When organizations patched CitrixBleed in 2023, attackers stayed in. As CISA's April 2026 KEV additions and the unpatched BlueHammer variants keep the pressure on security teams, the same identity governance failure is repeating. This analysis reconstructs exactly where the control system broke and what to check today.
AI-assisted development is accelerating faster than security teams can keep up. The Purple Book Community 2026 survey of 650+ security leaders shows 73% report velocity exceeding review capacity, with 70% identifying AI-generated vulnerabilities in production. This analysis examines the resulting “production gap” and its implications.
CVSS assigns severity scores based on theoretical impact. EPSS estimates the probability that adversaries will exploit a vulnerability in the next 30 days. For security teams managing more than 40,000 published CVEs annually, that distinction is operationally critical: Learn why severity alone no longer provides sufficient prioritisation accuracy.
MOVEit exploitation exposed a critical failure in vulnerability management: organizations had signals, patches, and intelligence—but failed to prioritize and respond to active exploitation. This OFA breaks down where controls failed and what security teams must change.
Security teams patch thousands of vulnerabilities each year, yet breaches consistently originate from a small, predictable subset. This analysis explores why patch programs fail and how exploitation intelligence, EPSS, and exposure-based prioritization must replace legacy approaches.
COOKIE / PRIVACY POLICY: This website uses essential cookies required for basic site functionality. We also use analytics cookies to understand how the website is used. We do not use cookies for marketing or personalization, and we do not sell or share any personal data with third parties.