Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

Google: Half of 2025’s 90 Exploited Zero-Days Aimed at Enterprises

0
Medium
Exploit
Published: Thu Mar 05 2026 (03/05/2026, 15:00:00 UTC)
Source: SecurityWeek

Description

Less than half of the total zero-days have been attributed to a threat actor, but spyware vendors and China are in the lead. The post Google: Half of 2025’s 90 Exploited Zero-Days Aimed at Enterprises appeared first on SecurityWeek .

AI-Powered Analysis

AILast updated: 03/05/2026, 15:04:12 UTC

Technical Analysis

According to Google's report cited by SecurityWeek, in 2025 there were approximately 90 zero-day vulnerabilities exploited, with about half specifically targeting enterprise environments. Zero-day vulnerabilities are security flaws unknown to the vendor and unpatched at the time of exploitation, making them highly valuable and dangerous for attackers. The report notes that less than half of these zero-days have been attributed to known threat actors, but spyware vendors and China are prominent among those identified. This suggests a significant portion of zero-day exploitation activity is linked to state-sponsored or commercially motivated espionage and surveillance campaigns. The lack of patch links and known exploits in the wild indicates that many of these vulnerabilities may be used in highly targeted attacks rather than widespread campaigns. The medium severity rating likely reflects the balance between the high potential impact of zero-days and the limited public details on exploitation scope and scale. Enterprises remain prime targets due to the value of their data and access to broader networks. The report underscores the ongoing challenge of defending against unknown vulnerabilities and the importance of threat intelligence and rapid incident response capabilities.

Potential Impact

The exploitation of zero-day vulnerabilities in enterprise environments can lead to severe consequences including unauthorized access, data breaches, espionage, intellectual property theft, and disruption of critical business operations. Since zero-days are unknown to vendors, traditional signature-based defenses are ineffective until patches are developed and deployed. This can result in prolonged undetected intrusions and increased risk of lateral movement within networks. Enterprises across sectors such as finance, technology, government, and critical infrastructure are at heightened risk due to the value of their data and systems. The attribution to spyware vendors and China suggests potential geopolitical and espionage motives, increasing the likelihood of targeted attacks against strategic organizations. The medium severity rating indicates a moderate but significant threat level, emphasizing the need for proactive defense measures. Failure to address these risks can lead to financial losses, reputational damage, regulatory penalties, and national security implications.

Mitigation Recommendations

Organizations should implement advanced threat detection solutions that leverage behavioral analytics and anomaly detection to identify suspicious activity potentially linked to zero-day exploits. Employing a robust vulnerability management program that includes rapid patch deployment once updates become available is critical. Network segmentation and least privilege access controls can limit the impact of a successful exploit. Regular threat intelligence sharing with industry peers and government agencies can provide early warnings about emerging zero-day threats. Endpoint detection and response (EDR) tools should be deployed to monitor and respond to suspicious behaviors. Conducting regular security audits and penetration testing can help identify potential attack vectors. Additionally, organizations should develop and regularly update incident response plans specifically addressing zero-day exploit scenarios. Employee training on phishing and social engineering can reduce the risk of initial compromise vectors. Finally, engaging with vendors and security communities to stay informed about zero-day disclosures and mitigations is essential.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Threat ID: 69a99b5f224272a26dae95de

Added to database: 3/5/2026, 3:03:59 PM

Last enriched: 3/5/2026, 3:04:12 PM

Last updated: 3/5/2026, 6:04:07 PM

Views: 8

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses