Close Menu

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    Wildlife Cops Are Searching AI Cameras for ICE

    April 8, 2026

    SSA-734261 V1.0: Authentication Bypass Vulnerability in Energy Services Using Elspec G5DFR

    April 8, 2026

    Incident: Eagers Automotive says IT outage stems from cyber incident | iTnews

    April 8, 2026
    Facebook X (Twitter) Instagram
    • Demos
    • Technology
    • Gaming
    • Buy Now
    Facebook X (Twitter) Instagram Pinterest Vimeo
    Canadian Cyber WatchCanadian Cyber Watch
    • Home
    • News
    • Alerts
    • Tips
    • Tools
    • Industry
    • Incidents
    • Events
    • Education
    Subscribe
    Canadian Cyber WatchCanadian Cyber Watch
    Home»News»2026 State of Exploitation: Exploiting The Network Edge | Blog
    News

    2026 State of Exploitation: Exploiting The Network Edge | Blog

    adminBy adminMarch 24, 2026No Comments3 Mins Read
    Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
    Share
    Facebook Twitter LinkedIn Pinterest Email


    Network Edge Device Report

    When I started researching network edge devices with evidence of exploitation in VulnCheck KEV, I wanted to better understand what was actually being targeted. Specifically, I was interested in the types of devices being exploited, whether they were still supported, and how attackers are using them.

    That led me to dig deeper into questions like consumer versus enterprise devices, where vendors are headquartered, and which device types are targeted by botnets versus ransomware. What started as a quick blog post quickly grew into something much larger. The research expanded beyond what typically fits in a blog, so we decided to turn it into a full report as part of our 2026 State of Exploitation research.

    Download the full report

    The timing of this report also aligns with CISA’s recently released Binding Operational Directive, BOD 26-02: Mitigating Risk From End of Support Edge Devices. That raised an important question for me. Can broader exploitation evidence of end of life devices help defenders gain better visibility into the risks in their own environments?

    Network Edge Device Report

    • 42.5 percent of vulnerabilities exploited in 2025 affected devices that are end of life or likely end of life, with additional vulnerabilities impacting products that have already reached end of sale
    • Consumer networking equipment is a major exploitation target. Consumer routers and globally distributed networking products account for 56 percent of exploited edge device vulnerabilities
    • Botnets disproportionately target unsupported devices. 65 percent of vulnerabilities exploited by botnets affect end of life or likely end of life products
    • Many exploited edge device vulnerabilities are not represented in CISA KEV. Only 23.7 percent of the vulnerabilities identified by VulnCheck appear in CISA KEV
    • Active exploitation frequently precedes CVE assignment. VulnCheck issued CVEs for 18 vulnerabilities after detecting exploitation activity through honeypots and canary systems

    I hope you enjoy this exploration into network edge device exploitation.

    Cheers,
    Patrick Garrity

    This research is part of our broader State of Exploitation 2026 series, where we analyze real world exploitation trends using VulnCheck KEV and additional VulnCheck threat intelligence.

    Download the full report

    VulnCheck is helping organizations not just to solve the vulnerability prioritization challenge – we’re working to help equip any product manager, CSIRT/PSIRT or SecOps team and Threat Hunting team to get faster and more accurate with infinite efficiency using VulnCheck solutions.

    We knew that we needed better data, faster across the board, in our industry. So that’s what we deliver to the market. We’re going to continue to deliver key insights on vulnerability management, exploitation and major trends we can extrapolate from our dataset to continuously support practitioners.

    Are you interested in learning more? If so, VulnCheck’s Exploit & Vulnerability Intelligence has broad threat actor coverage. Register and demo our data today.



    Source link

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Previous ArticleVU#330121: IDrive for Windows contains local privilege escalation vulnerability
    Next Article ZDI-26-226: (0Day) Microsoft Azure MCP AzureCliService Command Injection Remote Code Execution Vulnerability
    admin
    • Website

    Related Posts

    News

    Wildlife Cops Are Searching AI Cameras for ICE

    April 8, 2026
    News

    Accelerating Our Footprint and Innovation: Why VulnCheck Posted a Record-Setting Q3 | Blog

    April 8, 2026
    News

    Is a $30,000 GPU Good at Password Cracking?

    April 8, 2026
    Add A Comment

    Comments are closed.

    Demo
    Top Posts

    Global Takedown of Massive IoT Botnets Halts Record-Breaking Cyberattacks

    March 20, 202619 Views

    Catchy & Intriguing

    March 17, 202619 Views

    The Grandparent Scam: How AI Voice Technology Makes This Old Con Deadlier Than Ever

    March 18, 202617 Views
    Stay In Touch
    • Facebook
    • YouTube
    • TikTok
    • WhatsApp
    • Twitter
    • Instagram
    Latest Reviews
    85
    Featured

    Pico 4 Review: Should You Actually Buy One Instead Of Quest 2?

    January 15, 2021 Featured
    8.1
    Uncategorized

    A Review of the Venus Optics Argus 18mm f/0.95 MFT APO Lens

    January 15, 2021 Uncategorized
    8.9
    Editor's Picks

    DJI Avata Review: Immersive FPV Flying For Drone Enthusiasts

    January 15, 2021 Editor's Picks

    Subscribe to Updates

    Get the latest tech news from FooBar about tech, design and biz.

    Demo
    Most Popular

    Global Takedown of Massive IoT Botnets Halts Record-Breaking Cyberattacks

    March 20, 202619 Views

    Catchy & Intriguing

    March 17, 202619 Views

    The Grandparent Scam: How AI Voice Technology Makes This Old Con Deadlier Than Ever

    March 18, 202617 Views
    Our Picks

    Wildlife Cops Are Searching AI Cameras for ICE

    April 8, 2026

    SSA-734261 V1.0: Authentication Bypass Vulnerability in Energy Services Using Elspec G5DFR

    April 8, 2026

    Incident: Eagers Automotive says IT outage stems from cyber incident | iTnews

    April 8, 2026

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    Facebook X (Twitter) Instagram Pinterest
    • Home
    • Technology
    • Gaming
    • Phones
    • Buy Now
    © 2026 ThemeSphere. Designed by ThemeSphere.

    Type above and press Enter to search. Press Esc to cancel.