Learn from major patching failures like WannaCry and Equifax, and apply practical patch management tactics to prevent similar incidents in your organisation.
Almost every major breach post-mortem contains a familiar phrase: “A patch was available, but not applied in time.” From WannaCry to Equifax, some of the most damaging cyber incidents in history have been traced back to known vulnerabilities that remained unpatched on exposed systems.
In 2024 and 2025, this pattern continues. The CISA Known Exploited Vulnerabilities (KEV) catalog tracks vulnerabilities that are actively exploited in the wild and mandates rapid remediation for US federal agencies. Recent additions include critical flaws in endpoint management tools and network appliances, with agencies given days or even hours to patch or take systems offline.
For CISOs and IT leaders, the lesson is clear: patch management is no longer a background hygiene task. It is a frontline security control that must be prioritised, governed and measured.
These incidents highlight different ways patch management can go wrong, and what can be learned from each.
WannaCry ransomware spread globally in 2017 by exploiting a Windows vulnerability (EternalBlue) for which Microsoft had already released a patch. Organisations that did not apply the security update quickly faced widespread encryption of endpoints and servers across more than 150 countries.
Key lessons:
The Equifax breach traced back to an unpatched Apache Struts vulnerability on a public-facing web application. Despite the availability of a patch and internal alerts, the specific system remained unpatched, allowing attackers to exfiltrate sensitive consumer data at massive scale.
Key lessons:
Recent years have seen critical vulnerabilities disclosed in widely used endpoint management tools and remote access gateways, some actively exploited as zero-days before patches were broadly deployed. CISA has repeatedly added such flaws to its KEV catalog and imposed tight patch deadlines on agencies, for example in endpoint management platforms and Citrix NetScaler gateways.
Key lessons:
Beyond individual incidents, several recurring organisational issues cause patching failures:
Akamai’s analysis of 2024 breaches estimates that the top 35 incidents alone exposed billions of records and cost organisations billions in fines, much of it tied to failures in basic cyber hygiene such as patch management.
To prevent history from repeating itself, organisations need a structured, risk-based patch management programme.
DACTA Global’s Vulnerability Monitoring service is designed to provide exactly this continuous visibility, along with prioritised remediation guidance.
Track metrics such as:
Reporting these metrics to senior leadership helps align patching priorities with business risk.
For many mid-sized organisations, patch management fails not because of a lack of intent, but because of limited capacity and complex environments. DACTA Global often supports customers by:
Patch management gone wrong has already cost organisations worldwide billions in fines, lost revenue and reputational damage. The good news is that most of the underlying issues are solvable with better visibility, prioritisation and governance.
By aligning patch management with threat intelligence, KEV data and business impact, and by simplifying how emergency patches are handled, you can turn patching from a reactive chore into a proactive defence. If you need support designing or operating such a programme, DACTA Global’s vulnerability and risk services are built to help organisations move from sporadic patching to disciplined vulnerability management.
If you're experiencing an active security incident and need immediate assistance, contact the DACTA Incident Response Team (IRT) at support@dactaglobal.com.