Frequently Asked Questions

Risks & Challenges of Unpatched Vulnerabilities

Why are unpatched vulnerabilities a major risk for organizations?

Unpatched vulnerabilities leave systems exposed to cyberattacks. According to the 2018 Open Source Security and Risk Analysis by Black Duck Software, 78% of codebases examined contained at least one unpatched vulnerability, with an average of 64 known exploits per codebase. Hackers often exploit these gaps, as seen in high-profile breaches like Equifax and the WannaCry ransomware attack, where attackers targeted organizations running unpatched software. (Source: Black Duck Software, 2018)

How do hackers typically exploit unpatched systems?

Hackers use a variety of methods to exploit unpatched systems, including deploying crypto mining malware, exploiting vulnerabilities in email encryption tools (like EFAIL in PGP and S/MIME), and targeting web servers with known flaws (e.g., Drupalgeddon 2, Heartbleed, OptionsBleed). They often use tools like Shodan to identify vulnerable organizations and can leverage privilege escalation vulnerabilities to gain unauthorized access. (Source: Cymulate Blog)

What percentage of breaches are caused by unpatched vulnerabilities?

Research reports indicate that around 60% of breaches exploit unpatched vulnerabilities. Additionally, about one-third of organizations that suffered breaches were aware of their vulnerabilities but had not patched them. (Source: Cymulate Blog)

Can you provide examples of real-world attacks that exploited unpatched vulnerabilities?

Yes. Notable examples include the Equifax breach, the WannaCry ransomware attack, the EFAIL vulnerability in email encryption tools, the Ticketfly breach, the Unicorn attack exploiting privilege escalation in Microsoft OSes, and the Drupalgeddon 2 vulnerability affecting over 115,000 unpatched servers. (Source: Cymulate Blog)

What are the main challenges organizations face in patching vulnerabilities?

Organizations often struggle with the volume and pace of vulnerability disclosures, resource constraints, and the complexity of patching systems without disrupting operations. According to industry sources, only 5% of vulnerabilities are patched each month, and 60% of breaches involve unpatched vulnerabilities. (Source: Bitsite, Gartner, Cymulate Knowledge Base)

How do unpatchable exposures impact security teams?

Unpatchable exposures, such as those in legacy systems or third-party SaaS and supply chain software, create risks that cannot be addressed through traditional patching. Cymulate helps teams identify and prioritize these exposures, enabling them to implement alternative mitigations through security controls. (Source: Cymulate Knowledge Base)

Features & Capabilities

What types of security assessments does Cymulate offer?

Cymulate offers a range of automated security assessments, including Immediate Threat alert assessments, Email Security assessments, Web Gateway assessments, Web Application Firewall assessments, Endpoint assessments, and Data Loss Prevention assessments. These tests cover the latest threats and evaluate the effectiveness of your security controls across multiple vectors. (Source: Cymulate Blog)

How does Cymulate help organizations prioritize patching?

Cymulate enables organizations to run continuous assessments that identify and validate vulnerabilities, helping teams prioritize patching based on exploitability and business risk. The platform provides actionable mitigation recommendations for each discovered threat. (Source: Cymulate Blog)

What is the benefit of scheduling automated assessments with Cymulate?

Automated assessments can be scheduled at any predefined time (e.g., nightly, morning, midday), allowing organizations to detect vulnerabilities and security gaps proactively. This ensures continuous monitoring and timely identification of risks. (Source: Cymulate Blog)

How does Cymulate present assessment results?

Cymulate provides easy-to-understand, comprehensive reports for each assessment. These reports highlight weak spots, detail the threats discovered, and offer mitigation recommendations tailored to the type and phase of each attack. (Source: Cymulate Blog)

What is Cymulate's approach to continuous threat validation?

Cymulate simulates real-world threats 24/7 to test and validate cyber defenses across all IT environments. This continuous validation ensures organizations stay ahead of emerging threats and maintain a strong security posture. (Source: Cymulate Knowledge Base)

Does Cymulate integrate with other security technologies?

Yes, Cymulate integrates with a wide range of security technologies, including Akamai Guardicore, AWS GuardDuty, BlackBerry Cylance OPTICS, Carbon Black EDR, Check Point CloudGuard, Cisco Secure Endpoint, CrowdStrike Falcon, Wiz, SentinelOne, and more. For a complete list, visit the Partnerships and Integrations page. (Source: Cymulate Knowledge Base)

What is the Cymulate Exposure Validation solution?

Cymulate Exposure Validation is an advanced security testing solution that makes building custom attack chains fast and easy. It provides a unified interface for creating, running, and analyzing security assessments. (Source: Cymulate Blog)

How does Cymulate help with exposure prioritization?

Cymulate validates the exploitability of exposures and ranks them based on prevention and detection capabilities, business context, and threat intelligence. This helps organizations focus on the most critical vulnerabilities. (Source: Cymulate Knowledge Base)

What is Cymulate's threat library and how is it updated?

Cymulate offers an extensive threat library with over 100,000 attack actions aligned to MITRE ATT&CK, updated daily to ensure coverage of the latest threats. (Source: Cymulate Knowledge Base)

Use Cases & Benefits

Who can benefit from using Cymulate?

Cymulate is designed for CISOs, security leaders, SecOps teams, Red Teams, and vulnerability management teams in organizations of all sizes and industries, including finance, healthcare, retail, media, transportation, and manufacturing. (Source: Cymulate Knowledge Base)

What are the main benefits of using Cymulate's platform?

Cymulate delivers measurable improvements in threat resilience, operational efficiency, and alignment of security strategies with business goals. Customers have reported up to a 52% reduction in critical exposures, a 60% increase in team efficiency, and an 81% reduction in cyber risk within four months. (Source: Cymulate Knowledge Base)

How does Cymulate help organizations recover from breaches?

Cymulate enhances visibility and detection capabilities, enabling faster recovery after a breach. For example, a bank improved protection and recovery by replacing manual processes with Cymulate. (Source: Nedbank Case Study)

Are there case studies showing Cymulate's impact?

Yes. For example, Hertz Israel reduced cyber risk by 81% in four months, and a sustainable energy company scaled penetration testing cost-effectively with Cymulate. More case studies are available on the Cymulate Customers page. (Source: Cymulate Knowledge Base)

How does Cymulate address the needs of different security roles?

Cymulate tailors its solutions for CISOs (providing metrics and insights), SecOps teams (automating processes), Red Teams (offensive testing with a large attack library), and vulnerability management teams (prioritizing and validating exposures). (Source: Cymulate Knowledge Base)

What feedback have customers given about Cymulate's ease of use?

Customers consistently praise Cymulate for its intuitive, user-friendly interface and actionable insights. For example, Raphael Ferreira, Cybersecurity Manager, said, "Cymulate is easy to implement and use—all you need to do is click a few buttons, and you receive a lot of practical insights into how you can improve your security posture." (Source: Cymulate Knowledge Base)

How quickly can Cymulate be implemented?

Cymulate is designed for rapid deployment, operating in agentless mode with no need for additional hardware or complex configurations. Customers can start running simulations almost immediately after deployment. (Source: Cymulate Knowledge Base)

What support resources does Cymulate provide?

Cymulate offers email and chat support, a knowledge base with technical articles and videos, webinars, e-books, and an AI chatbot for quick answers and best practices. (Source: Cymulate Knowledge Base)

Security, Compliance & Trust

What security and compliance certifications does Cymulate hold?

Cymulate holds SOC2 Type II, ISO 27001:2013, ISO 27701, ISO 27017, and CSA STAR Level 1 certifications, demonstrating adherence to industry-leading security and privacy standards. (Source: Cymulate Knowledge Base)

How does Cymulate ensure data security?

Cymulate uses encryption for data in transit (TLS 1.2+) and at rest (AES-256), hosts data in secure AWS data centers, and follows a strict Secure Development Lifecycle (SDLC) with continuous vulnerability scanning and annual third-party penetration tests. (Source: Cymulate Knowledge Base)

Is Cymulate GDPR compliant?

Yes, Cymulate incorporates data protection by design and has a dedicated privacy and security team, including a Data Protection Officer (DPO) and Chief Information Security Officer (CISO), ensuring GDPR compliance. (Source: Cymulate Knowledge Base)

What product security features does Cymulate offer?

Cymulate includes mandatory 2-Factor Authentication (2FA), Role-Based Access Controls (RBAC), IP address restrictions, and TLS encryption for its Help Center. (Source: Cymulate Knowledge Base)

Pricing & Plans

What is Cymulate's pricing model?

Cymulate uses a subscription-based pricing model tailored to each organization's requirements. Pricing depends on the chosen package, number of assets, and scenarios selected. For a detailed quote, you can schedule a demo with the Cymulate team. (Source: Cymulate Knowledge Base)

Competition & Differentiation

How does Cymulate differ from other security validation platforms?

Cymulate stands out with its unified platform combining Breach and Attack Simulation (BAS), Continuous Automated Red Teaming (CART), and Exposure Analytics. It offers continuous validation, AI-powered optimization, a comprehensive threat library, and proven customer outcomes such as a 52% reduction in critical exposures and an 81% reduction in cyber risk. (Source: Cymulate Knowledge Base)

What advantages does Cymulate offer for different user segments?

CISOs benefit from quantifiable metrics and strategic alignment, SecOps teams gain operational efficiency, Red Teams access automated offensive testing, and vulnerability management teams receive automated validation and prioritization. (Source: Cymulate Knowledge Base)

Company Information & Resources

What is Cymulate's mission and vision?

Cymulate's mission is to transform cybersecurity practices by enabling organizations to proactively validate defenses, identify vulnerabilities, and optimize their security posture. The vision is to create a collaborative environment for lasting improvements in cybersecurity. (Source: Cymulate Knowledge Base)

Where can I find Cymulate's latest news, research, and events?

You can stay updated through the Cymulate Blog, Newsroom, and Events & Webinars page. (Source: Cymulate Knowledge Base)

Where can I access Cymulate's resource hub for insights and product information?

All resources, including insights, thought leadership, and product information, are available in the Cymulate Resource Hub. (Source: Cymulate Knowledge Base)

Cymulate named a Customers' Choice in 2025 Gartner® Peer Insights™
Learn More
New Case Study: Credit Union Boosts Threat Prevention & Detection with Cymulate
Learn More
New Research: Cymulate Research Labs Discovers Token Validation Flaw
Learn More
An Inside Look at the Technology Behind Cymulate
Learn More

Unpatched Vulnerabilities Open Doors to Cybercrooks

By: Cymulate

Last Updated: January 5, 2026

Phishing Attacks

Patching Gaps Leave Systems Exposed

The 2018 Open Source Security and Risk Analysis report released by Black Duck Software (a developer of auditing software for open-source security) shows, that the patching of vulnerabilities still leaves much to be desired. The research found that 78% of the codebases examined contained at least one unpatched vulnerability and an average of 64 known exploits per codebase.

Real-World Breaches Highlight the Risk

If we take a look at the Equifax breach and WannaCry ransomware attack, we see that hackers were able to exploit unpatched vulnerabilities in servers operating Windows 7 and Windows 8 by targeting organizations that ran unpatched Windows software. Even after one year, WannaCry remains a threat due to unpatched systems.

According to various research reports, more than half of the breaches (around 60%) exploited unpatched vulnerabilities. Around one-third of victimized organizations were aware of their vulnerability but did not patch it yet.

How Hackers Exploit Unpatched Systems

Cybercrooks are highly creative when targeting unpatched vulnerabilities. To give a few examples:

  • On a number of occasions during the first two quarters of 2018, cybercriminals used crypto mining malware (such as Coinhive and Cryptoloot) to target unpatched server vulnerabilities.
  • In May 2018, hackers exploited unpatched vulnerabilities in widely-used email encryption tools PGP and S/MIME. Dubbed EFAIL, it abused active content of HTML emails to exfiltrate plaintext through requested URLs.
  • On May 30th, a hacker exploited a vulnerability to bring down Ticketfly, a website for ticket distribution services. After the attacker unsuccessfully requested ransom for sharing details of the vulnerability, he/she subsequently posted the breached data (26 million unique email addresses along with names, physical addresses, and phone numbers) online to a publicly accessible location.
  • During their so-called Unicorn attack, which took place on May 2018, hackers exploited a previously unknown privilege escalation vulnerability in Microsoft OSes predating Windows 8. It allowed untrusted code (as well as users who normally have limited system rights) to gain nearly unfettered access to the most sensitive resources of an OS. With just one click on a PDF, hackers could install their malware without any downloading needed. This attack exploited both PDF and Windows vulnerabilities.
  • In March 2018, the Drupalgeddon 2 vulnerability affected all sites running on Drupal 6 and later. Hackers exploited the vulnerability to install mining code on vulnerable sites such as NHS England's website. Although the vulnerability was detected more than 2 months ago, on June 5th it was reported that more than 115,000 servers have remained unpatched.
  • For hackers, it’s quite easy to find potential victims by using websites such as Shodan to find out if organizations are vulnerable  - e.g., Heartbleed and its successor OptionsBleed which is a security bug in the Apache Web Server (as opposed to OpenSSL) leveraged by making HTTP OPTIONS requests in order to potentially cause data leakage, the same way that Heartbleed still does.

Two Key Strategies to Stay Protected

1. Prioritize patching

Whenever your SOC, IT, or cybersecurity team gets an alert, make sure to run the update immediately. Any delay leaves a window of opportunity open for hackers. Secondly, run assessments to test the organization’s security posture.

2. Run Continuous Assessments

Cymulate’s Breach & Attack (BAS) platform will test the complete scope of your security for detecting any vulnerabilities and will recommend mitigation when found. The Immediate Threat alert assessment tests if your organization is vulnerable to the latest threats, which allows you to take measures before such an attack will take place.

  • The Email security assessment helps you to test your corporate email security for potential exposure to a number of malicious payloads sent by email.
  • The Web Gateway assessment tests your organization’s HTTP/HTTPS outbound exposure to malicious websites using an extensive and continuously growing database of malicious and compromised websites for testing.
  • The Web Application Firewall assessment enables you to test your organization’s WAF security posture to web payloads by testing if the WAF configuration, implementation, and features are able to block payloads before they get anywhere near the web applications.
  • The Endpoint assessment tests if your organization’s endpoint solutions are tuned properly and if they are protecting your organization against the latest attack vectors by deploying and running real ransomware, Trojans, worms, and viruses on a dedicated endpoint in a controlled and safe manner.
  • The Data Loss Prevention lets you test your organization’s outbound critical data safely by evaluating how well your organization’s Data Loss Prevention (DLP) solutions and controls prevent any extraction of critical information from outside the organization.

Benefits of Cymulate’s Security Assessments

Cymulate’s platform enables the SOC team or the IT and cybersecurity teams of an organization to schedule automated assessments which can be conducted at any predefined time (e.g., every night, early in the morning, in the middle of the day, etc.) to detect vulnerabilities and gaps in the organization’s security framework, its multiple security solutions as well as security controls.

It gives a comprehensive overview of the security posture of the organization since it shows its weak spots. The results of each assessment are presented in an easy-to-understand comprehensive report. Mitigation recommendations are offered for each threat that has been discovered depending on the type of attack and phase it reached in its distribution method.

This allows you to truly understand your organization’s security posture and take action to update and upgrade where necessary.

Cymulate Exposure Validation makes advanced security testing fast and easy. When it comes to building custom attack chains, it's all right in front of you in one place.
Mike Humbert, Cybersecurity Engineer
DARLING INGREDIENTS INC.
Learn More
Book a Demo