Google's analysis of zero-day exploits throughout 2025 revealed a significant trend: precisely half of all observed zero-day vulnerabilities specifically targeted enterprise technology. This substantial focus by malicious actors on enterprise software positioned security and networking infrastructure as primary exploitation vectors. Specifically, devices like firewalls, virtual private networks (VPNs), and virtualization platforms were repeatedly among the most frequent targets for these sophisticated attacks. This pattern suggests a deliberate strategy by adversaries to compromise critical operational components within organizational networks, leveraging their widespread deployment and potential for extensive impact. The report highlights the appeal of these foundational systems to attackers aiming for high-value entry points, data exfiltration, or establishing persistent access. This concentrated effort against core enterprise systems by advanced persistent threats means that traditional perimeter defenses and reactive patching are increasingly inadequate. Organizations must prioritize immediate, proactive vulnerability assessments and accelerated patching for all critical infrastructure, as the window for effective remediation is diminishing once such vulnerabilities are actively exploited1.
Google says half of all zero-days it tracked in 2025 targeted buggy enterprise tech
⚡ High Priority
Why This Matters
Zero-day activity targeting Google means patching windows are already closing — assess your exposure immediately.
References
- TechCrunch. (2026, March 5). Google says half of all zero-days it tracked in 2025 targeted buggy enterprise tech. *TechCrunch*. https://techcrunch.com/2026/03/05/google-says-half-of-all-zero-days-it-tracked-in-2025-targeted-buggy-enterprise-tech/
Original Source
TechCrunch
Read original →