Why Are AI Vulnerabilities Largely Unaddressed by Companies?

Article Highlights
Off On

Recent findings from Cobalt’s latest State of Pentesting Report have disclosed that a staggering 95% of companies perform pentesting on their Generative AI (GenAI) Large Language Model web applications, yet only 21% of identified vulnerabilities are resolved. This data reveals a significant disparity compared to the 48% remediation rate for all vulnerabilities with detected exploits and an even greater gap compared to the 69% rate for high or critical severity vulnerabilities. The alarming reality presents an urgent concern for the tech industry, tasking organizations to reflect on their strategies and the efficiency of their vulnerability management mechanisms.

Overconfidence and Security Gaps

One of the most concerning insights from the report is the prevalent overconfidence in security postures among companies, despite glaring unresolved serious findings. Astonishingly, 81% of respondents have displayed confidence in their firm’s security, even when serious vulnerabilities remain unaddressed. This overconfidence contrasts sharply with the pressing issues pointed out by security leaders, of whom 72% have ranked AI attacks as their highest priority concern—higher than risks associated with third-party software, exploited vulnerabilities, insider threats, and even nation-state actors.

This overconfidence might stem from a lack of robust internal auditing systems or a misjudgment of the requirement for thorough remediation processes. Companies that overestimate their security frameworks tend to underperform against the diverse and evolving threats posed by AI vulnerabilities. The discrepancy between perceived security and actual vulnerability management is a significant factor contributing to many unresolved issues. Companies must reassess and enhance their security protocols to bridge this gap and foster a more accurate understanding of their security posture.

Differences Between Small and Large Organizations

The contrast in vulnerability remediation efforts between small and large organizations also stands out prominently in the report. Interestingly, small companies fare substantially better at addressing serious findings, boasting an 81% resolution rate compared to a 60% rate in larger counterparts. Moreover, larger organizations have been noted to take over a month longer to remediate such issues. These statistics underscore the notion that the size and complexity of an organization can significantly influence its ability to manage and respond to vulnerabilities effectively.

Critical infrastructure sectors such as utilities, healthcare, and manufacturing are among the slowest to address vulnerabilities. This sluggishness could be attributed to the infrastructure’s complexity and the critical nature of the operations, which might make implementing changes more challenging. On the other hand, financial companies, even with comparatively lower rates of serious findings, also demonstrate extended periods for resolution. These delays indicate a pervasive issue in the prioritization and allocation of resources necessary to address potential threats promptly and efficiently.

The Imperative for Offensive Security

The current cybersecurity landscape demands a proactive and offensive approach to stay ahead of ever-evolving cyber threats. Gunter Ollman, CTO of Cobalt, emphasizes the need for organizations to adopt an offensive security strategy. Such an approach not only helps organizations stay compliant with regulatory requirements but also plays a crucial role in ensuring customer assurance and trust. Data for the report was derived from over 2700 Cobalt pentests and survey insights from Emerald Research, analyzed by the Cyentia Institute. Offensive security entails actively searching for vulnerabilities before adversaries exploit them, instead of merely relying on defensive measures. This strategy allows organizations to identify and rectify flaws within their systems and applications proactively. By adopting this mindset, companies can significantly reduce their exposure to potential AI attacks and improve overall cybersecurity defenses. The transition from traditional to offensive security measures demands substantial effort but promises long-term benefits in protecting against increasingly sophisticated threats.

Bridging the Gap Between Perception and Reality

Recent findings from Cobalt’s latest State of Pentesting Report have revealed that an extraordinary 95% of companies conduct penetration testing on their Generative AI (GenAI) Large Language Model web applications. However, only 21% of the vulnerabilities identified in these tests are addressed. This is a stark contrast to the 48% remediation rate for all vulnerabilities with detected exploits and an even more significant difference compared to the 69% remediation rate for vulnerabilities deemed high or critical in severity.

This situation highlights a troubling trend in the tech sector, raising urgent concerns about the effectiveness of current vulnerability management strategies and practices. The low remediation rate for GenAI-related vulnerabilities suggests that companies may lack the necessary tools or processes to effectively address identified risks. This gap underscores the need for organizations to reassess and possibly overhaul their approach to cybersecurity, ensuring that they are not only detecting but also adequately addressing vulnerabilities to protect their systems and data.

Explore more

Fanatics Re-Adopts Rokt AI to Drive E-Commerce Personalization

The sheer velocity of the modern digital sports economy leaves no room for generic consumer interactions, especially for an enterprise processing billions in merchandise sales across a fragmented global audience. Fanatics, a powerhouse that has redefined the intersection of sports commerce and fan engagement, recently made the strategic move to reintegrate with the Rokt AI network. This decision serves as

Top Real Estate Agents Use Smarter CRMs to Drive Growth

The modern real estate landscape has reached a critical tipping point where the traditional reliance on manual labor is being rapidly superseded by high-velocity, intelligence-driven operations. In a market where a few minutes can determine whether an agent secures a multi-million dollar listing or loses it to a more agile competitor, the adoption of sophisticated Customer Relationship Management (CRM) systems

Is CRM Stock Finally Trading Below Its Intrinsic Value?

Assessing the Disconnect Between Market Price and Fundamentals The dramatic divergence between a company’s operational success and its equity valuation often creates the most lucrative entry points for disciplined investors. Salesforce currently finds itself at such a crossroads, with its stock trading near $187.79 despite maintaining its status as a foundational pillar of the global enterprise software sector. While the

How Will Ericsson and Mastercard Reshape Global Fintech?

The Strategic Convergence of Telecom and Global Payments The unprecedented integration of telecommunications infrastructure with global payment networks marks a definitive shift in how capital moves across international borders in our modern economy. This strategic collaboration between Ericsson, a global leader in telecommunications, and Mastercard, a titan in the international payments sector, represents a watershed moment for the global financial

How Will Google Pay Shape the Future of Saudi Payments?

The Digital Revolution Arrives in the Kingdom The swift migration from physical wallets to smartphone-integrated financial ecosystems is currently reshaping the economic fabric of Saudi Arabia at an unprecedented velocity. As the nation moves toward a more diversified and tech-driven economy, the entry of Google Pay, in partnership with Mastercard, represents a pivotal moment for both consumers and merchants. This