SecureWorld News

The Vulnerability Velocity: A Sobering Look at Bug Patching

Written by Cam Sivesind | Wed | Apr 1, 2026 | 11:54 PM Z

In cybersecurity, patching is often treated as a baseline chore—the digital equivalent of taking out the trash. However, a new Sector In-Depth report from Moody's Ratings elevates this routine task to a critical financial and operational metric.

For cybersecurity teams and the enterprises they protect, the report’s findings are a sobering reality check: despite the arrival of AI-driven tools, the "window of exposure" is becoming a primary driver of credit risk and organizational volatility.

So has patching improved or slipped in effectiveness? The short answer is that the complexity of the digital footprint is outpacing the speed of remediation.

Moody's research indicates that patching effectiveness has not significantly improved in a way that reduces overall risk. While technical teams are working harder, two factors are neutralizing their efforts.

First, larger enterprises (those with more than 10,000 employees) have significantly higher counts of unpatched Known Exploited Vulnerabilities (KEVs) simply due to the sheer size of their digital footprint. The scale of exposure is increasing.

Second, attackers are weaponizing new vulnerabilities faster than ever, increasing the time-to-exploit gap. Moody's notes that the risk is particularly high for "internet-facing" assets, where the delay in patching can lead to immediate ransomware or data exfiltration events.

A central question for 2026 is whether AI has finally "solved" the patching problem. The Moody's report suggests a neutral-to-negative impact so far:

  • On the defensive side: AI is being used to automate vulnerability scanning and prioritize patches. However, this has led to "alert fatigue," where teams are overwhelmed by a high volume of "critical" flags that lack business context.

  • On the offensive side: AI has arguably helped the attackers more. Adversaries are using LLMs to reverse-engineer patches and generate exploits for N-day vulnerabilities in hours, not days.

  • The net result: AI has accelerated the velocity of the game, but it hasn't necessarily improved the score for defenders.

The report highlights that the risk is not distributed equally.

Sectors with high digital dependency but complex legacy systems—such as healthcare, education, and public finance—often show slower patching cadences compared to the technology and telecommunications sectors.

North American and European firms generally have more robust patching outcomes, while firms in emerging markets face higher exposure to unpatched KEVs, often due to a lack of specialized cybersecurity personnel.

For the CISO and the SOC, the Moody's report dictates a shift in strategy from "patch everything" to "risk-based prioritization."

Cybersecurity teams should prioritize the KEVs and focus exclusively on vulnerabilities that are already being exploited in the wild. A "medium" severity KEV is often more dangerous than a "critical" vulnerability that has no known exploit.

For large enterprises, they must accept that their volume of unpatched flaws will naturally be higher. Call it the large footprint tax. Teams should focus on compensating controls (like network segmentation) for systems that cannot be patched immediately.

Use the language of the Moody's report to communicate effectively to the board level. Cybersecurity leadership should explain that unpatched flaws are now a material credit risk. This moves patching from a maintenance budget item to a risk mitigation priority.

The Moody's report confirms that software bugs are no longer just technical nuisances—they are financial liabilities. In an era where AI has weaponized the delay, slow patching is functionally equivalent to no patching.

Don't miss this Automox webcast on this very topic, "Visibility Is Velocity: Bridging Insight and Action in ITOps" on April 9, hosted by SecureWorld. This webcast offers a forward-looking conversation about what visibility needs to become in order to keep up with modern IT operations. Earn 1 CPE for attending the free webcast.