Business Wire

MA-VERACODE

Share
Veracode Research Finds a Quarter of Technology Applications Contain ‘High Severity’ Security Flaws, Which Pose a Serious Cybersecurity Risk If Exploited

Veracode, a leading global provider of modern application security testing solutions, today revealed that 24 percent of applications in the technology sector contain security flaws that are considered high risk—meaning they would cause a critical issue for the application if exploited. With, arguably, a higher proportion of applications to contend with than other industries, tech firms would benefit from implementing improved secure coding training and practices for their development teams.

Chief Research Officer at Veracode, Chris Eng, said, “Giving developers real, hands-on experience of what it takes to spot and exploit a flaw in code—and its potential impact on the application—provides the context and understanding to build their intuition about software security. Our research found that organizations whose developers had completed just one lesson in our hands-on Security Labs training program fixed 50 percent of flaws two months faster than those without such training.”

The data was published in Veracode’s annual State of Software Security (SoSS) report v12, which analyzed 20 million scans across half a million applications in the technology, retail, manufacturing, healthcare, financial services, and government sectors. Overall, the technology industry was revealed to have the second-highest proportion of applications that contain security flaws, at 79 percent, making it marginally better than the public sector at 82 percent. The tech sector lands in the middle of the pack when it comes to the proportion of flaws that are fixed.

Tech Firms Are Comparatively Quick to Fix Software Security Flaws

Encouragingly, when tech firms do discover flaws in their applications, they are comparatively fast to reach the halfway point of remediation. In fact, the sector boasts industry-leading fix times for flaws discovered by static analysis security testing (SAST) and software composition analysis (SCA). While this is a laudable accomplishment, the industry still takes up to 363 days to fix 50 percent of flaws, suggesting there is still ample room for improvement.

Eng added, “Log4j sparked a wake-up call for many organizations last December. This was followed by government action in the form of guidance from the Office of Management and Budget (OMB) and the European Cyber Resilience Act, both of which have a supply chain focus. To improve performance in the year ahead, technology businesses should not only consider strategies that help developers reduce the rate of flaws introduced into code, but also put greater emphasis on automating security testing in the Continuous Integration/Continuous Delivery (CI/CD) pipeline to increase efficiencies.”

Server configuration, insecure dependencies, and information leakage are the most common types of flaws discovered by dynamic analysis of technology applications, which broadly follows a similar pattern to other industries. Conversely, the sector exhibits the highest disparity from the industry average for cryptographic issues and information leakage, perhaps indicating that developers in the tech industry are more savvy on data protection challenges.

The Veracode State of Software Security v12 technology snapshot is available to download here and the full report is available here.

About the State of Software Security Report

The Veracode State of Software Security (SoSS) v12 analyzed the full historical data from Veracode services and customers. This accounts for a total of more than half a million applications (592,720) that used all scan types, more than a million dynamic analysis scans (1,034,855), more than five million static analysis scans (5,137,882) and more than 18 million software composition analysis scans (18,473,203). All those scans produced 42 million raw static findings, 3.5 million raw dynamic findings, and six million raw SCA findings.

The data represents large and small companies, commercial software suppliers, software outsourcers, and open-source projects. In most analyses, an application was counted only once, even if it was submitted multiple times as vulnerabilities were remediated, and new versions uploaded.

About Veracode

Veracode is a leading AppSec partner for creating secure software, reducing the risk of security breach, and increasing security and development teams’ productivity. As a result, companies using Veracode can move their business, and the world, forward. With its combination of process automation, integrations, speed, and responsiveness, Veracode helps companies get accurate and reliable results to focus their efforts on fixing, not just finding, potential vulnerabilities. Learn more at www.veracode.com, on the Veracode blog, on LinkedIn, and on Twitter.

Copyright © 2022 Veracode, Inc. All rights reserved. Veracode is a registered trademark of Veracode, Inc. in the United States and may be registered in certain other jurisdictions. All other product names, brands or logos belong to their respective holders. All other trademarks cited herein are property of their respective owners.

To view this piece of content from cts.businesswire.com, please give your consent at the top of this page.

View source version on businesswire.com: https://www.businesswire.com/news/home/20221208005101/en/

About Business Wire

Business Wire
Business Wire
101 California Street, 20th Floor
CA 94111 San Francisco

http://businesswire.com
DK

Subscribe to releases from Business Wire

Subscribe to all the latest releases from Business Wire by registering your e-mail address below. You can unsubscribe at any time.

Latest releases from Business Wire

Binarly to Unveil “Broken Trust” Research: Firmware Bypass Chains, BMC Persistence, and EDR Evasion15.1.2026 23:04:00 CET | Press release

Binarly, the industry leader in software and firmware supply-chain security, today announced an upcoming DistrictCon presentation “Broken Trust: Firmware Bypass Chains, BMC Persistence, and EDR Evasion.” The session will detail how firmware-level attack chains observed in shipped enterprise devices can effectively undermine modern endpoint defenses, enabling stealthy compromise and long-lived persistence. This press release features multimedia. View the full release here: https://www.businesswire.com/news/home/20260115834965/en/ Binarly Unveils Broken Trust Research: Firmware Bypass, BMC Persistence In this presentation, the Binarly REsearch team will dismantle the assumption of hardware trust by presenting multiple real-world firmware bypass chains. Alex Matrosov and Fabio Pagani will provide a deep dive into the specific vulnerability classes and exploitation primitives that make these attacks reliable in practice. The team will also deliver a live demonstration compromising a fully

Coolbrook Named on the 2026 Global Cleantech 10015.1.2026 18:14:00 CET | Press release

Coolbrook, a transformational technology and engineering company on a mission to decarbonise major industrial sectors like petrochemicals and chemicals, iron and steel, aluminium, and cement, has been named on Cleantech Group’s 2026 Global Cleantech 100. This annual list recognizes companies poised to deliver market-ready solutions that advance a cleaner, more resilient global future. The report highlights innovators addressing some of the world’s most urgent environmental and infrastructure challenges. The complimentary report introduces you to innovators advancing groundbreaking technologies and business models to enable us to act on the ever-increasing climate and environmental crisis. Following a 2025 marked by geopolitical volatility and shifting economic signals, the global cleantech ecosystem enters 2026 with slightly greater certainty - yet heightened competitive pressure. Growth is concentrating around two dominant themes: AI infrastructure and critical minerals. “The 2026 Glo

World Economic Forum and Salesforce Empower Global Leaders With First-of-its-Kind Agentic Assistant for the 2026 Annual Meeting in Davos15.1.2026 18:01:00 CET | Press release

The Forum activates its vast data stores through Agentforce 360, enabling a level of preparation and decision-making for its over 3,000 attendees previously unachievable by human processing alone Salesforce (NYSE: CRM), the world’s #1 CRM, today announced the activation of the World Economic Forum’s institutional knowledge powered by Agentforce 360 to support over 3,000 of the world’s most influential leaders at the 2026 World Economic Forum Annual Meeting. The Forum has launched a new proactive, high-precision concierge app, “EVA,” built on the Agentforce 360 Platform, Salesforce’s agentic platform. EVA will empower attendees to move beyond traditional information access, with an AI agent that doesn’t just answer questions, but can reason, prioritize, and act on a leader’s behalf for the 2026 Annual Meeting. This press release features multimedia. View the full release here: https://www.businesswire.com/news/home/20260115571119/en/ Scheduled for January 19–23 in Davos, Switzerland, th

Frasca to Supply Four New Flight Training Devices to Global Medical Response15.1.2026 16:05:00 CET | Press release

New Level 7 FTDs will support pilot training for emergency medical operations Frasca International, Inc., a FlightSafety International company, today announced it has signed a contract with Global Medical Response (GMR) to supply four new Level 7 Flight Training Devices (FTDs). The new devices include an Airbus EC135, a Pilatus PC-12, a Beechcraft C90, and a Beechcraft B200. Each FTD will feature Frasca's unique motion system to provide enhanced realism in training. The devices will be installed at GMR’s new training facility currently under construction in Denton, Texas. Frasca has supported GMR’s pilot training efforts for nearly two decades, beginning with the delivery of their first device in 2005 for Air Evac Lifeteam, a GMR company. Since then, Frasca simulators have played a central role in preparing GMR’s flight crews for the complex and high-stakes environments they encounter in emergency medical operations. With the delivery of these new devices, GMR will operate a total of 1

illumynt Reports 60% Revenue Growth and Launches Global Innovation Center to Meet Rising Enterprise Security and Sustainability Demands15.1.2026 15:11:00 CET | Press release

illumynt an intelligent, security-first technology lifecycle partner, today announced significant growth and innovation milestones that position the company as a leader in the next evolution of the IT Asset Disposition (ITAD) industry—an industry increasingly shaped by artificial intelligence, accelerated hardware refresh cycles, and heightened regulatory scrutiny. Under the leadership of CEO Joerg Herbarth, illumynt continues to execute its mission to deliver intelligent, technology-driven lifecycle solutions that maximize sustainability, security, and recovery value for the world’s most compute-intensive organizations. In 2025, ITAD became a strategic imperative. AI-driven workloads have dramatically compressed infrastructure lifecycles, while updates to NIST SP 800-88 Rev. 2, adoption of R2v3, and the expansion of global privacy frameworks have raised expectations for auditability, transparency, and verified data security. As a result, ITAD has evolved from a back-end operational fu

In our pressroom you can read all our latest releases, find our press contacts, images, documents and other relevant information about us.

Visit our pressroom
World GlobeA line styled icon from Orion Icon Library.HiddenA line styled icon from Orion Icon Library.Eye