VulnerabilitiesHIGH

90 Zero-Days Exploited in 2025: A Wake-Up Call!

BCBleepingComputer18h ago2 min read
Googlezero-daycybersecurityvulnerabilitiesGTIG
🎯

Basically, hackers found and used 90 serious security flaws last year.

Quick Summary

Google revealed that 90 zero-day vulnerabilities were exploited last year, mostly in enterprise software. This poses serious risks to businesses and individuals alike. Stay updated and secure your devices to protect against such threats.

What Happened

In a startling revelation, Google's Threat Intelligence Group (GTIG) reported that 90 zero-day vulnerabilities were actively exploited? in 2025. This number is significant, representing a growing trend in cyberattacks that target weaknesses in software before they are patched. Almost half of these vulnerabilities were found in enterprise software? and appliances, which are critical for businesses.

Zero-day vulnerabilities? are flaws that developers are unaware of, meaning there are no available fixes when hackers exploit them. This makes them particularly dangerous, as they can lead to severe breaches before anyone even knows they exist. The report highlights a concerning rise in the sophistication of attacks, as cybercriminals? increasingly target high-value corporate software.

Why Should You Care

If you use any software for work or personal tasks, you could be affected by these vulnerabilities. Imagine your favorite app suddenly being used by hackers to steal your data — that’s the risk you face. Every time you update your software, you’re relying on developers to fix these flaws before they can be exploited.

The implications are vast. Businesses could lose sensitive data, face financial losses, and suffer reputational damage. For individuals, this could mean identity theft or unauthorized access to personal accounts. The reality is that these vulnerabilities can impact your daily life, whether you’re at work or using your phone.

What's Being Done

In response to this alarming trend, Google is actively working to enhance security measures across its platforms. They are collaborating with software developers to ensure vulnerabilities are patched faster and more efficiently. Here’s what you can do right now:

  • Regularly update your software to the latest versions.
  • Use security tools that provide real-time protection against known threats.
  • Stay informed about the latest vulnerabilities and how they might affect you.

Experts are closely monitoring this situation, anticipating that as more vulnerabilities are discovered, the cyber threat landscape will continue to evolve. Keeping your software updated is your best defense against these zero-day exploits.

💡 Tap dotted terms for explanations

🔒 Pro insight: The uptick in zero-day exploits signals a need for enhanced proactive security measures and faster patch deployment across all software sectors.

Original article from

BleepingComputer · Bill Toulas

Read Full Article

Related Pings

HIGHVulnerabilities

Pwn2Own Automotive 2026: $1 Million in Vulnerabilities Uncovered!

In a thrilling conclusion to Pwn2Own Automotive 2026, hackers uncovered over 76 vulnerabilities, earning $1 million in prizes. This competition highlights the urgent need for robust automotive security. Stay alert for updates from your vehicle manufacturer to ensure your safety on the road.

Zero Day Initiative Blog·Just now·2m
HIGHVulnerabilities

Pwn2Own Automotive 2026: Record Entries for Epic Hacking Showdown

The Pwn2Own Automotive competition has kicked off in Tokyo with 73 teams competing to exploit car systems. This event is crucial for improving vehicle security. Stay informed about the vulnerabilities that could impact your safety on the road!

Zero Day Initiative Blog·Just now·2m
HIGHVulnerabilities

AI Revolutionizes Vulnerability Discovery in Cybersecurity

Anthropic's Claude Opus 4.6 has discovered 500 high-severity vulnerabilities. This impacts developers and security teams alike. Without proper context, more alerts can overwhelm security efforts. Organizations must prioritize AI-driven exposure management to stay secure.

Tenable Blog·Just now·2m
HIGHVulnerabilities

Dynamic Objects: The Hidden Threat in Active Directory

Dynamic objects in Active Directory pose a stealthy threat by self-deleting without leaving evidence. This impacts organizations by complicating forensic investigations. Security teams are urged to implement real-time monitoring to catch these attacks before they erase all traces.

Tenable Blog·Just now·2m
HIGHVulnerabilities

New Cyber Module Boosts Health Organizations' Risk Planning

A new cybersecurity module has been launched to help healthcare organizations better prepare for cyber threats. Hospitals are particularly concerned about risks from cloud services and connected devices. This initiative aims to protect patient care and sensitive health data. Organizations are encouraged to implement the new toolkit immediately.

Help Net Security·Just now·2m
HIGHVulnerabilities

AI Security: Are Our Tools Vulnerable?

AI tools for coding may have hidden vulnerabilities. This affects everyone using AI in apps and services. Stay informed and secure your digital life against potential risks.

Help Net Security·Just now·3m