Back to Main Navigation





Back to Main Navigation


Predictive Threat Assessment Sign Up

Watch Now

PR1ORITY Product Demo
Back to Main Navigation


Come Join Us

CYR3CON is always looking for top talent to join our team.
View Openings
Back to Main Navigation

Take the next step to be in the know, now.

Complete the form and a member of the CYR3CON team will contact you shortly to discuss your cyber security needs.

Contact Form


Vulnerability Re-Exploitation

Posted by Paulo Shakarian on Oct 7, 2020 10:50:43 AM


“What is old is new” – a trite saying, but often true in certain areas.  The idea of re-exploitation – when a software vulnerability is used in a new exploit or piece of malware by hackers – embodies this “what is old is new” idea. 


In recent attacks – Netwalker, Ryuk, etc. older vulnerabilities re-surfaced in the attackers’ platforms. 

Re-exploitation occurs because often organizations don’t patch or otherwise isolate systems that have a vulnerability, but instead engage in things like “virtual patching” where common malware and exploit signatures are stopped before they get to the enterprise.  However, often re-exploited vulnerabilities have a new signature – as the malware or exploit is, by definition, different. 

In today’s video, we discuss re-exploitation and show how, when you have a good source of threat intelligence and good visibility of your assets, you can get ahead of this issue. 

We see numerous organizations which are exposed to vulnerabilities that are actively being re-exploited – while at the same time focusing on certain high-ranked CVSS vulnerabilities that are not of interest to hackers.  This is both dangerous and inefficient.  Check out our recent e-book “Do More With Less” to learn how to gain efficiencies and avoid the issues of re-exploitation, reduce costs, and refocus your security program on the attackers. 


CYR3CON PR1ORITY enables customers to address re-exploitation and related issues by combining threat intelligence with machine learning to predict which of your enterprise’s vulnerabilities will be targeted by hackers. Sign-up now for our Predictive Threat Assessment. 


Topics: Cybersecurity, Vulnerability Management, Software Vulnerabilities