{"id":530,"date":"2021-03-31T13:01:40","date_gmt":"2021-03-31T12:01:40","guid":{"rendered":"https:\/\/www.jumpsec.com\/?p=530"},"modified":"2024-04-25T12:08:10","modified_gmt":"2024-04-25T11:08:10","slug":"why-attackers-dont-care-about-your-list-of-vulnerabilities","status":"publish","type":"post","link":"https:\/\/www.jumpsec.com\/guides\/why-attackers-dont-care-about-your-list-of-vulnerabilities\/","title":{"rendered":"Why attackers don’t care about your list of vulnerabilties"},"content":{"rendered":"[vc_row type=”in_container” full_screen_row_position=”middle” column_margin=”default” column_direction=”default” column_direction_tablet=”default” column_direction_phone=”default” scene_position=”center” text_color=”dark” text_align=”left” row_border_radius=”none” row_border_radius_applies=”bg” overflow=”visible” overlay_strength=”0.3″ gradient_direction=”left_to_right” shape_divider_position=”bottom” bg_image_animation=”none”][vc_column column_padding=”no-extra-padding” column_padding_tablet=”inherit” column_padding_phone=”inherit” column_padding_position=”all” column_element_direction_desktop=”default” column_element_spacing=”default” desktop_text_alignment=”default” tablet_text_alignment=”default” phone_text_alignment=”default” background_color_opacity=”1″ background_hover_color_opacity=”1″ column_backdrop_filter=”none” column_shadow=”none” column_border_radius=”none” column_link_target=”_self” column_position=”default” gradient_direction=”left_to_right” overlay_strength=”0.3″ width=”1\/1″ tablet_width_inherit=”default” animation_type=”default” bg_image_animation=”none” border_type=”simple” column_border_width=”none” column_border_style=”solid”][vc_column_text]\n

At the time it was first introduced, a penetration test<\/a> accurately represented how an attacker was likely to target a network. Today, that is no longer the case. As digital networks and business processes have evolved, so too have their security needs.<\/h3>\n[\/vc_column_text][vc_row_inner equal_height=”yes” content_placement=”middle” column_margin=”50px” column_direction=”default” column_direction_tablet=”default” column_direction_phone=”default” constrain_group_1=”yes” text_align=”left” row_position=”default” row_position_tablet=”inherit” row_position_phone=”inherit” overflow=”visible” pointer_events=”all”][vc_column_inner column_padding=”no-extra-padding” column_padding_tablet=”inherit” column_padding_phone=”inherit” column_padding_position=”all” column_element_direction_desktop=”default” column_element_spacing=”default” desktop_text_alignment=”default” tablet_text_alignment=”default” phone_text_alignment=”default” background_color_opacity=”1″ background_hover_color_opacity=”1″ column_backdrop_filter=”none” column_shadow=”none” column_border_radius=”none” column_link_target=”_self” overflow=”visible” gradient_direction=”left_to_right” overlay_strength=”0.3″ width=”1\/2″ tablet_width_inherit=”default” animation_type=”default” bg_image_animation=”none” border_type=”simple” column_border_width=”none” column_border_style=”solid”][vc_column_text]The first generation of penetration testing was designed to assess much simpler networks than those today. They lacked the complexity and scale of modern environments, with minimal traversal required for an attacker to move from the breach of a network\u2019s perimeter to the point of being able to perform a malicious action. With fewer assets to protect and shallower networks to contend with, safeguarding against the exploitation of vulnerabilities was fundamental to preventing an attacker from achieving their goal.<\/p>\n

Over time, vulnerability-centric security audit procedures have become the norm, and the focus on vulnerabilities has increased further with the second generation of penetration testing.[\/vc_column_text][\/vc_column_inner][vc_column_inner column_padding=”no-extra-padding” column_padding_tablet=”inherit” column_padding_phone=”inherit” column_padding_position=”all” column_element_direction_desktop=”default” column_element_spacing=”default” desktop_text_alignment=”default” tablet_text_alignment=”default” phone_text_alignment=”default” background_color_opacity=”1″ background_hover_color_opacity=”1″ column_backdrop_filter=”none” column_shadow=”none” column_border_radius=”none” column_link_target=”_self” overflow=”visible” gradient_direction=”left_to_right” overlay_strength=”0.3″ width=”1\/2″ tablet_width_inherit=”default” animation_type=”default” bg_image_animation=”none” border_type=”simple” column_border_width=”none” column_border_style=”solid”][image_with_animation image_url=”6315″ image_size=”full” animation_type=”entrance” animation=”None” animation_movement_type=”transform_y” hover_animation=”none” alignment=”center” border_radius=”none” box_shadow=”none” image_loading=”default” max_width=”100%” max_width_mobile=”default”][\/vc_column_inner][\/vc_row_inner][vc_row_inner column_margin=”50px” column_direction=”default” column_direction_tablet=”default” column_direction_phone=”default” text_align=”left” row_position=”default” row_position_tablet=”inherit” row_position_phone=”inherit” overflow=”visible” pointer_events=”all”][vc_column_inner column_padding=”no-extra-padding” column_padding_tablet=”inherit” column_padding_phone=”inherit” column_padding_position=”all” column_element_direction_desktop=”default” column_element_spacing=”default” desktop_text_alignment=”default” tablet_text_alignment=”default” phone_text_alignment=”default” background_color_opacity=”1″ background_hover_color_opacity=”1″ column_backdrop_filter=”none” column_shadow=”none” column_border_radius=”none” column_link_target=”_self” overflow=”visible” gradient_direction=”left_to_right” overlay_strength=”0.3″ width=”1\/1″ tablet_width_inherit=”default” animation_type=”default” bg_image_animation=”none” border_type=”simple” column_border_width=”none” column_border_style=”solid”][vc_column_text]Networks today are much larger in size and scale, are much more diverse in terms of technologies implemented and the complexity of the assets, and are subject to more frequent development. The continued evolution of digital systems and technologies has created an infinite funnel of vulnerabilities to identify, manage, and remediate at an ever-increasing velocity. Over time this has created more work for less reward in terms of the security value of activities performed.[\/vc_column_text][vc_column_text]This means that vulnerability exploitation is no longer as critical to an attacker as it once was. Despite these changes, the second generation of penetration testing has continued to focus on the identification and remediation of vulnerabilities.<\/strong>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row type=”in_container” full_screen_row_position=”middle” column_margin=”50px” equal_height=”yes” content_placement=”middle” column_direction=”default” column_direction_tablet=”default” column_direction_phone=”default” scene_position=”center” text_color=”dark” text_align=”left” row_border_radius=”none” row_border_radius_applies=”bg” overflow=”visible” overlay_strength=”0.3″ gradient_direction=”left_to_right” shape_divider_position=”bottom” bg_image_animation=”none” gradient_type=”default” shape_type=””][vc_column column_padding=”no-extra-padding” column_padding_tablet=”inherit” column_padding_phone=”inherit” column_padding_position=”all” column_element_direction_desktop=”default” column_element_spacing=”default” desktop_text_alignment=”default” tablet_text_alignment=”default” phone_text_alignment=”default” background_color_opacity=”1″ background_hover_color_opacity=”1″ column_backdrop_filter=”none” column_shadow=”none” column_border_radius=”none” column_link_target=”_self” column_position=”default” gradient_direction=”left_to_right” overlay_strength=”0.3″ width=”2\/3″ tablet_width_inherit=”default” animation_type=”default” bg_image_animation=”none” border_type=”simple” column_border_width=”none” column_border_style=”solid”][vc_column_text]In reality, it is impossible to economically identify and remediate every vulnerability in a timely manner. Penetration testing\u2019s continued focus on vulnerability management means that it no longer meets its original goal \u2013 to prevent an attacker from performing actions that are likely to cause harm to the business.[\/vc_column_text][\/vc_column][vc_column column_padding=”no-extra-padding” column_padding_tablet=”inherit” column_padding_phone=”inherit” column_padding_position=”all” column_element_direction_desktop=”default” column_element_spacing=”default” centered_text=”true” desktop_text_alignment=”default” tablet_text_alignment=”default” phone_text_alignment=”default” background_color_opacity=”1″ background_hover_color_opacity=”1″ column_backdrop_filter=”none” column_shadow=”none” column_border_radius=”none” column_link_target=”_self” column_position=”default” gradient_direction=”left_to_right” overlay_strength=”0.3″ width=”1\/3″ tablet_width_inherit=”default” animation_type=”default” bg_image_animation=”none” border_type=”simple” column_border_width=”none” column_border_style=”solid” column_padding_type=”default” gradient_type=”default”][nectar_btn size=”jumbo” button_style=”regular” button_color_2=”Accent-Color” icon_family=”none” text=”Read our Guide” url=”\/wp-content\/uploads\/2022\/09\/your-lists-of-vulnerabilities.pdf”][\/vc_column][\/vc_row][vc_row type=”in_container” full_screen_row_position=”middle” column_margin=”default” column_direction=”default” column_direction_tablet=”default” column_direction_phone=”default” scene_position=”center” text_color=”dark” text_align=”left” row_border_radius=”none” row_border_radius_applies=”bg” overflow=”visible” overlay_strength=”0.3″ gradient_direction=”left_to_right” shape_divider_position=”bottom” bg_image_animation=”none”][vc_column column_padding=”no-extra-padding” column_padding_tablet=”inherit” column_padding_phone=”inherit” column_padding_position=”all” column_element_direction_desktop=”default” column_element_spacing=”default” desktop_text_alignment=”default” tablet_text_alignment=”default” phone_text_alignment=”default” background_color_opacity=”1″ background_hover_color_opacity=”1″ column_backdrop_filter=”none” column_shadow=”none” column_border_radius=”none” column_link_target=”_self” column_position=”default” gradient_direction=”left_to_right” overlay_strength=”0.3″ width=”1\/1″ tablet_width_inherit=”default” animation_type=”default” bg_image_animation=”none” border_type=”simple” column_border_width=”none” column_border_style=”solid”][vc_column_text]\n

We believe that with a shift in how security compliance is measured, organisations taking an alternative, threat-led approach can enhance the value of their cyber assurance activities. This article looks forward to the third generation of penetration testing, exploring how such an alternative approach can deliver improved security outcomes and return-on-investment on penetration testing spend.<\/h4>\n[\/vc_column_text][\/vc_column][\/vc_row]\n","protected":false},"excerpt":{"rendered":"

At the time it was first introduced, a penetration test accurately represented how an attacker was likely to target a network.<\/p>\n","protected":false},"author":3,"featured_media":6314,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[8],"tags":[],"yoast_head":"\nWhy attackers don't care about your list of vulnerabilties | JUMPSEC<\/title>\n<meta name=\"description\" content=\"Find out how penetration testing is evolving. Understanding how an attacker will target the specific organisation is key to protection and why they don't care about your vulnerabilities >>\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.jumpsec.com\/guides\/why-attackers-dont-care-about-your-list-of-vulnerabilities\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Why attackers don't care about your list of vulnerabilties | JUMPSEC\" \/>\n<meta property=\"og:description\" content=\"Find out how penetration testing is evolving. Understanding how an attacker will target the specific organisation is key to protection and why they don't care about your vulnerabilities >>\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.jumpsec.com\/guides\/why-attackers-dont-care-about-your-list-of-vulnerabilities\/\" \/>\n<meta property=\"og:site_name\" content=\"JUMPSEC\" \/>\n<meta property=\"article:published_time\" content=\"2021-03-31T12:01:40+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-04-25T11:08:10+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.jumpsec.com\/wp-content\/uploads\/2021\/03\/AdobeStock_195409669-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"1300\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Donna Stobart-Hook\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@JUMPSEC\" \/>\n<meta name=\"twitter:site\" content=\"@JUMPSEC\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Donna Stobart-Hook\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.jumpsec.com\/guides\/why-attackers-dont-care-about-your-list-of-vulnerabilities\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.jumpsec.com\/guides\/why-attackers-dont-care-about-your-list-of-vulnerabilities\/\"},\"author\":{\"name\":\"Donna Stobart-Hook\",\"@id\":\"https:\/\/www.jumpsec.com\/#\/schema\/person\/f95e9f0b9a45466a9d2887d53d577332\"},\"headline\":\"Why attackers don’t care about your list of vulnerabilties\",\"datePublished\":\"2021-03-31T12:01:40+00:00\",\"dateModified\":\"2024-04-25T11:08:10+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.jumpsec.com\/guides\/why-attackers-dont-care-about-your-list-of-vulnerabilities\/\"},\"wordCount\":1427,\"publisher\":{\"@id\":\"https:\/\/www.jumpsec.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.jumpsec.com\/guides\/why-attackers-dont-care-about-your-list-of-vulnerabilities\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.jumpsec.com\/wp-content\/uploads\/2021\/03\/AdobeStock_195409669-1.jpg\",\"articleSection\":[\"Insights\"],\"inLanguage\":\"en-GB\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.jumpsec.com\/guides\/why-attackers-dont-care-about-your-list-of-vulnerabilities\/\",\"url\":\"https:\/\/www.jumpsec.com\/guides\/why-attackers-dont-care-about-your-list-of-vulnerabilities\/\",\"name\":\"Why attackers don't care about your list of vulnerabilties | JUMPSEC\",\"isPartOf\":{\"@id\":\"https:\/\/www.jumpsec.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.jumpsec.com\/guides\/why-attackers-dont-care-about-your-list-of-vulnerabilities\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.jumpsec.com\/guides\/why-attackers-dont-care-about-your-list-of-vulnerabilities\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.jumpsec.com\/wp-content\/uploads\/2021\/03\/AdobeStock_195409669-1.jpg\",\"datePublished\":\"2021-03-31T12:01:40+00:00\",\"dateModified\":\"2024-04-25T11:08:10+00:00\",\"description\":\"Find out how penetration testing is evolving. Understanding how an attacker will target the specific organisation is key to protection and why they don't care about your vulnerabilities >>\",\"breadcrumb\":{\"@id\":\"https:\/\/www.jumpsec.com\/guides\/why-attackers-dont-care-about-your-list-of-vulnerabilities\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.jumpsec.com\/guides\/why-attackers-dont-care-about-your-list-of-vulnerabilities\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.jumpsec.com\/guides\/why-attackers-dont-care-about-your-list-of-vulnerabilities\/#primaryimage\",\"url\":\"https:\/\/www.jumpsec.com\/wp-content\/uploads\/2021\/03\/AdobeStock_195409669-1.jpg\",\"contentUrl\":\"https:\/\/www.jumpsec.com\/wp-content\/uploads\/2021\/03\/AdobeStock_195409669-1.jpg\",\"width\":1920,\"height\":1300,\"caption\":\"Fast internet connection in the city. Abstract technology background\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.jumpsec.com\/guides\/why-attackers-dont-care-about-your-list-of-vulnerabilities\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.jumpsec.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Why attackers don’t care about your list of vulnerabilties\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.jumpsec.com\/#website\",\"url\":\"https:\/\/www.jumpsec.com\/\",\"name\":\"JUMPSEC\",\"description\":\"Enabling Effective Cyber Security.\",\"publisher\":{\"@id\":\"https:\/\/www.jumpsec.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.jumpsec.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.jumpsec.com\/#organization\",\"name\":\"Jumpsec\",\"url\":\"https:\/\/www.jumpsec.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.jumpsec.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.jumpsec.com\/wp-content\/uploads\/2022\/08\/JUMPSEC-2021-Retina.png\",\"contentUrl\":\"https:\/\/www.jumpsec.com\/wp-content\/uploads\/2022\/08\/JUMPSEC-2021-Retina.png\",\"width\":300,\"height\":56,\"caption\":\"Jumpsec\"},\"image\":{\"@id\":\"https:\/\/www.jumpsec.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/JUMPSEC\",\"https:\/\/www.youtube.com\/channel\/UCpwVvJpDfFzBClzGhLUAZBw\",\"https:\/\/www.linkedin.com\/company\/jumpsec\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.jumpsec.com\/#\/schema\/person\/f95e9f0b9a45466a9d2887d53d577332\",\"name\":\"Donna Stobart-Hook\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.jumpsec.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/eb01326600f3b27c1a541ada5f93c712?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/eb01326600f3b27c1a541ada5f93c712?s=96&d=mm&r=g\",\"caption\":\"Donna Stobart-Hook\"},\"url\":\"https:\/\/www.jumpsec.com\/guides\/author\/donna\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Why attackers don't care about your list of vulnerabilties | JUMPSEC","description":"Find out how penetration testing is evolving. Understanding how an attacker will target the specific organisation is key to protection and why they don't care about your vulnerabilities >>","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.jumpsec.com\/guides\/why-attackers-dont-care-about-your-list-of-vulnerabilities\/","og_locale":"en_GB","og_type":"article","og_title":"Why attackers don't care about your list of vulnerabilties | JUMPSEC","og_description":"Find out how penetration testing is evolving. Understanding how an attacker will target the specific organisation is key to protection and why they don't care about your vulnerabilities >>","og_url":"https:\/\/www.jumpsec.com\/guides\/why-attackers-dont-care-about-your-list-of-vulnerabilities\/","og_site_name":"JUMPSEC","article_published_time":"2021-03-31T12:01:40+00:00","article_modified_time":"2024-04-25T11:08:10+00:00","og_image":[{"width":1920,"height":1300,"url":"https:\/\/www.jumpsec.com\/wp-content\/uploads\/2021\/03\/AdobeStock_195409669-1.jpg","type":"image\/jpeg"}],"author":"Donna Stobart-Hook","twitter_card":"summary_large_image","twitter_creator":"@JUMPSEC","twitter_site":"@JUMPSEC","twitter_misc":{"Written by":"Donna Stobart-Hook","Estimated reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.jumpsec.com\/guides\/why-attackers-dont-care-about-your-list-of-vulnerabilities\/#article","isPartOf":{"@id":"https:\/\/www.jumpsec.com\/guides\/why-attackers-dont-care-about-your-list-of-vulnerabilities\/"},"author":{"name":"Donna Stobart-Hook","@id":"https:\/\/www.jumpsec.com\/#\/schema\/person\/f95e9f0b9a45466a9d2887d53d577332"},"headline":"Why attackers don’t care about your list of vulnerabilties","datePublished":"2021-03-31T12:01:40+00:00","dateModified":"2024-04-25T11:08:10+00:00","mainEntityOfPage":{"@id":"https:\/\/www.jumpsec.com\/guides\/why-attackers-dont-care-about-your-list-of-vulnerabilities\/"},"wordCount":1427,"publisher":{"@id":"https:\/\/www.jumpsec.com\/#organization"},"image":{"@id":"https:\/\/www.jumpsec.com\/guides\/why-attackers-dont-care-about-your-list-of-vulnerabilities\/#primaryimage"},"thumbnailUrl":"https:\/\/www.jumpsec.com\/wp-content\/uploads\/2021\/03\/AdobeStock_195409669-1.jpg","articleSection":["Insights"],"inLanguage":"en-GB"},{"@type":"WebPage","@id":"https:\/\/www.jumpsec.com\/guides\/why-attackers-dont-care-about-your-list-of-vulnerabilities\/","url":"https:\/\/www.jumpsec.com\/guides\/why-attackers-dont-care-about-your-list-of-vulnerabilities\/","name":"Why attackers don't care about your list of vulnerabilties | JUMPSEC","isPartOf":{"@id":"https:\/\/www.jumpsec.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.jumpsec.com\/guides\/why-attackers-dont-care-about-your-list-of-vulnerabilities\/#primaryimage"},"image":{"@id":"https:\/\/www.jumpsec.com\/guides\/why-attackers-dont-care-about-your-list-of-vulnerabilities\/#primaryimage"},"thumbnailUrl":"https:\/\/www.jumpsec.com\/wp-content\/uploads\/2021\/03\/AdobeStock_195409669-1.jpg","datePublished":"2021-03-31T12:01:40+00:00","dateModified":"2024-04-25T11:08:10+00:00","description":"Find out how penetration testing is evolving. Understanding how an attacker will target the specific organisation is key to protection and why they don't care about your vulnerabilities >>","breadcrumb":{"@id":"https:\/\/www.jumpsec.com\/guides\/why-attackers-dont-care-about-your-list-of-vulnerabilities\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.jumpsec.com\/guides\/why-attackers-dont-care-about-your-list-of-vulnerabilities\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.jumpsec.com\/guides\/why-attackers-dont-care-about-your-list-of-vulnerabilities\/#primaryimage","url":"https:\/\/www.jumpsec.com\/wp-content\/uploads\/2021\/03\/AdobeStock_195409669-1.jpg","contentUrl":"https:\/\/www.jumpsec.com\/wp-content\/uploads\/2021\/03\/AdobeStock_195409669-1.jpg","width":1920,"height":1300,"caption":"Fast internet connection in the city. Abstract technology background"},{"@type":"BreadcrumbList","@id":"https:\/\/www.jumpsec.com\/guides\/why-attackers-dont-care-about-your-list-of-vulnerabilities\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.jumpsec.com\/"},{"@type":"ListItem","position":2,"name":"Why attackers don’t care about your list of vulnerabilties"}]},{"@type":"WebSite","@id":"https:\/\/www.jumpsec.com\/#website","url":"https:\/\/www.jumpsec.com\/","name":"JUMPSEC","description":"Enabling Effective Cyber Security.","publisher":{"@id":"https:\/\/www.jumpsec.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.jumpsec.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/www.jumpsec.com\/#organization","name":"Jumpsec","url":"https:\/\/www.jumpsec.com\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.jumpsec.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.jumpsec.com\/wp-content\/uploads\/2022\/08\/JUMPSEC-2021-Retina.png","contentUrl":"https:\/\/www.jumpsec.com\/wp-content\/uploads\/2022\/08\/JUMPSEC-2021-Retina.png","width":300,"height":56,"caption":"Jumpsec"},"image":{"@id":"https:\/\/www.jumpsec.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/JUMPSEC","https:\/\/www.youtube.com\/channel\/UCpwVvJpDfFzBClzGhLUAZBw","https:\/\/www.linkedin.com\/company\/jumpsec\/"]},{"@type":"Person","@id":"https:\/\/www.jumpsec.com\/#\/schema\/person\/f95e9f0b9a45466a9d2887d53d577332","name":"Donna Stobart-Hook","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.jumpsec.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/eb01326600f3b27c1a541ada5f93c712?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/eb01326600f3b27c1a541ada5f93c712?s=96&d=mm&r=g","caption":"Donna Stobart-Hook"},"url":"https:\/\/www.jumpsec.com\/guides\/author\/donna\/"}]}},"_links":{"self":[{"href":"https:\/\/www.jumpsec.com\/wp-json\/wp\/v2\/posts\/530"}],"collection":[{"href":"https:\/\/www.jumpsec.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.jumpsec.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.jumpsec.com\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.jumpsec.com\/wp-json\/wp\/v2\/comments?post=530"}],"version-history":[{"count":5,"href":"https:\/\/www.jumpsec.com\/wp-json\/wp\/v2\/posts\/530\/revisions"}],"predecessor-version":[{"id":6313,"href":"https:\/\/www.jumpsec.com\/wp-json\/wp\/v2\/posts\/530\/revisions\/6313"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.jumpsec.com\/wp-json\/wp\/v2\/media\/6314"}],"wp:attachment":[{"href":"https:\/\/www.jumpsec.com\/wp-json\/wp\/v2\/media?parent=530"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.jumpsec.com\/wp-json\/wp\/v2\/categories?post=530"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.jumpsec.com\/wp-json\/wp\/v2\/tags?post=530"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}