Once an area of weakness is pinpointed, hackers tend to dig at it. As more eyes turn to that area, more defects are found.