders lose the normal warning period between a public CVE and active attacks. Security teams may only realize they are exposed after compromise indicators emerge or emergency guidance is published.

The finding also fits a broader pattern documented by government and industry researchers. CISA’s Known Exploited Vulnerabilities catalog continues to grow, reflecting how often attackers weaponize flaws that offer reliable access. Google-owned Mandiant has also warned that time-to-exploit is shrinking, with some campaigns beginning before disclosure and many others following almost immediately after public details appear.

For defenders, the takeaway is straightforward: patching remains necessary, but it is no longer enough to treat disclosure day as the start of the risk window. Organizations with large external attack surfaces, especially those running edge devices or hard-to-update appliances, may need to prioritize asset inventory, exposure reduction, segmentation, and monitoring for suspicious behavior even before vendor alerts are available.

One caveat: the Infosecurity report summarizes VulnCheck’s research, but does not include the full methodology, dataset scope, or whether the 2025 figure is year-to-date. Those details will matter in judging how broadly the trend applies. Even so, the direction is clear: more attackers are operating inside the disclosure gap, and defenders are being forced to respond after exploitation has already started.

Share:

// SOURCES

// RELATED

Anthropic says Chinese AI firms used Claude in distillation attacks

Anthropic says DeepSeek, Moonshot AI and MiniMax used Claude for unauthorized distillation to train competing AI models.

2 min readMar 21

Over-privileged AI tied to 4.5 times higher incident rates, study finds

Teleport survey data suggests over-privileged AI systems are linked to a 76% incident rate and 4.5 times more security incidents.

2 min readMar 21

Crypto payments linked to human trafficking jump 85%, Chainalysis warns

Chainalysis says crypto payments linked to human trafficking rose 85%, driven by scam compounds and fraud operations using forced labor.

2 min readMar 21

Malicious GitHub Codespaces commands can trigger remote code execution

Researchers say crafted GitHub Codespaces repos or pull requests can run malicious setup commands and expose code, tokens and secrets.

2 min readMar 21