SP
BravenNow
Google says half of all zero-days it tracked in 2025 targeted buggy enterprise tech
| USA | technology | ✓ Verified - techcrunch.com

Google says half of all zero-days it tracked in 2025 targeted buggy enterprise tech

#zero-day #Google #enterprise tech #vulnerabilities #2025 #cybersecurity #tracking #buggy software

📌 Key Takeaways

  • Google reported that 50% of zero-day vulnerabilities tracked in 2025 targeted enterprise technology
  • These vulnerabilities exploited flaws in enterprise software and systems
  • The findings highlight significant security risks in corporate IT infrastructure
  • The trend underscores the need for improved enterprise security measures

📖 Full Retelling

Enterprise software was a major focus of zero-day activity during 2025, with security and networking devices, like firewalls, VPNs, and virtualization platforms, among the top targeted by malicious hackers.

🏷️ Themes

Cybersecurity, Enterprise Technology

Entity Intersection Graph

No entity connections available yet for this article.

}
Original Source
A new report by Google found that about half of the zero-day bugs it tracked last year exploited enterprise devices, marking a new high for hackers who are increasingly finding new ways to target large companies and steal their data. According to the search and security giant’s annual report , 48% of the tracked zero days — vulnerabilities in software that are unknown to its maker at the time they are exploited — were found in technologies used by corporations and large businesses. About half of those zero-days exploited the very devices that are designed to protect enterprise networks from digital intruders. Google said security and networking devices, such as firewalls made by Cisco and Fortinet , and VPN and virtualization platforms like Ivanti and VMWare , were among the top targeted vendors last year. All four of the companies said hackers have exploited their products on customer networks in recent months. Google’s researchers said that hackers exploited common flaws, like input validation and incomplete authorization processes, to break through firewall and VPN defenses to gain access to customer networks. These classes of bugs are generally easier to exploit, but generally require a software update to fix. The company also pointed to other buggy software that makes up the remaining half of enterprise zero-days. Google noted the Clop extortion gang’s campaign against Oracle E-Business Suite customers, which allowed hackers to walk away with reams of human resources data from dozens of companies about their staff and executives. The hacks affected Harvard University , the American Airlines subsidiary Envoy , and The Washington Post , among others. The remaining 52% of zero-day bugs were found in consumer and end-user products, such as those made by Microsoft, Google, and Apple, according to the report. Most of the zero-days in consumer software were found in operating systems, with mobile devices also seeing more zero-days than in previous years. Google said i...
Read full article at source

Source

techcrunch.com

More from USA

News from Other Countries

🇬🇧 United Kingdom

🇺🇦 Ukraine