Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

Three-Quarters of Firms Knowingly Ship Vulnerable Code, Says Checkmarx

May 21, 2026

Azerbaijani Energy Firm Hit by Repeated Microsoft Exchange Exploitation

May 21, 2026

Nine-Year-Old Linux Kernel Flaw Leaks SSH Keys and Password Hashes

May 21, 2026
Facebook X (Twitter) Instagram
Thursday, May 21
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»News»Three-Quarters of Firms Knowingly Ship Vulnerable Code, Says Checkmarx
News

Three-Quarters of Firms Knowingly Ship Vulnerable Code, Says Checkmarx

Team-CWDBy Team-CWDMay 21, 2026No Comments2 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


Three-quarters of organizations have admitted to shipping vulnerable code, as AI risk proliferates in supply chains, according to two new studies out this week.

Checkmarx published new data on May 21 showing that 75% of organizations often or sometimes deploy code they know is vulnerable.

That’s down from a figure of 81% last year, but remains too high at a time when increasingly powerful AI models are enabling threat actors to find and exploit vulnerabilities with ever-greater efficiency.

What took an average of 840 days in 2018 to exploit, takes less than two days in 2026, Checkmarx claimed. Researchers on its Checkmarx Zero team predict that time-to-exploit will reach one minute by 2028.

Checkmarx VP, Eran Kinsbruner, argued that unvetted AI-generated code is a big part of the problem.

“The backlog isn’t a process problem anymore; it’s a math problem,” she said. “AI-generated code is outpacing every manual remediation model in existence.”

Read more on AI-coding threats: Security Researchers Sound the Alarm on Vulnerabilities in AI-Generated Code

The risks highlighted by Checkmarx have been echoed elsewhere recently. This week, Verizon claimed in its Data Breach investigations Report (DBIR) that vulnerability exploitation accounted for nearly a third (31%) of initial access in data breaches over the past year – up from 20% in last year’s DBIR.

It suggested that adversarial use of AI could be to blame for the uptick.

“The median threat actor researched or used AI assistance in 15 different documented techniques, with some actors leveraging as many as 40 or 50,” the Verizon report noted.

UK Firms Concerned About AI in the Supply Chain

The findings chime with a separate study from UK insurer QBE out this week which revealed that 75% of UK businesses are worried about vendors and suppliers using AI.

They’re already on high alert for possible supply chain incidents. QBE claimed that the share of respondents experiencing a “cyber event in the past 12 months” rose from 53% in 2025 to 59% in 2026. This year, over a fifth (22%) claimed that “all or most” of the attacks they suffered involved a supplier.

However, despite their concerns, only 28% of AI-using businesses have taken steps to assess or audit their third-party suppliers’ AI systems, while just 35% have a formal AI usage or governance policy, QBE claimed.



Source

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleAzerbaijani Energy Firm Hit by Repeated Microsoft Exchange Exploitation
Team-CWD
  • Website

Related Posts

News

Azerbaijani Energy Firm Hit by Repeated Microsoft Exchange Exploitation

May 21, 2026
News

Microsoft Patches 138 Vulnerabilities, Including DNS and Netlogon RCE Flaws

May 21, 2026
News

Grafana Labs Says Code Breach Stemmed from TanStack Attack

May 21, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest News

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Target Crypto Firms with ClickFix and Zoom Lures

April 29, 202610 Views

Why SOC Burnout Can Be Avoided: Practical Steps

November 14, 20259 Views

Cyber M&A Roundup: Cyber Giants Strengthen AI Security Offerings

December 1, 20258 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Target Crypto Firms with ClickFix and Zoom Lures

April 29, 202610 Views
Our Picks

Is it OK to let your children post selfies online?

February 17, 2026

Why you should never pay to get paid

September 15, 2025

The quest for greater tech independence

May 19, 2026

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2026 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.