
Resurgent Vulnerabilities Are Rewriting the Risk Equation — Are You Prepared?
New GreyNoise research reveals a uniquely dangerous trend: attackers around the world are exploiting resurgent vulnerabilities — old CVEs that regain interest, often without warning.
Spanning three behavioral categories, more than half of the most exploited resurgent CVEs affect edge technologies like routers, VPNs, and firewalls — the very internet-facing assets attackers use for initial access and persistence. These findings carry major implications for patching strategies, threat detection, and national security policy.
Watch as Bob Rudis, VP of Data Science, and Noah Stone ,Head of Content, break down key insights from our latest 2025 report, A Blindspot in Cyber Defense: How Resurgent Vulnerabilities Jeopardize Organizational Security. You’ll learn:
- Why resurgent vulnerabilities pose a unique challenge to patch management, threat blocking, and risk planning.
- How and why edge technologies have become consistent targets — even years after patches are issued.
- What defenders and policymakers need to know about resurgence patterns in real-world exploitation.
Who Should Watch?
- CISOs & Risk Leaders — Align strategic priorities with emerging exploitation trends.
- Vulnerability Management Teams — Prioritize based on the latest observed attack behavior.
- Threat Intel & SOC Teams — Improve alert tirage with insights into resurgent CVE activity.
Get ahead of the threat. Watch now!
WATCH NOW