Companies patch fast but rarely verify if fixes actually lock attackers out.
- Hackers exploit flaws in 7 days on average, per Mandiant data
- Most companies take 32 days to patch edge devices, says Verizon report
- Only 1 in 10 organizations confirm patches prevent reinfection
Security teams have spent years building tools to hunt down vulnerabilities. Now the uncomfortable truth is emerging: they rarely prove those fixes actually work. Mandiant’s latest M-Trends report estimates attackers now take negative seven days to weaponize a flaw after it’s disclosed—meaning companies often patch after the damage starts. Verizon’s 2025 Data Breach Investigations Report shows the median time to close edge device gaps is 32 days. The gap between attack speed and remediation is widening fast.
We fix things faster than ever—but never check the fix
The industry has poured money into scanning tools, patch management suites, and threat intelligence feeds. Yet a silent majority skip the one step that proves success: testing whether a patch actually stops the original attack. A 2025 study by the SANS Institute found that while 87% of organizations patch within two weeks, just 9% ever verify the patch prevents reinfection. The rest assume the fix holds, which is like locking a door but never testing if it stays shut.
The problem isn’t just speed. It’s visibility. Modern endpoints and cloud workloads create a blind spot: once a patch is applied, teams rarely re-scan the device to confirm the vulnerability vanished. Many tools flag the flaw as “resolved” the moment a patch installs, not when the gap truly closes. That’s like marking a pothole fixed after dropping in gravel, without ever driving over it to check the ride is smooth.
Edge devices are the weakest link
Remote offices, IoT sensors, and branch routers often run outdated firmware that never gets updated. Verizon’s report shows these devices sit exposed for weeks after a patch drops. Attackers know this and target them first. A recent CISA advisory warned that unpatched VPN concentrators at mid-sized firms were breached within hours of a patch release. The fix existed; the confirmation never happened.
Even when teams try to verify, tools often give false comfort. Vulnerability scanners sometimes miss edge cases in patched code or misread registry keys as “patched” while the flaw remains exploitable. One healthcare network in Texas discovered this the hard way: their scanner reported a critical flaw as closed, but a red-team exercise proved the flaw was still open. The patch had installed incorrectly, leaving the door wide open.
Some teams are changing the game
A handful of security shops now bake “proof of fix” scans into their patch cycles. After applying a patch, they re-run vulnerability scans and even run exploit code to confirm the flaw no longer triggers. One financial services firm cut repeat intrusions by 78% after adding this step. The catch? It doubles the patching workload and requires skilled staff who can distinguish between a real fix and a false positive.
Startups have begun selling “remediation validation” services that simulate attacks to confirm patches hold. These tools aren’t cheap, but they’re cheaper than the breach that follows a false sense of security. Still, adoption remains low. Most budgets prioritize prevention over verification.
What happens next—if nothing changes
If teams keep patching without validating, the gap between attack and defense will keep shrinking. Mandiant’s “negative seven days” estimate—where attacks happen before patches even ship—will become normal. Edge devices will remain the soft target of choice, and intrusions will spike in remote offices that never get proper scans.
The fix is simple but overlooked: add a mandatory verification step to every patch cycle. Scan again after applying the patch. Run a controlled exploit to confirm the flaw is gone. It doesn’t require new tools, just a change in process. Security teams already do the hard work of patching. Now they need to do the easy work of proving it worked.
What You Need to Know
- Source: The Hacker News
- Published: May 13, 2026 at 11:30 UTC
- Category: Security
- Topics: #hackernews · #security · #vulnerabilities · #exploit · #most-remediation-programs · #never-confirm
Read the Full Story
This is a curated summary. For the complete article, original data, quotes and full analysis:
All reporting rights belong to the respective author(s) at The Hacker News. GlobalBR News summarizes publicly available content to help readers discover the most relevant global news.
Curated by GlobalBR News · May 13, 2026
🇧🇷 Resumo em Português
Mais de 80% das empresas aplicam atualizações de segurança, mas poucas verificam se os invasores ainda conseguem explorar as brechas. Um estudo recente mostrou que, embora a maioria das organizações corra para corrigir vulnerabilidades, a pressa nem sempre garante proteção real — e hackers continuam se aproveitando dessa falha para invadir sistemas sem deixar rastro.
A pesquisa, que analisou práticas de gestão de patches em empresas globais, revelou que o tempo médio de 32 dias para aplicar correções é insuficiente quando não há uma verificação posterior. No Brasil, onde o número de ataques cibernéticos cresceu 105% em 2023, segundo a Febrabrasil, a falta de testes pós-atualização expõe não só grandes corporações, mas também pequenas e médias empresas, que muitas vezes acreditam estar seguras após instalar um patch. Especialistas alertam que um simples update não fecha a porta se o invasor já tiver acesso ao sistema — e é aí que a maioria erra.
A solução passa por auditorias automatizadas e testes de vulnerabilidade contínuos, mas o desafio é convencer empresas de que segurança digital não termina com um download. Enquanto isso, os criminosos seguem um passo à frente, e a pergunta que fica é: quantas organizações brasileiras ainda não descobriram que suas “correções” já foram superadas?
The Hacker News
Read full article at The Hacker News →This post is a curated summary. All rights belong to the original author(s) and The Hacker News.
Was this article helpful?
Discussion