From access to impact: why 2025 was the year OT threats grew teeth
OT cybersecurity took a hit in 2025 as threat groups mapped control loops and targeted distributed energy – shrinking the gap between access and physical impact.
Read More
There was a time when ‘patch Tuesday’ bought you some breathing room. A vendor disclosed a bug, you triaged it, tested it, scheduled a change window, and hoped nobody noticed your exposed edge box in the meantime.
New analysis from Flashpoint suggests that time is long gone.
In 2020, Flashpoint puts the average Time to Exploit (TTE) – the time between disclosure and first observed exploitation – at 745 days. By 2025, it says that average has dropped to 44 days.
And the year-by-year data shows it tightening fast:
The other shift is that attackers no longer need rare zero-days to cause outsized damage. They’re increasingly relying on N-days – vulnerabilities that are publicly known, with patches available, but still sitting unaddressed in real environments.
Flashpoint says N-days represent over 80% of Known Exploited Vulnerabilities (KEVs) it has tracked over the past four years.
So if your exposure management programme is still built around the idea that vulnerabilities can be patched in the next sprint (instead of right now), your organisation is at risk.
So why the speed-up? Flashpoint points to the rapid weaponisation of proof-of-concept (PoC) code published by researchers. When usable exploit code lands alongside a disclosure, exploitation becomes ‘turn-key’ – less engineering, more copy/paste.
Pair that with internet-wide scanning (Flashpoint namechecks Shodan and FOFA) and you can go from disclosure to mass exploitation in hours, even without an elite operator behind the keyboard.
The analysis also cites leaked chat logs from the BlackBasta ransomware group: of 65 CVEs discussed, 54 were already known KEVs.
In short, your adversary is often taking the easiest path.
This is fixable.
Flashpoint’s researchers argue the biggest blocker isn’t effort – it’s visibility. It claims many large organisations may have an accurate inventory of only around 25% of their assets.
If you don’t know what you own, you can’t know what’s exposed – and you can’t prioritise what to patch first.
Then there’s the tooling problem: CVE dependency. The analysis notes that thousands of vulnerabilities disclosed each year never receive a CVE ID, and that creates blind spots for standard scanners.
Cybersecurity teams need to:
The patching grace period is collapsing – and attackers are treating disclosure like a starting pistol. If we want the window back, we need to operate at adversary tempo.
Join the newsletter to receive the latest updates in your inbox.
OT cybersecurity took a hit in 2025 as threat groups mapped control loops and targeted distributed energy – shrinking the gap between access and physical impact.
Read More
Ransomware now reaches full encryption in just three hours. Analysis of Barracuda and Securin data reveals how Akira and others are accelerating attacks.
Read More
Saudi Arabia’s cybersecurity workforce is now 32% women, outpacing the global average. Leaders at Black Hat MEA share their perspective, alongside our lowdown on the data about gender diversity in the region.
Read More