Highlighting a surge in application-layer exploits as adversaries shift focus to runtime vulnerabilities in custom code, APIs, and application logic. These attacks bypass traditional defenses like Web Application Firewalls (WAFs) and Endpoint Detection and Response (EDR), occurring on average every 3 minutes per application. The research, based on anonymized telemetry from thousands of applications protected by Contrast's runtime security platform, underscores how AI is accelerating targeted attacks, with hackers exploiting new flaws in just 5 daysβfar faster than the 84-day average patch time. This makes application-layer threats one of the most prevalent vectors, contributing to broader trends in breaches as noted in complementary reports like Verizon's DBIR 2025 and Google Mandiant's M-Trends 2025.Key facts from the report and related analyses:
Aspect | Key Statistics | Common Vectors | Recommendations |
---|---|---|---|
Frequency | Every 3 minutes per app; 81/month bypassing defenses | Untrusted deserialization, method tampering | Adopt runtime protection for real-time blocking. |
Vulnerabilities | 17 new/month, 6 fixed; 30 serious on average | OGNL injection, API flaws | Share telemetry across SecOps/AppSec/dev for prioritization. |
Exploitation Time | 5 days to exploit new flaws; 84 days to patch | Custom code/runtime logic exploits | Integrate AI for faster detection; reduce patching delays. |
Impacts | 35% of breaches; alert fatigue in analysts | Cloud SSO portals, application-layer services | Use frameworks like Application Attack Matrix for standards. |