By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
Viral Trending contentViral Trending content
  • Home
  • World News
  • Politics
  • Sports
  • Celebrity
  • Business
  • Crypto
  • Gaming News
  • Tech News
  • Travel
Reading: Google says 90 zero-days were exploited in attacks last year
Notification Show More
Viral Trending contentViral Trending content
  • Home
  • Categories
    • World News
    • Politics
    • Sports
    • Celebrity
    • Business
    • Crypto
    • Tech News
    • Gaming News
    • Travel
  • Bookmarks
© 2024 All Rights reserved | Powered by Viraltrendingcontent
Viral Trending content > Blog > Tech News > Google says 90 zero-days were exploited in attacks last year
Tech News

Google says 90 zero-days were exploited in attacks last year

By admin 4 Min Read
Share
SHARE

Google Threat Intelligence Group (GTIG) tracked 90 zero-day vulnerabilities actively exploited throughout 2025, almost half of them in enterprise software and appliances.

The figure is a 15% increase compared to 2024, when 78 zero-days were exploited in the wild, but lower than the record 100 zero days tracked in 2023.

Zero-day vulnerabilities are security issues in software products that attackers exploit, usually before the vendor learns about them and develops a patch. They are highly valued by threat actors because they often enable initial access, remote code execution, or privilege escalation.

A report from GTIG today notes that of the 90 zero-days tracked as exploited in 2025, 47 of them targeted end-user platforms, and 43 targeted enterprise products.

The type of exploited flaws includes remote code execution, privilege escalation, injection and deserialization flaws, authorization bypasses, and memory corruption (use-after-free) bugs. Google reports that memory safety issues accounted for 35% of all exploited zero-day vulnerabilities last year.

The most targeted enterprise systems were security appliances, networking infrastructure, VPNs, and virtualization platforms, as these provide privileged network access and often lack EDR monitoring.

GTIG reports that bugs in operating systems were the most exploited category last year, with attacks leveraging 24 zero-day vulnerabilities in desktop OSs and 15 in mobile platforms.

Zero-day exploits in web browsers dropped to eight, a sharp decline compared to previous years.

Google’s analysts speculate this might be due to increased security hardening in this software category, though it may also be a case of threat actors using more advanced evasion tactics and being better at hiding malicious activity.

Type of zero-day targets
<strong>Type of zero-day targets and their share for 2025</strong><br /><em>Source: Google</em>

According to GTIG researchers, Microsoft was the top vendor targeted with zero days last year (25), followed by Google with 11, Apple with eight, and Cisco and Fortinet with four each, and Ivanti and VMware with three each.

For the first time since Google started tracking zero-day exploitation, commercial spyware vendors were the largest users of undocumented flaws, surpassing state-sponsored espionage groups, which may also be deploying more effective hiding techniques.

“This continues to reflect a trend we began to observe over the last several years–a growing proportion of zero-day exploitation is conducted by CSVs and/or their customers, demonstrating a slow but sure movement in the landscape,” reads the GTIG report.

Threat actors driving the zero-day exploitation volume
<strong>Threat actors driving the zero-day exploitation volume</strong><br /><em>Source: Google</em>

Google researchers say that among state-sponsored actors, China-linked espionage groups remain the most active, with 10 zero-days exploited in 2025. The attacks targeted primarily edge devices, security appliances, and networking equipment for long-term persistent access.

Another notable trend observed last year was the increase in zero-day exploitation by financially motivated actors (ransomware, data extortion), who accounted for nine of the flaws.

GTIG believes that the use of AI tools will help automate vulnerability discovery and accelerate exploit development, so exploitation of zero-day flaws in 2026 is expected to remain high.

The Brickstorm campaign is highlighted in the report as an example of how hackers are shifting their focus from source code theft to discovering flaws in future software products.

To detect and contain zero-day exploitation, Google recommends reducing attack surfaces and privilege exposure, continuously monitoring systems for anomalous behavior, and maintaining rapid patching and incident-response processes.

tines

Malware is getting smarter. The Red Report 2026 reveals how new threats use math to detect sandboxes and hide in plain sight.

Download our analysis of 1.1 million malicious samples to uncover the top 10 techniques and see if your security stack is blinded.

You Might Also Like

AGIBOT A2 Brings Embodied AI to the Met Gala Alongside Alexander Wang

CISA flags Windows Task Host vulnerability as exploited in attacks

Anthropic sets sights on small business after enterprise push

Sony Xperia 1 VIII AI Camera Assistant Internet Outrage

How to Control Everything on Your Phone With Your Voice (iOS and Android)

TAGGED: 0-day, Actively Exploited, Financial Theft, Flaw, Nation-state, spyware, Vulnerability, Zero-Day
Share This Article
Facebook Twitter Copy Link
Previous Article Crimson Desert’s Fast-Forward Dialog Feature Sparks Discussions About Skipping Conversations
Next Article Best Gravel Running Shoes (2026): Salomon, Adidas, Nike
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

- Advertisement -
Ad image

Latest News

US, Iran no closer to ending war as Qatari tanker sails toward Strait of Hormuz
Business
US CLARITY Act will be a ‘boon for domestic innovation’: A16z
Crypto
AGIBOT A2 Brings Embodied AI to the Met Gala Alongside Alexander Wang
Tech News
CISA flags Windows Task Host vulnerability as exploited in attacks
Tech News
Aaron Rodgers Will Reportedly Return to Steelers, Agrees To 1-Year Deal
Sports
French judge opens probe into 2018 killing of Jamal Khashoggi
World News
Bitcoin Treasury Firm Strategy To Repurchase $1.5B Of Convertible Notes — Details
Crypto

About Us

Welcome to Viraltrendingcontent, your go-to source for the latest updates on world news, politics, sports, celebrity, tech, travel, gaming, crypto news, and business news. We are dedicated to providing you with accurate, timely, and engaging content from around the globe.

Quick Links

  • Home
  • World News
  • Politics
  • Celebrity
  • Business
  • Home
  • World News
  • Politics
  • Sports
  • Celebrity
  • Business
  • Crypto
  • Gaming News
  • Tech News
  • Travel
  • Sports
  • Crypto
  • Tech News
  • Gaming News
  • Travel

Trending News

cageside seats

Unlocking the Ultimate WWE Experience: Cageside Seats News 2024

US, Iran no closer to ending war as Qatari tanker sails toward Strait of Hormuz

Investing £5 a day could help me build a second income of £329 a month!

cageside seats
Unlocking the Ultimate WWE Experience: Cageside Seats News 2024
May 22, 2024
US, Iran no closer to ending war as Qatari tanker sails toward Strait of Hormuz
May 17, 2026
Investing £5 a day could help me build a second income of £329 a month!
March 27, 2024
Brussels unveils plans for a European Degree but struggles to explain why
March 27, 2024
© 2024 All Rights reserved | Powered by Vraltrendingcontent
  • About Us
  • Contact US
  • Disclaimer
  • Privacy Policy
  • Terms of Service
Welcome Back!

Sign in to your account

Lost your password?