Ransomware Roulette: Are Your Favorite Vendors Dropping the Ball on Security?
Ransomware criminals are tuning into the Known Exploited Vulnerability (KEV) catalog like it’s their favorite true crime podcast. Researchers found 28% of vulnerabilities in CISA’s list were exploited in 2024. But don’t worry, those old ISP routers are still getting all the attention too. It’s a hacker’s nostalgia trip!

Hot Take:
Who would have thought a government catalog meant to help protect us from cyber threats would double as a shopping list for ransomware attackers? It’s like handing burglars a blueprint to your house, and then being surprised when they come knocking! Maybe next year, instead of a “Known Exploited Vulnerability” list, CISA should publish a “Don’t Try This at Home” guide.
Key Points:
- 28% of bugs in CISA’s Known Exploited Vulnerability (KEV) catalog were used in ransomware attacks in 2024.
- CLEO Harmony and Progress’s Kemp LoadMaster are notable examples of vulnerabilities exploited before being added to KEV.
- Home router vulnerabilities, some over a decade old, were heavily targeted for exploits in 2024.
- GreyNoise criticized vendors like Ivanti, D-Link, and VMware for poor vulnerability management.
- Older vulnerabilities are still being monetized through sophisticated automation by attackers.
Already a member? Log in here