Brunswick, ME • (207) 245-1010 • contact@johnzblack.com
Here’s the one piece of good news from Google’s latest Cloud Threat Horizons Report: your MFA investment is actually working. Weak and stolen credentials dropped to 27% of cloud intrusions. Years of pushing multifactor auth are paying off.
Now the bad news.
Attackers noticed. And they pivoted.
Vulnerability exploitation now accounts for 44.5% of cloud intrusions. Nearly double the credential-theft rate. If the credential door is harder to kick in, they’re going through the software door instead. And that door has a very short window.
Google documented exploitation windows collapsing to 48 hours after public disclosure. Not weeks. Not your comfortable monthly patch cycle. Two days.
Right on cue, CISA slapped three more entries on its Known Exploited Vulnerabilities catalog. All confirmed active exploitation:
And then there’s Cisco Catalyst SD-WAN (CVE-2026-20127), now under mass automated exploitation from numerous unique IPs. Not targeted. Not surgical. Carpet bombing.
Google also surfaced the long-dwell stuff. Iran-linked UNC1549 maintained access to one victim for over 18 months, exfiltrating roughly a terabyte of data. China-linked UNC5221 spent 18 months inside a VMware vCenter environment stealing source code. And North Korea’s UNC4899 tricked a developer into AirDropping a malicious archive from a personal device to a corporate workstation, then pivoted through CI/CD to steal millions in crypto.
That last one? That’s not a software exploit. That’s a social engineering attack patches can’t fix.
Put the 48-hour stat in front of whoever still thinks monthly patching is fine for internet-facing systems.
Patch Ivanti EPM, SolarWinds Web Help Desk, and Omnissa Workspace ONE this week. Patch Cisco SD-WAN immediately. Shrink your patch SLA for cloud-facing infrastructure to 7 days or less for critical KEVs. And audit for the old stuff too, because a five-year-old CVE is still getting people owned.
Your MFA win is real. But it doesn’t matter if the next door over is wide open.
Read the full story: https://gnerdsec.com/blog/48-hours-to-patch-or-get-owned/