{"id":55700,"date":"2024-03-27T14:27:48","date_gmt":"2024-03-27T14:27:48","guid":{"rendered":"https:\/\/packetstormsecurity.com\/news\/view\/35704\/Google-Reveals-0-Day-Exploits-In-Enterprise-Tech-Surged-64-Last-Year.html"},"modified":"2024-03-27T14:27:48","modified_gmt":"2024-03-27T14:27:48","slug":"google-reveals-0-day-exploits-in-enterprise-tech-surged-64-last-year","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/google-reveals-0-day-exploits-in-enterprise-tech-surged-64-last-year\/","title":{"rendered":"Google Reveals 0-Day Exploits In Enterprise Tech Surged 64% Last Year"},"content":{"rendered":"<p>The discovery and exploitation of zero-day vulnerabilities in enterprise-specific software and appliances appears to be outpacing the leveraging of zero-day bugs overall, judging by Google&#8217;s latest research.<\/p>\n<p>In a report published today, the web giant&#8217;s Threat Analysis Group (TAG) and Mandiant division said they tracked 97 total zero-day vulnerabilities found and exploited by miscreants in 2023, which is considerably more than the year prior, which had 62 such holes. That&#8217;s a 56 percent uplift.<\/p>\n<p>The number of found and exploited enterprise-specific technology zero-day vulnerabilities, however, increased by 64 percent in 2023 compared to 2022 with miscreants exploiting 36 of these bugs. This figure has been rapidly growing over the past five years, we&#8217;re told, with just 11.8 percent of zero-days in 2019 affecting enterprise software.<\/p>\n<div aria-hidden=\"true\" class=\"adun\" data-pos=\"top\" data-raptor=\"condor\" data-xsm=\",fluid,mpu,\" data-sm=\",fluid,mpu,\" data-md=\",fluid,mpu,\"> <noscript> <a href=\"https:\/\/pubads.g.doubleclick.net\/gampad\/jump?co=1&amp;iu=\/6978\/reg_security\/cybercrime&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=2&amp;c=2ZgUox9cs9csTwh10PT1CHwAAANg&amp;t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0\" target=\"_blank\" rel=\"noopener\"> <img decoding=\"async\" src=\"https:\/\/pubads.g.doubleclick.net\/gampad\/ad?co=1&amp;iu=\/6978\/reg_security\/cybercrime&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=2&amp;c=2ZgUox9cs9csTwh10PT1CHwAAANg&amp;t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0\" alt> <\/a> <\/noscript> <\/div>\n<p>&#8220;This percentage increased to 37.1 percent in 2023, signaling a continued shift in the types of products targeted for malicious exploitation,&#8221; according to the report [<a target=\"_blank\" rel=\"nofollow noopener\" href=\"https:\/\/storage.googleapis.com\/gweb-uniblog-publish-prod\/documents\/Year_in_Review_of_ZeroDays.pdf\">PDF<\/a>].<\/p>\n<div aria-hidden=\"true\" class=\"adun\" data-pos=\"top\" data-raptor=\"falcon\" data-xmd=\",fluid,mpu,leaderboard,\" data-lg=\",fluid,mpu,leaderboard,\" data-xlg=\",fluid,billboard,superleaderboard,mpu,leaderboard,\" data-xxlg=\",fluid,billboard,superleaderboard,brandwidth,brandimpact,leaderboard,mpu,\"> <noscript> <a href=\"https:\/\/pubads.g.doubleclick.net\/gampad\/jump?co=1&amp;iu=\/6978\/reg_security\/cybercrime&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=4&amp;c=44ZgUox9cs9csTwh10PT1CHwAAANg&amp;t=ct%3Dns%26unitnum%3D4%26raptor%3Dfalcon%26pos%3Dmid%26test%3D0\" target=\"_blank\" rel=\"noopener\"> <img decoding=\"async\" src=\"https:\/\/pubads.g.doubleclick.net\/gampad\/ad?co=1&amp;iu=\/6978\/reg_security\/cybercrime&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=4&amp;c=44ZgUox9cs9csTwh10PT1CHwAAANg&amp;t=ct%3Dns%26unitnum%3D426raptor%3Dfalcon%26pos%3Dmid%26test%3D0\" alt> <\/a> <\/noscript> <\/div>\n<div class=\"adun_eagle_desktop_story_wrapper\">\n<div aria-hidden=\"true\" class=\"adun\" data-pos=\"mid\" data-raptor=\"eagle\" data-xxlg=\",mpu,dmpu,\"> <noscript> <a href=\"https:\/\/pubads.g.doubleclick.net\/gampad\/jump?co=1&amp;iu=\/6978\/reg_security\/cybercrime&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=3&amp;c=33ZgUox9cs9csTwh10PT1CHwAAANg&amp;t=ct%3Dns%26unitnum%3D3%26raptor%3Deagle%26pos%3Dmid%26test%3D0\" target=\"_blank\" rel=\"noopener\"> <img decoding=\"async\" src=\"https:\/\/pubads.g.doubleclick.net\/gampad\/ad?co=1&amp;iu=\/6978\/reg_security\/cybercrime&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=3&amp;c=33ZgUox9cs9csTwh10PT1CHwAAANg&amp;t=ct%3Dns%26unitnum%3D3%26raptor%3Deagle%26pos%3Dmid%26test%3D0\" alt> <\/a> <\/noscript> <\/div>\n<\/p><\/div>\n<p>This year&#8217;s report combines analysis from both the Mandiant and TAG teams for the first time since <a target=\"_blank\" href=\"https:\/\/www.theregister.com\/2022\/03\/08\/google_buys_mandiant_5_4bn_dollars\/\" rel=\"noopener\">Google bought Mandiant<\/a> in 2022. It also split the zero-day vulnerabilities into two categories: end-user platforms and products \u2013 encompassing mobile devices, operating systems, browsers, and other applications \u2013 and enterprise-focused software and appliances.<\/p>\n<p>While 61 of the 97 zero-days affected end-user products last year, this number isn&#8217;t increasing as rapidly as its enterprise counterparts.<\/p>\n<div aria-hidden=\"true\" class=\"adun\" data-pos=\"top\" data-raptor=\"falcon\" data-xsm=\",fluid,mpu,\" data-sm=\",fluid,mpu,\" data-md=\",fluid,mpu,\"> <noscript> <a href=\"https:\/\/pubads.g.doubleclick.net\/gampad\/jump?co=1&amp;iu=\/6978\/reg_security\/cybercrime&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=4&amp;c=44ZgUox9cs9csTwh10PT1CHwAAANg&amp;t=ct%3Dns%26unitnum%3D4%26raptor%3Dfalcon%26pos%3Dmid%26test%3D0\" target=\"_blank\" rel=\"noopener\"> <img decoding=\"async\" src=\"https:\/\/pubads.g.doubleclick.net\/gampad\/ad?co=1&amp;iu=\/6978\/reg_security\/cybercrime&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=4&amp;c=44ZgUox9cs9csTwh10PT1CHwAAANg&amp;t=ct%3Dns%26unitnum%3D426raptor%3Dfalcon%26pos%3Dmid%26test%3D0\" alt> <\/a> <\/noscript> <\/div>\n<p>Specifically, this included 17 Windows vulnerabilities, 11 in Safari, nine affecting both iOS and Android, and eight in Chrome. Google didn&#8217;t observe any zero-days across macOS, Firefox or Internet Explorer last year.<\/p>\n<p>The bug hunters credit vendors such as Apple, Google, and Microsoft with making &#8220;notable investments that are having a clear impact on the types and number of zero-days actors are able to exploit.&#8221;<\/p>\n<p>This includes protections such as Apple&#8217;s <a target=\"_blank\" rel=\"nofollow noopener\" href=\"https:\/\/support.apple.com\/en-us\/105120\">Lockdown Mode<\/a> for iOS and Google&#8217;s <a target=\"_blank\" rel=\"nofollow noopener\" href=\"https:\/\/security.googleblog.com\/2022\/09\/use-after-freedom-miracleptr.html\">MiraclePtr<\/a>, which prevents exploitation of use-after-free bugs across all Chrome platforms.<\/p>\n<div aria-hidden=\"true\" class=\"adun\" id=\"story_eagle_xsm_sm_md_xmd_lg_xlg\" data-pos=\"mid\" data-raptor=\"eagle\" data-xsm=\",mpu,dmpu,\" data-sm=\",mpu,dmpu,\" data-md=\",mpu,dmpu,\" data-xmd=\",mpu,dmpu,\" data-lg=\",mpu,dmpu,\" data-xlg=\",mpu,dmpu,\"> <noscript> <a href=\"https:\/\/pubads.g.doubleclick.net\/gampad\/jump?co=1&amp;iu=\/6978\/reg_security\/cybercrime&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=3&amp;c=33ZgUox9cs9csTwh10PT1CHwAAANg&amp;t=ct%3Dns%26unitnum%3D3%26raptor%3Deagle%26pos%3Dmid%26test%3D0\" target=\"_blank\" rel=\"noopener\"> <img decoding=\"async\" src=\"https:\/\/pubads.g.doubleclick.net\/gampad\/ad?co=1&amp;iu=\/6978\/reg_security\/cybercrime&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=3&amp;c=33ZgUox9cs9csTwh10PT1CHwAAANg&amp;t=ct%3Dns%26unitnum%3D3%26raptor%3Deagle%26pos%3Dmid%26test%3D0\" alt> <\/a> <\/noscript> <\/div>\n<p>&#8220;Vulnerabilities that were commonplace in years past are virtually non-existent today,&#8221; the report states.<\/p>\n<p>Across these end-user platforms, however, the Googlers did note an increase in zero-days across third-party components and libraries, which gives attackers more bang for their buck and allows them to exploit one bug while affecting multiple products.<\/p>\n<p>This included <a target=\"_blank\" href=\"https:\/\/www.theregister.com\/2023\/10\/03\/cisa_adds_latest_chrome_zeroday\/\" rel=\"noopener\">CVE-2023-5217<\/a>, a buffer overflow vulnerability affecting VP8\/VP9 encoding in libvpxin, an open source video codec library. This flaw affected Chrome, Firefox, iOS, and Android.<\/p>\n<p>On to another browser zero-day that was exploited in 2023 \u2013 <a target=\"_blank\" href=\"https:\/\/www.theregister.com\/2023\/09\/12\/chrome_browser_webp_exploit\/\" rel=\"noopener\">CVE-2023-4863<\/a>, a heap buffer overflow in libwebp that affected any software that used the WebP image library. This included Chrome, Safari, Android, and Firefox.<\/p>\n<p>&#8220;We assess with high confidence that the Chrome vulnerability CVE-2023-4863 and the Apple ImageIO vulnerability CVE-2023-41064 are actually the same bug,&#8221; TAG and Mandiant claim.<\/p>\n<h3 class=\"crosshead\">Enterprise tech zero-days<\/h3>\n<p>Moving back to the enterprise zero-days, Google&#8217;s threat hunters attribute the increase to buggy security software and appliances in 2023. Notably, this included <a target=\"_blank\" href=\"https:\/\/www.theregister.com\/2023\/06\/15\/chinese_spies_behind_barracuda_esg\/\" rel=\"noopener\">Barracuda Email Security Gateways<\/a>, <a target=\"_blank\" href=\"https:\/\/www.theregister.com\/2023\/10\/16\/cisco_ios_xe_zeroday_exploit\/\" rel=\"noopener\">Cisco Adaptive Security Appliances<\/a>, <a target=\"_blank\" href=\"https:\/\/www.theregister.com\/2023\/08\/03\/ivanti_cisa_norway_attack\/\" rel=\"noopener\">Ivanti Endpoint Manager Mobile<\/a> and <a target=\"_blank\" href=\"https:\/\/www.theregister.com\/2023\/08\/22\/critical_ivanti_mobileiron_sentry\/\" rel=\"noopener\">Sentry<\/a>, and <a target=\"_blank\" rel=\"nofollow noopener\" href=\"https:\/\/success.trendmicro.com\/dcx\/s\/solution\/000293108?language=en_US\">Trend Micro Apex One<\/a>.<\/p>\n<p>Ivanti had three zero-day exploits last year, as did North Grid Corporation, giving these two vendors the dubious honor of being the most-exploited enterprise tech in 2023 in terms of zero-days.<\/p>\n<p>This also illustrates a &#8220;key challenge&#8221; faced by enterprise vendors, according to TAG and Mandiant: &#8220;Learning how to respond to sophisticated attacks targeting their products in a timely and effective manner while simultaneously developing an effective patch that addresses the ways threat actors are weaponizing the vulnerability.&#8221;<\/p>\n<h3 class=\"crosshead\">Commercial surveillance vendors, government snoops going strong<\/h3>\n<p>Speaking of sophisticated attacks and attackers, perhaps unsurprisingly the bulk of last year&#8217;s exploits can be attributed to <a target=\"_blank\" href=\"https:\/\/www.theregister.com\/2024\/02\/07\/spyware_business_booming\/\" rel=\"noopener\">commercial surveillance vendors<\/a> (41.4 percent) and government cyberspies (41.4 percent).<\/p>\n<p>The rest (ten exploits) came from financially motivated criminals, which are already having plenty of success scanning for and then exploiting recently disclosed bugs, so it doesn&#8217;t make as much sense for them to buy zero-day exploits.<\/p>\n<p>The Google teams were able to attribute motivation to 58 zero days in 2023, and a combined 48 of these traced back to commercial surveillance vendors (think <a target=\"_blank\" href=\"https:\/\/www.theregister.com\/2024\/01\/24\/us_judge_rejects_pegasus_spyware\/\" rel=\"noopener\">Pegasus developer NSO Group<\/a>, <a target=\"_blank\" href=\"https:\/\/www.theregister.com\/2023\/05\/27\/predator_analysis_talos\/\" rel=\"noopener\">Predator maker Intellexa<\/a>, <a target=\"_blank\" href=\"https:\/\/www.theregister.com\/2021\/07\/16\/microsoft_candiru_malware\/\" rel=\"noopener\">Candiru<\/a>, and others) and government-linked crews including those with ties to Russia, North Korea, Belarus, China, and other unknown actors.<\/p>\n<p>TAG goes in-depth into a lot of these commercial surveillance vendors in its earlier report [<a target=\"_blank\" rel=\"nofollow noopener\" href=\"https:\/\/storage.googleapis.com\/gweb-uniblog-publish-prod\/documents\/Buying_Spying_-_Insights_into_Commercial_Surveillance_Vendors_-_TAG_report.pdf\">PDF<\/a>], published last month, which is worth a read for its insight into the CSV ecosystem.<\/p>\n<p>A couple of notable stats from the new zero-day report: CSVs were responsible for 75 percent (13) of known zero-day exploits targeting Google products and Android ecosystem devices in 2023, and 55 percent targeting iOS and Safari (11).<\/p>\n<p>CSVs did not have any luck with Windows zero-days in 2023. Every Windows exploit could be attributed to either government-backed or financially motivated miscreants.<\/p>\n<p>However, &#8220;we know that Candiru, a CSV, had a chain for Windows because we were able to recover their first stage Chrome exploit, but we were not able to recover the rest of the exploits in the chain,&#8221; the report says.<\/p>\n<p>Additionally, China&#8217;s government was behind 12 zero-day exploits last year, up from seven in 2022, which, once again, puts the People&#8217;s Republic as the most prolific nation-state attacker.<\/p>\n<p>This number includes <a target=\"_blank\" href=\"https:\/\/www.theregister.com\/2023\/08\/30\/mandiant_barracuda_esg_bug\/\" rel=\"noopener\">UNC4841&#8217;s exploitation<\/a> of two Barracuda bugs, CVE-2023-2868 and CVE-2023-7102.<\/p>\n<p>Plus, another Beijing-linked group, <a target=\"_blank\" href=\"https:\/\/www.theregister.com\/2024\/01\/20\/chinese_russia_vmware_microsoft\/\" rel=\"noopener\">UNC3886<\/a>, exploited three separate zero-days using two novel attack paths as the report outlines:<\/p>\n<p>In a second attack, the group exploited CVE-2023-34048, a VMware out-of-bounds write bug, then also exploited CVE-2023-20867. TAG and Mandiant say this allowed the criminals access to vulnerable networks as far back as late 2021. \u00ae<\/p>\n<p> READ MORE <a href=\"https:\/\/packetstormsecurity.com\/news\/view\/35704\/Google-Reveals-0-Day-Exploits-In-Enterprise-Tech-Surged-64-Last-Year.html\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[60],"tags":[6319],"class_list":["post-55700","post","type-post","status-publish","format-standard","hentry","category-packet-storm","tag-headlineflawgooglezero-day"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Google Reveals 0-Day Exploits In Enterprise Tech Surged 64% Last Year 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/google-reveals-0-day-exploits-in-enterprise-tech-surged-64-last-year\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Google Reveals 0-Day Exploits In Enterprise Tech Surged 64% Last Year 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/google-reveals-0-day-exploits-in-enterprise-tech-surged-64-last-year\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2024-03-27T14:27:48+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/pubads.g.doubleclick.net\/gampad\/ad?co=1&amp;iu=\/6978\/reg_security\/cybercrime&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=2&amp;c=2ZgUox9cs9csTwh10PT1CHwAAANg&amp;t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/google-reveals-0-day-exploits-in-enterprise-tech-surged-64-last-year\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/google-reveals-0-day-exploits-in-enterprise-tech-surged-64-last-year\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Google Reveals 0-Day Exploits In Enterprise Tech Surged 64% Last Year\",\"datePublished\":\"2024-03-27T14:27:48+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/google-reveals-0-day-exploits-in-enterprise-tech-surged-64-last-year\\\/\"},\"wordCount\":924,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/google-reveals-0-day-exploits-in-enterprise-tech-surged-64-last-year\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/pubads.g.doubleclick.net\\\/gampad\\\/ad?co=1&amp;iu=\\\/6978\\\/reg_security\\\/cybercrime&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=2&amp;c=2ZgUox9cs9csTwh10PT1CHwAAANg&amp;t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0\",\"keywords\":[\"headline,flaw,google,zero day\"],\"articleSection\":[\"Packet Storm\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/google-reveals-0-day-exploits-in-enterprise-tech-surged-64-last-year\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/google-reveals-0-day-exploits-in-enterprise-tech-surged-64-last-year\\\/\",\"name\":\"Google Reveals 0-Day Exploits In Enterprise Tech Surged 64% Last Year 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/google-reveals-0-day-exploits-in-enterprise-tech-surged-64-last-year\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/google-reveals-0-day-exploits-in-enterprise-tech-surged-64-last-year\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/pubads.g.doubleclick.net\\\/gampad\\\/ad?co=1&amp;iu=\\\/6978\\\/reg_security\\\/cybercrime&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=2&amp;c=2ZgUox9cs9csTwh10PT1CHwAAANg&amp;t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0\",\"datePublished\":\"2024-03-27T14:27:48+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/google-reveals-0-day-exploits-in-enterprise-tech-surged-64-last-year\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/google-reveals-0-day-exploits-in-enterprise-tech-surged-64-last-year\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/google-reveals-0-day-exploits-in-enterprise-tech-surged-64-last-year\\\/#primaryimage\",\"url\":\"https:\\\/\\\/pubads.g.doubleclick.net\\\/gampad\\\/ad?co=1&amp;iu=\\\/6978\\\/reg_security\\\/cybercrime&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=2&amp;c=2ZgUox9cs9csTwh10PT1CHwAAANg&amp;t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0\",\"contentUrl\":\"https:\\\/\\\/pubads.g.doubleclick.net\\\/gampad\\\/ad?co=1&amp;iu=\\\/6978\\\/reg_security\\\/cybercrime&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=2&amp;c=2ZgUox9cs9csTwh10PT1CHwAAANg&amp;t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/google-reveals-0-day-exploits-in-enterprise-tech-surged-64-last-year\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"headline,flaw,google,zero day\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/headlineflawgooglezero-day\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Google Reveals 0-Day Exploits In Enterprise Tech Surged 64% Last Year\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Google Reveals 0-Day Exploits In Enterprise Tech Surged 64% Last Year 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/google-reveals-0-day-exploits-in-enterprise-tech-surged-64-last-year\/","og_locale":"en_US","og_type":"article","og_title":"Google Reveals 0-Day Exploits In Enterprise Tech Surged 64% Last Year 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/google-reveals-0-day-exploits-in-enterprise-tech-surged-64-last-year\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2024-03-27T14:27:48+00:00","og_image":[{"url":"https:\/\/pubads.g.doubleclick.net\/gampad\/ad?co=1&amp;iu=\/6978\/reg_security\/cybercrime&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=2&amp;c=2ZgUox9cs9csTwh10PT1CHwAAANg&amp;t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/google-reveals-0-day-exploits-in-enterprise-tech-surged-64-last-year\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/google-reveals-0-day-exploits-in-enterprise-tech-surged-64-last-year\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Google Reveals 0-Day Exploits In Enterprise Tech Surged 64% Last Year","datePublished":"2024-03-27T14:27:48+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/google-reveals-0-day-exploits-in-enterprise-tech-surged-64-last-year\/"},"wordCount":924,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/google-reveals-0-day-exploits-in-enterprise-tech-surged-64-last-year\/#primaryimage"},"thumbnailUrl":"https:\/\/pubads.g.doubleclick.net\/gampad\/ad?co=1&amp;iu=\/6978\/reg_security\/cybercrime&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=2&amp;c=2ZgUox9cs9csTwh10PT1CHwAAANg&amp;t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0","keywords":["headline,flaw,google,zero day"],"articleSection":["Packet Storm"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/google-reveals-0-day-exploits-in-enterprise-tech-surged-64-last-year\/","url":"https:\/\/www.threatshub.org\/blog\/google-reveals-0-day-exploits-in-enterprise-tech-surged-64-last-year\/","name":"Google Reveals 0-Day Exploits In Enterprise Tech Surged 64% Last Year 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/google-reveals-0-day-exploits-in-enterprise-tech-surged-64-last-year\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/google-reveals-0-day-exploits-in-enterprise-tech-surged-64-last-year\/#primaryimage"},"thumbnailUrl":"https:\/\/pubads.g.doubleclick.net\/gampad\/ad?co=1&amp;iu=\/6978\/reg_security\/cybercrime&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=2&amp;c=2ZgUox9cs9csTwh10PT1CHwAAANg&amp;t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0","datePublished":"2024-03-27T14:27:48+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/google-reveals-0-day-exploits-in-enterprise-tech-surged-64-last-year\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/google-reveals-0-day-exploits-in-enterprise-tech-surged-64-last-year\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/google-reveals-0-day-exploits-in-enterprise-tech-surged-64-last-year\/#primaryimage","url":"https:\/\/pubads.g.doubleclick.net\/gampad\/ad?co=1&amp;iu=\/6978\/reg_security\/cybercrime&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=2&amp;c=2ZgUox9cs9csTwh10PT1CHwAAANg&amp;t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0","contentUrl":"https:\/\/pubads.g.doubleclick.net\/gampad\/ad?co=1&amp;iu=\/6978\/reg_security\/cybercrime&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=2&amp;c=2ZgUox9cs9csTwh10PT1CHwAAANg&amp;t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0"},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/google-reveals-0-day-exploits-in-enterprise-tech-surged-64-last-year\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"headline,flaw,google,zero day","item":"https:\/\/www.threatshub.org\/blog\/tag\/headlineflawgooglezero-day\/"},{"@type":"ListItem","position":3,"name":"Google Reveals 0-Day Exploits In Enterprise Tech Surged 64% Last Year"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/55700","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=55700"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/55700\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=55700"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=55700"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=55700"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}