Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Half of 2025’s Zero-Day Exploits Target Businesses: Google

Half of 2025’s Zero-Day Exploits Target Businesses: Google

Posted on March 5, 2026 By CWS

Google’s Threat Intelligence Group (GTIG) unveiled critical findings on Thursday, revealing that in 2025, 90 zero-day vulnerabilities were exploited, with a significant portion targeting enterprise environments. This marks a growing trend in cyber threats facing businesses.

Rising Number of Zero-Days

The report highlighted a rise in zero-day vulnerabilities, increasing from 78 in 2024 to 90 in 2025. Notably, Microsoft was the leading source with 25 zero-days, followed by Google with 11, Apple with 8, and Cisco with 4. This highlights a persistent challenge in securing software across major tech companies.

Operating systems, both mobile and desktop, were heavily targeted, accounting for 44% of exploits in 2025, up from 40% the previous year. Mobile devices, in particular, saw a rise in zero-day vulnerabilities from 9 in 2024 to 15 in 2025, with multiple flaws often combined to achieve specific objectives.

Shifts in Exploit Attribution

In a significant development, commercial surveillance vendors (CSV) were identified as major actors for the first time, exploiting 15 zero-days. Additionally, 42 of the zero-days were attributed to specific threat actors, with state-sponsored groups, especially those linked to China, accounting for 12 exploits.

Google’s report emphasized ongoing activity from Chinese groups, such as UNC5221 and UNC3886, which target security appliances and edge devices to maintain access to strategic objectives. This persistence underscores the geopolitical dimensions of cybersecurity threats.

Enterprise Technologies Under Siege

Nearly half of the zero-day exploits in 2025 impacted enterprise technologies, marking an unprecedented level of targeting. Attacks frequently focused on networking and cybersecurity devices to establish initial access points.

The report warned of the risks posed by compromised edge infrastructure and the broader implications for interconnected enterprise platforms. Google anticipates that artificial intelligence (AI) will play a dual role in 2026, aiding both attackers in developing exploits and defenders in identifying and neutralizing threats.

For further insights and detailed analysis, Google’s comprehensive report provides an extensive overview of these evolving threats.

Related topics include the discovery of the nation-state iOS exploit kit ‘Coruna’ and ongoing vulnerabilities in Cisco’s SD-WAN products.

Security Week News Tags:AI in cybersecurity, browser security, commercial surveillance, Cybersecurity, enterprise security, Google report, Microsoft zero-days, mobile security, state-sponsored attacks, threat intelligence, zero-day vulnerabilities

Post navigation

Previous Post: Cyber Threats: Key Updates on Malware, Privacy, and Security
Next Post: Reclaim Security Secures $26M for Cybersecurity Innovation

Related Posts

Fortinet Confirms FortiCloud SSO Exploitation Against Patched Devices Fortinet Confirms FortiCloud SSO Exploitation Against Patched Devices Security Week News
Developer Who Hacked Former Employer’s Systems Sentenced to Prison Developer Who Hacked Former Employer’s Systems Sentenced to Prison Security Week News
Columbia University Data Breach Impacts 860,000 Columbia University Data Breach Impacts 860,000 Security Week News
MITRE Posts Results of 2025 ATT&CK Enterprise Evaluations MITRE Posts Results of 2025 ATT&CK Enterprise Evaluations Security Week News
Zoomcar Says Hackers Accessed Data of 8.4 Million Users Zoomcar Says Hackers Accessed Data of 8.4 Million Users Security Week News
With Retail Cyberattacks on the Rise, Customers Find Orders Blocked and Shelves Empty With Retail Cyberattacks on the Rise, Customers Find Orders Blocked and Shelves Empty Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • RedAlert Espionage Campaign Exploits Trojanized App
  • Preparing for Quantum Security: A Crucial Webinar
  • Reclaim Security Secures $26M for Cybersecurity Innovation
  • Half of 2025’s Zero-Day Exploits Target Businesses: Google
  • Cyber Threats: Key Updates on Malware, Privacy, and Security

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • RedAlert Espionage Campaign Exploits Trojanized App
  • Preparing for Quantum Security: A Crucial Webinar
  • Reclaim Security Secures $26M for Cybersecurity Innovation
  • Half of 2025’s Zero-Day Exploits Target Businesses: Google
  • Cyber Threats: Key Updates on Malware, Privacy, and Security

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News