Signal

Exploitation of high-severity vulnerabilities accelerates sharply in 2025

Evidence first: scan the strongest sources, then decide whether to go deeper.

Published 2026-03-18 13:00 UTC
rss
cveexploitssecurity_policyincident_response
Source links open
Source links and full evidence are open here. Archive history, compare-over-time, alerts, exports, API, integrations, and workflow are paid.
No card needed for the free brief.
Evidence trail (top sources)
top sources (2 domains)domains are deduped. counts indicate coverage, not truth.
2 top sources shown
limited source diversity in top sources
Overview

The 2026 Rapid7 Global Threat Landscape Report reveals that attackers are exploiting high-impact vulnerabilities faster than ever, with the median time from disclosure to known exploitation shrinking to just five days.

Entities
Rapid7CISA Known Exploited Vulnerabilities list
Score total
0.98
Momentum 24h
2
Posts
2
Origins
2
Source types
1
Duplicate ratio
0%
Why now
  • Data from 2025 shows a sharp increase in exploitation speed and volume.
  • The median time to known exploitation inclusion has dropped to just five days.
  • Security teams must adapt quickly to evolving attacker behaviors and compressed timelines.
Why it matters
  • Organizations have less time to detect and remediate critical vulnerabilities before exploitation.
  • The rapid exploitation trend challenges traditional reactive vulnerability management approaches.
  • AI-enabled adversaries further compress the attack cycle, increasing risk exposure.
LLM analysis
Topic mix: lowPromo risk: lowSource quality: high
Recurring claims
  • Median time from vulnerability disclosure to exploitation inclusion dropped to five days in 2025
  • Confirmed exploitation of high-severity CVSS 7–10 vulnerabilities increased 105% year over year in 2025
How sources frame it
  • Rapid7 Labs: neutral
All evidence
All evidence
AI-Enabled Adversaries Compress Time-to-Exploit Following Vulnerability Disclosure
Infosecurity Magazine · infosecurity-magazine.com · 2026-03-18 13:00 UTC
Show filters & breakdown
Posts loaded: 0Publishers: 2Origin domains: 2Duplicates: -
Showing 2 / 0
Top publishers (this list)
  • Infosecurity Magazine (1)
  • Rapid7 Blog (1)
Top origin domains (this list)
  • infosecurity-magazine.com (1)
  • rapid7.com (1)