{"id":34766,"date":"2020-04-28T08:18:03","date_gmt":"2020-04-28T08:18:03","guid":{"rendered":"https:\/\/www.threatshub.org\/blog\/were-going-on-a-vuln-hunt-were-going-catch-a-big-one-researchers-find-windows-bugs-dominate-but-fixes-are-fast\/"},"modified":"2020-04-28T08:18:03","modified_gmt":"2020-04-28T08:18:03","slug":"were-going-on-a-vuln-hunt-were-going-catch-a-big-one-researchers-find-windows-bugs-dominate-but-fixes-are-fast","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/were-going-on-a-vuln-hunt-were-going-catch-a-big-one-researchers-find-windows-bugs-dominate-but-fixes-are-fast\/","title":{"rendered":"We&#8217;re going on a vuln hunt. We&#8217;re going catch a big one: Researchers find Windows bugs dominate \u2013 but fixes are fast"},"content":{"rendered":"<div readability=\"30.588235294118\">\n<h2>&#8216;The average Windows 10 PC has 14 weaponized bugs&#8217;<\/h2>\n<p> <img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/regmedia.co.uk\/2015\/11\/23\/zombie_hunting.jpg?x=442&amp;y=293&amp;crop=1\" alt width=\"442\" height=\"293\" class=\"article_img\"><\/p>\n<p>Keeping systems patched against known exploits is a challenge<\/p>\n<\/div>\n<div id=\"body\" readability=\"128.89796338202\">\n<p>A study of vulnerabilities &#8211; bugs that can be a gateway for malware or allow privilege escalation by an intruder &#8211; shows that Windows platforms have the most by far, but that they also tend to be fixed quickly, compared to Linux systems or appliances like routers, printers and scanners.<\/p>\n<p>Kenna Security has <a target=\"_blank\" href=\"https:\/\/www.kennasecurity.com\/blog\/research-reveals-cisos-reduce-risk-with-asset-focus\/\" rel=\"noopener noreferrer\">published a report<\/a> based on &#8220;vulnerability data culled from more than 9 million active assets across nearly 450 organizations,&#8221; gathered by its cybersecurity research partner Cyentia Institute and based in part on data from automated vulnerability scanners.<\/p>\n<blockquote class=\"pullquote\" readability=\"5\">\n<p>Windows admins are more accustomed to regular reboots after decades of conditioning&#8230;<\/p>\n<\/blockquote>\n<p>The issue which all businesses face is that huge numbers of vulnerabilities are reported &#8211; 18,000 a year in the CVE (Common Vulnerabilities and Exposures) <a target=\"_blank\" href=\"https:\/\/cve.mitre.org\/cve\/search_cve_list.html\" rel=\"noopener noreferrer\">list<\/a> and others outside that list \u2013 and managing these is challenging. The severity and likelihood of exploitation varies so it is a matter of managing the risk intelligently to minimise bad outcomes. Only about 5 per cent of vulnerabilities actually have known exploits, according to the paper.<\/p>\n<p>The researchers claim 45 per cent of vulnerabilities are patched within one month, 66 per cent within three months, and 20 per cent remain unfixed even after year. But how many of these are high risk? That question is not answered directly, but the research does say that two-thirds of businesses see either no change or a decrease in high risk vulnerabilities each month, so the overall picture is not too bad \u2013 at least for that two-thirds group.<\/p>\n<p>The assets analysed mostly exclude mobile devices, leaving the top five most common platforms as Windows 10 (25.3 per cent), Linux (13.1 per cent), Cisco (11.2 per cent), Windows 7 (9.0 per cent) and Windows 2012 (6.6 per cent). It seems that businesses struggle to stay up to date: Windows Server 2016 at 4.1 per cent is only just ahead of Windows 2008, while Windows Server 2019 does not even feature in the list.<\/p>\n<h3 class=\"crosshead\"><span>By the numbers<\/span><\/h3>\n<p>Windows devices dominate, therefore, with the bad news being that &#8220;a Windows-based asset typically has 119 vulnerabilities to manage in any given month&#8221; \u2013 compared to 32 for the Mac, 27 for Linux and 4 for appliances. This includes applications as well as operating system vulnerabilities, so the high number on Windows is not just about Microsoft, but also third-party applications. The result is that over 71 per cent of Windows devices have &#8220;at least one open high-risk vulnerability&#8221;, compared to 40 per cent on Linux, 31 per cent on Mac and 30 per cent on appliances.<\/p>\n<p>&#8220;The average Windows 10 PC has 14 weaponized bugs,&#8221; said the researchers, while Windows 7 has 18.<\/p>\n<p>While this sounds bad, the mitigation is that Microsoft platform assets get fixes faster than other platforms, according to the paper. &#8220;The half-life of vulnerabilities in a Windows system is 36 days,&#8221; it reports. &#8220;For network appliances, that figure jumps to 369 days. Linux systems are slower to get fixed, with a half-life of 253 days. That seems strange, given the rapidity with which the open source community tends to fix serious security issues, but this data is from scanners observing what is deployed.<\/p>\n<p>The researchers speculate that &#8220;Windows admins are more accustomed to regular reboots after decades of conditioning,&#8221; while &#8220;tooling for managing Linux fleets at scale generally lags behind that of Windows.&#8221;<\/p>\n<p>The near-contradictory conclusion is that a predominantly Windows-based environment is both the most vulnerable in terms of known exploits and also the easiest on which to achieve rapid remediation.<\/p>\n<p>Looking at the detail of the report, it is also notable that older Windows systems tend to be harder to keep secure, and that third-party Windows software gets fixed more slowly than Microsoft software. &#8220;Just say no to bloatware&#8221; is one conclusion.<\/p>\n<p>What does a well-managed business look like in terms of its asset vulnerability management? It is a tough problem, but there is evidence here for the benefit of culling devices running old version of Windows, minimising the number of applications, and paying attention to all systems including Linux servers and appliances as this is where vulnerabilities tend to persist for the longest time.<\/p>\n<p>This is only one part of the security puzzle though. Counting exploitable vulnerabilities does not equate to evaluating the real-world risk. Desktop computers are more vulnerable not only because of the number of exploits, but also because there is a person sitting there browsing the internet and clicking on stuff. The researchers applaud Microsoft&#8217;s efforts, saying: &#8220;We see Microsoft Windows systems achieving impressive levels of remediation performance. Kudos to Apple as well.&#8221;<\/p>\n<p>There is a reason for that though, which is that these systems are high risk to run.\u00ae<\/p>\n<p class=\"wptl btm\"><span>Sponsored:<\/span> <a href=\"https:\/\/go.theregister.co.uk\/tl\/1916\/-8373\/practical-tips-for-office-365-tenant-to-tenant-migration?td=wptl1916\">Practical tips for Office 365 tenant-to-tenant migration<\/a><\/p>\n<\/div>\n<p>READ MORE <a href=\"https:\/\/go.theregister.co.uk\/feed\/www.theregister.co.uk\/2020\/04\/28\/vulnerabilities_report_9_million\/\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>&#8216;The average Windows 10 PC has 14 weaponized bugs&#8217; A study of vulnerabilities &#8211; bugs that can be a gateway for malware or allow privilege escalation by an intruder &#8211; shows that Windows platforms have the most by far, but that they also tend to be fixed quickly, compared to Linux systems or appliances like routers, printers and scanners.\u2026 READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":34767,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[63],"tags":[],"class_list":["post-34766","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-the-register"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>We&#039;re going on a vuln hunt. We&#039;re going catch a big one: Researchers find Windows bugs dominate \u2013 but fixes are fast 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/were-going-on-a-vuln-hunt-were-going-catch-a-big-one-researchers-find-windows-bugs-dominate-but-fixes-are-fast\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"We&#039;re going on a vuln hunt. We&#039;re going catch a big one: Researchers find Windows bugs dominate \u2013 but fixes are fast 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/were-going-on-a-vuln-hunt-were-going-catch-a-big-one-researchers-find-windows-bugs-dominate-but-fixes-are-fast\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2020-04-28T08:18:03+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/05\/were-going-on-a-vuln-hunt-were-going-catch-a-big-one-researchers-find-windows-bugs-dominate-but-fixes-are-fast.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"442\" \/>\n\t<meta property=\"og:image:height\" content=\"293\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/were-going-on-a-vuln-hunt-were-going-catch-a-big-one-researchers-find-windows-bugs-dominate-but-fixes-are-fast\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/were-going-on-a-vuln-hunt-were-going-catch-a-big-one-researchers-find-windows-bugs-dominate-but-fixes-are-fast\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"We&#8217;re going on a vuln hunt. We&#8217;re going catch a big one: Researchers find Windows bugs dominate \u2013 but fixes are fast\",\"datePublished\":\"2020-04-28T08:18:03+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/were-going-on-a-vuln-hunt-were-going-catch-a-big-one-researchers-find-windows-bugs-dominate-but-fixes-are-fast\\\/\"},\"wordCount\":795,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/were-going-on-a-vuln-hunt-were-going-catch-a-big-one-researchers-find-windows-bugs-dominate-but-fixes-are-fast\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/05\\\/were-going-on-a-vuln-hunt-were-going-catch-a-big-one-researchers-find-windows-bugs-dominate-but-fixes-are-fast.jpg\",\"articleSection\":[\"The Register\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/were-going-on-a-vuln-hunt-were-going-catch-a-big-one-researchers-find-windows-bugs-dominate-but-fixes-are-fast\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/were-going-on-a-vuln-hunt-were-going-catch-a-big-one-researchers-find-windows-bugs-dominate-but-fixes-are-fast\\\/\",\"name\":\"We're going on a vuln hunt. We're going catch a big one: Researchers find Windows bugs dominate \u2013 but fixes are fast 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/were-going-on-a-vuln-hunt-were-going-catch-a-big-one-researchers-find-windows-bugs-dominate-but-fixes-are-fast\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/were-going-on-a-vuln-hunt-were-going-catch-a-big-one-researchers-find-windows-bugs-dominate-but-fixes-are-fast\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/05\\\/were-going-on-a-vuln-hunt-were-going-catch-a-big-one-researchers-find-windows-bugs-dominate-but-fixes-are-fast.jpg\",\"datePublished\":\"2020-04-28T08:18:03+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/were-going-on-a-vuln-hunt-were-going-catch-a-big-one-researchers-find-windows-bugs-dominate-but-fixes-are-fast\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/were-going-on-a-vuln-hunt-were-going-catch-a-big-one-researchers-find-windows-bugs-dominate-but-fixes-are-fast\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/were-going-on-a-vuln-hunt-were-going-catch-a-big-one-researchers-find-windows-bugs-dominate-but-fixes-are-fast\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/05\\\/were-going-on-a-vuln-hunt-were-going-catch-a-big-one-researchers-find-windows-bugs-dominate-but-fixes-are-fast.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/05\\\/were-going-on-a-vuln-hunt-were-going-catch-a-big-one-researchers-find-windows-bugs-dominate-but-fixes-are-fast.jpg\",\"width\":442,\"height\":293},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/were-going-on-a-vuln-hunt-were-going-catch-a-big-one-researchers-find-windows-bugs-dominate-but-fixes-are-fast\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"We&#8217;re going on a vuln hunt. We&#8217;re going catch a big one: Researchers find Windows bugs dominate \u2013 but fixes are fast\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"We're going on a vuln hunt. We're going catch a big one: Researchers find Windows bugs dominate \u2013 but fixes are fast 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/were-going-on-a-vuln-hunt-were-going-catch-a-big-one-researchers-find-windows-bugs-dominate-but-fixes-are-fast\/","og_locale":"en_US","og_type":"article","og_title":"We're going on a vuln hunt. We're going catch a big one: Researchers find Windows bugs dominate \u2013 but fixes are fast 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/were-going-on-a-vuln-hunt-were-going-catch-a-big-one-researchers-find-windows-bugs-dominate-but-fixes-are-fast\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2020-04-28T08:18:03+00:00","og_image":[{"width":442,"height":293,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/05\/were-going-on-a-vuln-hunt-were-going-catch-a-big-one-researchers-find-windows-bugs-dominate-but-fixes-are-fast.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/were-going-on-a-vuln-hunt-were-going-catch-a-big-one-researchers-find-windows-bugs-dominate-but-fixes-are-fast\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/were-going-on-a-vuln-hunt-were-going-catch-a-big-one-researchers-find-windows-bugs-dominate-but-fixes-are-fast\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"We&#8217;re going on a vuln hunt. We&#8217;re going catch a big one: Researchers find Windows bugs dominate \u2013 but fixes are fast","datePublished":"2020-04-28T08:18:03+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/were-going-on-a-vuln-hunt-were-going-catch-a-big-one-researchers-find-windows-bugs-dominate-but-fixes-are-fast\/"},"wordCount":795,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/were-going-on-a-vuln-hunt-were-going-catch-a-big-one-researchers-find-windows-bugs-dominate-but-fixes-are-fast\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/05\/were-going-on-a-vuln-hunt-were-going-catch-a-big-one-researchers-find-windows-bugs-dominate-but-fixes-are-fast.jpg","articleSection":["The Register"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/were-going-on-a-vuln-hunt-were-going-catch-a-big-one-researchers-find-windows-bugs-dominate-but-fixes-are-fast\/","url":"https:\/\/www.threatshub.org\/blog\/were-going-on-a-vuln-hunt-were-going-catch-a-big-one-researchers-find-windows-bugs-dominate-but-fixes-are-fast\/","name":"We're going on a vuln hunt. We're going catch a big one: Researchers find Windows bugs dominate \u2013 but fixes are fast 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/were-going-on-a-vuln-hunt-were-going-catch-a-big-one-researchers-find-windows-bugs-dominate-but-fixes-are-fast\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/were-going-on-a-vuln-hunt-were-going-catch-a-big-one-researchers-find-windows-bugs-dominate-but-fixes-are-fast\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/05\/were-going-on-a-vuln-hunt-were-going-catch-a-big-one-researchers-find-windows-bugs-dominate-but-fixes-are-fast.jpg","datePublished":"2020-04-28T08:18:03+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/were-going-on-a-vuln-hunt-were-going-catch-a-big-one-researchers-find-windows-bugs-dominate-but-fixes-are-fast\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/were-going-on-a-vuln-hunt-were-going-catch-a-big-one-researchers-find-windows-bugs-dominate-but-fixes-are-fast\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/were-going-on-a-vuln-hunt-were-going-catch-a-big-one-researchers-find-windows-bugs-dominate-but-fixes-are-fast\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/05\/were-going-on-a-vuln-hunt-were-going-catch-a-big-one-researchers-find-windows-bugs-dominate-but-fixes-are-fast.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/05\/were-going-on-a-vuln-hunt-were-going-catch-a-big-one-researchers-find-windows-bugs-dominate-but-fixes-are-fast.jpg","width":442,"height":293},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/were-going-on-a-vuln-hunt-were-going-catch-a-big-one-researchers-find-windows-bugs-dominate-but-fixes-are-fast\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"We&#8217;re going on a vuln hunt. We&#8217;re going catch a big one: Researchers find Windows bugs dominate \u2013 but fixes are fast"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/34766","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=34766"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/34766\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/34767"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=34766"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=34766"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=34766"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}