A new research report from internet intelligence company GreyNoise reveals that threat actors frequently begin exploiting software vulnerabilities weeks before they are publicly disclosed as a Common Vulnerability and Exposure (CVE). The study, analyzing internet-wide scanning and attack traffic, found a strong correlation between unexplained surges in activity targeting specific products and the subsequent announcement of a new vulnerability by the vendor. This pattern suggests that many 'zero-day' vulnerabilities are discovered and weaponized by attackers well in advance of the public, including the affected vendor and security community. For defenders, this finding is a double-edged sword: it confirms that attackers have a significant head start, but it also presents an opportunity. By monitoring for these anomalous traffic patterns, security teams can gain an early warning of an impending vulnerability disclosure and take proactive defensive measures.
The report, published on April 20, 2026, analyzed activity from mid-December 2025 to late March 2026. It identified a recurring pattern where a spike in scanning or exploitation attempts targeting a specific vendor's products was a precursor to a CVE announcement. In about 50% of the cases studied, a surge in activity was followed by a relevant CVE disclosure within three weeks.
Key examples cited in the report include:
This pre-disclosure window gives attackers ample time to conduct reconnaissance, compromise targets, and establish persistence before defenders are even aware a vulnerability exists. The research also noted similar patterns for products from Juniper, SonicWall, and Ivanti, indicating this is a widespread phenomenon across the technology landscape.
The core of GreyNoise's research relies on analyzing mass scanning data from its global sensor network. The methodology involves:
The threat actors involved in this pre-disclosure activity are likely a mix of sophisticated state-sponsored groups with vulnerability research capabilities and initial access brokers who discover or purchase zero-day exploits to sell to ransomware gangs. The initial activity often involves T1595 - Active Scanning to identify vulnerable instances across the internet, followed by exploitation using techniques like T1190 - Exploit Public-Facing Application.
The primary impact of this phenomenon is that traditional vulnerability management programs, which are often reactive and triggered by CVE announcements, are fundamentally behind the curve. By the time a patch is developed and an organization's patching cycle begins, attackers may have already been inside the network for weeks. This reality necessitates a shift towards more proactive, threat-informed defense strategies. Organizations that rely solely on waiting for CVEs and patches are exposed to a significant window of risk. The business impact includes a higher likelihood of successful breaches, longer attacker dwell times, and increased difficulty in scoping and remediating incidents because the initial point of entry may be obscured by the time the breach is discovered.
Leveraging these findings requires a shift in security operations focus.
While it's impossible to patch a vulnerability that hasn't been disclosed, organizations can still take steps to mitigate the risk.
Implement comprehensive logging and analysis of network traffic to detect anomalous scanning and access patterns.
Reduce the attack surface by restricting access to management interfaces and other non-essential services from the internet.
Focus on detecting anomalous behavior on endpoints rather than relying solely on signature-based detection of initial exploits.
Use IPS/IDS systems to monitor for and potentially block suspicious traffic patterns, even without specific vulnerability signatures.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats