Vulnerability trends report
comparing 2016 to 2017
Kir Ermakov
2
#:whoami
- vulners.com founder
- QIWI Group CTO
- Web penetration tester
- Member of “hall-of-fames” (Yandex, Mail.ru, Apple and so on)
3
Vulners Database
- Google-style search engine
- 773.000+ security advisories,
exploits and CVE’s
- 100+ sources of content
- Security awareness subscriptions
- Linux audit API
4
Creepy 2017
- WannaCry
- NotPetya
- Multiple Struts2 RCE
- BadRabbit
5
Not lucky ones
6
And what about…you?!
- You are the lucky dude
- Your security is not better
- Probably even worth
- You still didn’t applied 2FA?
- Tell me more about PCI DSS
- Internet is a new wild west
7
8
Let there be graphs and math
- We analyzed 2016 to 2017 transition statistics
- Activity of over 16,800,000 security fellows
- Correlations in 7 categories
- To tell you the truth: is it really so scary?
9
Vulnerabilities at all
- 6000 vs 16000-a-year
- Researchers did a good job
- What happened in May?
10
Financial and enterprise
- 24% increase for financial
- 11% increase for enterprise
- ”Double digit” is good for
business. And for you?
11
Web exploits
- 75% increase
- Public exploits only
- Same story with private ones?
12
Public exploits total
- 30% decrease
- More exploits becomes private
- Or researchers are lazy?
13
So what?
- Number of threats is increasing ”double digit”
- More exploits becomes private
- No chance to hold the flood by the hands
- Yes, it is scary
14
Thanks
- isox@vulners.com
- Analyze with us
- We are really trying to make this world better
- Stop paying for features that are available for free

More Related Content

PDF
Security awareness for information security team
PPTX
Why vulners? Short story about reinventing a wheel
PDF
Vulnerability Funalitics with vulners.com
PDF
Vulners: Google for hackers
PPTX
Web Vulnerabilities - Building Basic Security Awareness
PDF
10 things I’ve learnt about web application security
PDF
[Cluj] CSP (Content Security Policy)
PDF
Web vulnerabilities
Security awareness for information security team
Why vulners? Short story about reinventing a wheel
Vulnerability Funalitics with vulners.com
Vulners: Google for hackers
Web Vulnerabilities - Building Basic Security Awareness
10 things I’ve learnt about web application security
[Cluj] CSP (Content Security Policy)
Web vulnerabilities

What's hot (20)

PPS
Information Gathering with Google (c0c0n - India)
PDF
Jose Selvi - FIESTA: an HTTPS side-channel party [rooted2018]
PDF
Alfonso Muñoz y Miguel Hernandez - Playing with mastodon for fun and profit [...
PPTX
Security Protection for WordPress
PPTX
Basics of getting Into Bug Bounty Hunting
PPTX
Security testing operation vijay
PDF
Content Security Policy
PDF
Java EE 6 Security in practice with GlassFish
PPTX
Navigating Online Threats - Website Security for Everyday Website Owners
ODP
BSides Cincy: Active Defense - Helping threat actors hack themselves!
PDF
Defeating Cross-Site Scripting with Content Security Policy (updated)
PPTX
WEB SECURITY
PDF
Hackfest presentation.pptx
PDF
Modern Web Application Defense
PPTX
11 Commandments of Cyber Security for the Home
PPTX
Web security by khubaib
PDF
Owasp Mobile Risk Series : M3 : Insufficient Transport Layer Protection
PPTX
Security testing for web developers
PPTX
Web security: concepts and tools used by attackers
PPT
Starwest 2008
Information Gathering with Google (c0c0n - India)
Jose Selvi - FIESTA: an HTTPS side-channel party [rooted2018]
Alfonso Muñoz y Miguel Hernandez - Playing with mastodon for fun and profit [...
Security Protection for WordPress
Basics of getting Into Bug Bounty Hunting
Security testing operation vijay
Content Security Policy
Java EE 6 Security in practice with GlassFish
Navigating Online Threats - Website Security for Everyday Website Owners
BSides Cincy: Active Defense - Helping threat actors hack themselves!
Defeating Cross-Site Scripting with Content Security Policy (updated)
WEB SECURITY
Hackfest presentation.pptx
Modern Web Application Defense
11 Commandments of Cyber Security for the Home
Web security by khubaib
Owasp Mobile Risk Series : M3 : Insufficient Transport Layer Protection
Security testing for web developers
Web security: concepts and tools used by attackers
Starwest 2008
Ad

Similar to Vulners report: comparing vulnerability world 2016 to 2017 (20)

PPT
Qualys user group presentation - vulnerability management - November 2009 v1 3
PDF
Lessons learned from 2017 cybersecurity incidents, 2018 and beyond
PPTX
ITBN 2008 - Evolution of Key Risks - Dr. Richard Reiner - 200808.pptx
PPTX
The most well known closed vulnerabilities
PDF
2016 Trends in Security
PDF
En msft-scrty-cntnt-e book-cybersecurity
PDF
Istr number 23 internet security threat repor 2018 symantec
PDF
2022 Vulnerability Statistics Report.pdf
PDF
Edgescan 2022 Vulnerability Statistics Report
PDF
STUDY: Website Vulnerability Assessment
PDF
ISTR Internet Security Threat Report 2019
PDF
Qrator Labs annual report 2017
PDF
WhiteHat’s Website Security Statistics Report 2015
PDF
WhiteHat’s 12th Website Security Statistics [Full Report]
PDF
IBM X-Force Threat Intelligence Index 2017
PDF
Sophos Security Threat Report 2014
PDF
WhiteHat Security Website Statistics [Full Report] (2013)
PPTX
Edgescan vulnerability stats report 2019 - h-isac-2-2-2019
PDF
Eset trends report_2018
PDF
Cybersecurity Trends 2018: The costs of connection
Qualys user group presentation - vulnerability management - November 2009 v1 3
Lessons learned from 2017 cybersecurity incidents, 2018 and beyond
ITBN 2008 - Evolution of Key Risks - Dr. Richard Reiner - 200808.pptx
The most well known closed vulnerabilities
2016 Trends in Security
En msft-scrty-cntnt-e book-cybersecurity
Istr number 23 internet security threat repor 2018 symantec
2022 Vulnerability Statistics Report.pdf
Edgescan 2022 Vulnerability Statistics Report
STUDY: Website Vulnerability Assessment
ISTR Internet Security Threat Report 2019
Qrator Labs annual report 2017
WhiteHat’s Website Security Statistics Report 2015
WhiteHat’s 12th Website Security Statistics [Full Report]
IBM X-Force Threat Intelligence Index 2017
Sophos Security Threat Report 2014
WhiteHat Security Website Statistics [Full Report] (2013)
Edgescan vulnerability stats report 2019 - h-isac-2-2-2019
Eset trends report_2018
Cybersecurity Trends 2018: The costs of connection
Ad

More from Kirill Ermakov (7)

PPTX
How to get a well done penetration test
PPTX
Под капотом Vulners
PPTX
SOC training
PPTX
Почему вам не нужен SOC
PPTX
Подход QIWI к проведению тестирования на проникновение
PPTX
Let’s play the game. Yet another way to perform penetration test. Russian “re...
PPTX
Lets talk about bug hunting
How to get a well done penetration test
Под капотом Vulners
SOC training
Почему вам не нужен SOC
Подход QIWI к проведению тестирования на проникновение
Let’s play the game. Yet another way to perform penetration test. Russian “re...
Lets talk about bug hunting

Recently uploaded (20)

PPTX
ai agent creaction with langgraph_presentation_
PPTX
CHAPTER-2-THE-ACCOUNTING-PROCESS-2-4.pptx
PDF
Navigating the Thai Supplements Landscape.pdf
PDF
Tetra Pak Index 2023 - The future of health and nutrition - Full report.pdf
PPTX
New ISO 27001_2022 standard and the changes
PPTX
recommendation Project PPT with details attached
PPTX
DS-40-Pre-Engagement and Kickoff deck - v8.0.pptx
PDF
OneRead_20250728_1808.pdfhdhddhshahwhwwjjaaja
PPTX
Business_Capability_Map_Collection__pptx
PPT
Image processing and pattern recognition 2.ppt
PPTX
MBA JAPAN: 2025 the University of Waseda
PDF
Best Data Science Professional Certificates in the USA | IABAC
PPTX
FMIS 108 and AISlaudon_mis17_ppt_ch11.pptx
PPTX
Crypto_Trading_Beginners.pptxxxxxxxxxxxxxx
PPTX
CYBER SECURITY the Next Warefare Tactics
PPTX
eGramSWARAJ-PPT Training Module for beginners
PPTX
sac 451hinhgsgshssjsjsjheegdggeegegdggddgeg.pptx
PDF
An essential collection of rules designed to help businesses manage and reduc...
PPTX
statsppt this is statistics ppt for giving knowledge about this topic
PDF
REAL ILLUMINATI AGENT IN KAMPALA UGANDA CALL ON+256765750853/0705037305
ai agent creaction with langgraph_presentation_
CHAPTER-2-THE-ACCOUNTING-PROCESS-2-4.pptx
Navigating the Thai Supplements Landscape.pdf
Tetra Pak Index 2023 - The future of health and nutrition - Full report.pdf
New ISO 27001_2022 standard and the changes
recommendation Project PPT with details attached
DS-40-Pre-Engagement and Kickoff deck - v8.0.pptx
OneRead_20250728_1808.pdfhdhddhshahwhwwjjaaja
Business_Capability_Map_Collection__pptx
Image processing and pattern recognition 2.ppt
MBA JAPAN: 2025 the University of Waseda
Best Data Science Professional Certificates in the USA | IABAC
FMIS 108 and AISlaudon_mis17_ppt_ch11.pptx
Crypto_Trading_Beginners.pptxxxxxxxxxxxxxx
CYBER SECURITY the Next Warefare Tactics
eGramSWARAJ-PPT Training Module for beginners
sac 451hinhgsgshssjsjsjheegdggeegegdggddgeg.pptx
An essential collection of rules designed to help businesses manage and reduc...
statsppt this is statistics ppt for giving knowledge about this topic
REAL ILLUMINATI AGENT IN KAMPALA UGANDA CALL ON+256765750853/0705037305

Vulners report: comparing vulnerability world 2016 to 2017