Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Google Reports 90 Zero-Day Exploits in 2025

Google Reports 90 Zero-Day Exploits in 2025

Posted on March 6, 2026 By CWS

The Google Threat Intelligence Group has disclosed that 90 zero-day vulnerabilities were actively exploited in 2025, signaling significant ongoing cybersecurity challenges. Compared to the previous record of 100 in 2023, this year’s total shows a slight decline but marks an increase from 78 in 2024. This trend indicates the persistent threat posed by zero-day vulnerabilities.

Shifting Target Focus

In recent findings, attackers are increasingly turning their attention away from web browsers, focusing on enterprise infrastructures, mobile operating systems, and edge devices instead. This shift aims to gain broad network access and reflects evolving strategies to penetrate deeper into organizational systems.

Notably, Commercial Surveillance Vendors have surpassed traditional state-sponsored groups as the main contributors to zero-day exploitations. These vendors are crafting intricate exploit chains to breach modern mobile security systems, resulting in a resurgence of mobile-related zero-day discoveries, totaling 15 in 2025.

Enterprise Vulnerabilities

The analysis shows that enterprise technologies accounted for nearly half of all zero-day exploits. Network and security apparatuses are particularly susceptible due to their strategic network roles and insufficient endpoint detection measures. State-sponsored actors, especially those associated with entities like UNC3886 and UNC5221, have targeted these devices for prolonged surveillance operations.

A striking example of evolving threat vectors is the BRICKSTORM campaign, where attackers aimed to pilfer proprietary source code from tech firms, triggering a cycle that enhances future zero-day vulnerability discoveries.

Defense Strategies and Future Outlook

Financially motivated groups have also been active, exploiting nine zero-day vulnerabilities, indicating that advanced exploitation techniques are being adopted beyond espionage. The increasing use of AI to facilitate vulnerability identification and exploitation emphasizes the need for robust defense strategies.

Google stresses the importance of adopting layered defense mechanisms, including strict network segmentation and real-time asset inventory management, to prepare for potential breaches. Monitoring a Software Bill of Materials (SBoM) is recommended to swiftly pinpoint vulnerable components amid rapid zero-day emergence.

As threat actors pivot to more complex enterprise environments, security teams must enhance their focus on edge device monitoring, enforce stringent access controls, and ensure timely vulnerability remediation to counter these sophisticated threats.

Cyber Security News Tags:2025, AI in cybersecurity, CSVs, Cybersecurity, enterprise security, Exploits, Google, mobile security, Vulnerabilities, zero-day

Post navigation

Previous Post: Evervault Secures $25M in Series B to Enhance Encryption Tech
Next Post: China-Linked Cyber Attacks Target South American Telecoms

Related Posts

MuddyWater APT Weaponizing Word Documents to Deliver ‘RustyWater’ Toolkit Evading AV and EDR Tools MuddyWater APT Weaponizing Word Documents to Deliver ‘RustyWater’ Toolkit Evading AV and EDR Tools Cyber Security News
Pulsar RAT Using Memory-Only Execution & HVNC to Gain Invisible Remote Access Pulsar RAT Using Memory-Only Execution & HVNC to Gain Invisible Remote Access Cyber Security News
Critical Zimbra SSRF Vulnerability Let Attackers Access Sensitive Data Critical Zimbra SSRF Vulnerability Let Attackers Access Sensitive Data Cyber Security News
OpenAI Hardened ChatGPT Atlas Against Prompt Injection Attacks OpenAI Hardened ChatGPT Atlas Against Prompt Injection Attacks Cyber Security News
Hackers Abuse Microsoft 365’s Direct Send Feature to Deliver Internal Phishing Attacks Hackers Abuse Microsoft 365’s Direct Send Feature to Deliver Internal Phishing Attacks Cyber Security News
Critical Flaw in Kea DHCP Poses Remote Crash Risk Critical Flaw in Kea DHCP Poses Remote Crash Risk Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Over 6000 Apache ActiveMQ Servers Risk CVE-2026-34197 Exploit
  • PureRAT Malware Utilizes PNG Files for Stealthy Attacks
  • SystemBC Server Uncovers 1,570 Victims in Ransomware Operation
  • AI-Enhanced NGate Malware Targets NFC Payment Apps
  • AI Identity Visibility Lacking in Enterprises, Study Finds

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Over 6000 Apache ActiveMQ Servers Risk CVE-2026-34197 Exploit
  • PureRAT Malware Utilizes PNG Files for Stealthy Attacks
  • SystemBC Server Uncovers 1,570 Victims in Ransomware Operation
  • AI-Enhanced NGate Malware Targets NFC Payment Apps
  • AI Identity Visibility Lacking in Enterprises, Study Finds

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark