Hackers now exploit new vulnerabilities in just 15 minutes

Hackers are now ​​moving faster than ever when it comes to scanning vulnerability announcements from software vendors.

Threat actors are actively scanning for vulnerable endpoints within a period of just 15 minutes once a new Common Vulnerabilities and Exposures (CVE) document is published, according to Palo Alto’s 2022 Unit 42 Incident Response Report.

Getty Images

As reported by Bleeping Computer, the report stresses how hackers are always scanning software vendor bulletin boards, which is where vulnerability announcements are disclosed in the form of CVEs.

From here, these threat actors can potentially exploit these details in order to infiltrate a corporate network. It also gives them an opportunity to distribute malicious code remotely.

“The 2022 Attack Surface Management Threat Report found that attackers typically start scanning for vulnerabilities within 15 minutes of a CVE being announced,” the blog post from Palo Alto’s Unit 42 states.

With hackers becoming more dangerous than ever in recent years, it can take them mere minutes to find a weak point in their target’s system. This is naturally made much easier if they’re aided by a report detailing what exactly can be exploited.

Simply put, system administrators will basically have to expedite their process in addressing the security defects and patch them before the hackers manage to find a way in.

Bleeping Computer highlights how scanning doesn’t require a threat actor to have much experience in the activity to be effective. In fact, anyone with a rudimentary understanding of scanning CVEs can perform a search on the web for any publicly disclosed vulnerable endpoints.

They can then offer such information on dark web markets for a fee, which is when hackers who actually know what they’re doing can buy them.

Stock Depot/Getty Images

Case in point: Unit 42’s report mentioned CVE-2022-1388, a critical unauthenticated remote command execution vulnerability that was affecting F5 BIG-IP products. After the defect was announced on May 4, 2022, a staggering 2,552 scanning and exploitation attempts were detected within just 10 hours of the initial disclosure.

During the first half of 2022, 55% of exploited vulnerabilities in Unit 42 cases are attributed to ProxyShell, followed by Log4Shell (14%), SonicWall CVEs (7%), and ProxyLogon (5%).

Activity involving hackers, malware, and threat actors in general has evolved at an aggressive rate in recent months. For example, individuals and groups have found a way to plant malicious code onto motherboards that is extremely difficult to remove. Even the Microsoft Calculator app isn’t safe from exploitation.

This worrying state of affairs in the cyber security space has prompted Microsoft to launch a new initiative with its Security Experts program.

Latest posts

Telstra’s revised NBN plan pricing is a welcome change – but I’d still consider these 4 better-value providers first

As the resident NBN expert for TechRadar, I spend a good deal of time tracking prices of the best NBN plans. And while there...

I installed the TerraMaster D4‑320U into my studio, and it proved to be a fast way to boost on-site data storage

TerraMaster D4-320U: 30-second reviewThe D4-320U is a 4-bay direct-attached storage enclosure for 3.5 or 2.5-inch HDDs or SSDs. The form factor is designed to...

Antigravity’s 360-degree drone is here to help you forget DJI

The Antigravity A1. With DJI facing an imminent import ban in the US and its flagship drones disappearing from shelves, the new Antigravity A1 didn’t...

Capcom’s Resident Evil Requiem marketing strategy has been strange, but we’ve finally got our first look at combat

Capcom has revealed new gameplay of Resident Evil Requiem on Japanese TVThe new gameplay segment showcases gun combat with the main protagonist, Grace AshcroftThe...

How to watch Australia vs England: live stream 2nd Ashes Test for *FREE* from anywhere in the world

Live stream The Ashes 2nd Test for *FREE* on 7Plus Unblock your stream with NordVPN (75% OFF)2nd Test: December 4-8, daily start times: 4am...

Google’s Antigravity AI deleted a developer’s drive and then apologized

A developer using Google Antigravity had their entire drive erased by the AI’s Turbo modeThe AI misinterpreted a cache-clearing command and permanently deleted filesDespite...

Sorry Apple, but I don’t think iOS 26 is fit for purpose

While I wasn’t bowled over by Liquid Glass, the clutch of new features and updates Apple looked set to bring with iOS 26 grabbed...

Trump embraces gas guzzlers and air pollution by weakening fuel economy standards

Motorists drive on Interstate 210 during the morning commute on December 03, 2025 in Pasadena, California. President Donald Trump announced a new plan that lets...

Reddit’s CEO says r/popular ‘sucks,’ and it’s going away

Reddit CEO Steve Huffman. Reddit is “moving away” from r/popular, the default feed for new users, and plans to replace it with “better, more relevant...

Anthropic’s AI bubble ‘YOLO’ warning

Andrew Ross Sorkin and Dario Amodei speak onstage during The New York Times DealBook Summit 2025 at Jazz at Lincoln Center on December 03,...