Protect.Computer
NEWS

Google reports 90 zero-days exploited in 2025, with enterprise systems heavily targeted

· 1 min read · Device safety

What happened

Google Threat Intelligence Group (GTIG) says it observed 90 zero-day vulnerabilities exploited in the wild during 2025.

That is:

  • Up from 78 in 2024
  • Below the 100 recorded in 2023

Key findings

Target split shifted toward enterprise

GTIG’s 2025 dataset shows a near-even split:

  • 47 zero-days targeting end-user platforms
  • 43 targeting enterprise products

Enterprise-targeted exploitation focused on high-value infrastructure, including:

  • Security appliances
  • Network edge gear and VPNs
  • Virtualization platforms

Exploit types and vendor pressure points

Commonly exploited bug classes included:

  1. Remote code execution
  2. Privilege escalation
  3. Authorization bypass
  4. Injection and deserialization flaws
  5. Memory corruption bugs

Google also reported memory-safety issues made up a large share of exploited flaws, while browser zero-days declined versus prior years.

Why this matters

  • Enterprise edge systems are increasingly prime initial-access targets.
  • Commercial spyware vendors are now a major driver of high-end exploit activity.
  • Defenders should expect continued pressure in 2026, especially where patching and visibility lag.

What defenders should do now

  • Reduce exposed attack surface on externally reachable enterprise systems.
  • Patch aggressively for edge/network/security products, not just endpoints.
  • Harden privileged paths (admin interfaces, API access, management planes).
  • Improve detection coverage on infrastructure that traditionally lacks strong EDR telemetry.

Bottom line

The 2025 zero-day picture reinforces that attackers are investing where access is most valuable: enterprise control points and edge infrastructure. Organizations should treat external-facing and management-plane systems as top-tier patch and monitoring priorities.

Related reading