Many organizations lag in patching high-severity vulnerabilities, according to a new study that reveals more than 50% of servers scanned have a weak security posture weeks and months after a security update is released.
To create the “2021 Trustwave SpiderLabs Telemetry Report,” researchers used Shodan, publicly available exploit information, and non-intrusive analysis of vulnerable targets accessible on the Internet. They found many servers weren’t patched in a timely manner, ran unsupported software, and used older protocols and remote access tools on servers accessible on the Web.