13 Feb
2024
8
min read

Where do vulnerabilities come from?

We often think of vulnerabilities like they appear by magic, but that's simply not the case. There are a few processes that cause vulnerabilities to rear their head in the technology stack, and there are ways we can better understand them.

Thomas Ballin
Founder

We often think of vulnerabilities like they appear by magic, but that's simply not the case.

Vulnerabilities come from one of three places. Either: Something has changed inside a business, such as somebody introducing a new piece of functionality into an application, or changed the configuration on a service. Or, the second place they come from is a business has grown, it's brought in new technology, new people or maybe even acquired another business- all of these occurrences can cause massive vulnerability inheritance.

Or, the third possibility (and really a testament to how unfair security and vulnerability management is more generally) is that a business does absolutely nothing and stays exactly the same. When this happens, a piece of software that wasn't vulnerable yesterday is vulnerable today because some security researcher or threat actor has published a vulnerability. All of a sudden, these zero drip days have dropped and that business is now vulnerable.

It's understanding and having these feeds of telementry that can identify the events that are occurring that might be introducing these vulnerabilities that is crucial to being able to accomplish effective vulnerability management, vulnerability detection, and really shrinking down that time between a vulnerability being introduced into your system and you having the opportunity to do something about it.

bug report

Get a Free Trial  From Cytix

Haven’t tried Cytix yet? Try our free trial to see how it works.

Get a Free Trial

Start Detecting Vulnerabilities Others Miss Today

  • Detect Vulnerabilities Faster
  • Patch Vulnerabilities Faster
  • Be more compliant
Learn More
business
By clicking “Accept All Cookies”, you agree to the storing of cookies on your device to enhance site navigation, analyze site usage, and assist in our marketing efforts. View our Privacy Policy for more information.
By clicking “Accept All Cookies”, you agree to the storing of cookies on your device to enhance site navigation, analyze site usage, and assist in our marketing efforts. View our Privacy Policy for more information.