Close Menu
Indo Guard OnlineIndo Guard Online
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
What's Hot

Operation malicious network supply software gets to NPM and Pypi ecosystems, focusing on millions worldwide

June 8, 2025

Extension of the malicious browser has infected 722 users across Latin America since the beginning of 2025

June 8, 2025

New company Atomic MacOS Campation Exploaits Clickfix to focus on Apple users

June 6, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram YouTube
Indo Guard OnlineIndo Guard Online
Subscribe
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
Indo Guard OnlineIndo Guard Online
Home » Google reports 75 zero days that are operated in 2024-44% of target products of enterprise security
Global Security

Google reports 75 zero days that are operated in 2024-44% of target products of enterprise security

AdminBy AdminApril 29, 2025No Comments4 Mins Read
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link


April 29, 2025Red LakshmananEnterprise safety / vulnerability

Google has shown that there were 75 zero days that are operated in the wild in 2024, decreasing compared to 98 in 2023.

Of the 75 zero days, 44% of them are targeted enterprises. The software and instrument revealed 20 disadvantages.

“Zero browsers and mobile devices decreased dramatically, decreasing approximately a third for browsers and twice for mobile compared to what we watched last year,” Google Group (GTIG) – Note In a report that shared with Hacker News.

“Operating chains consisting of multiple vulnerabilities with zero day still remain almost exclusive (~ 90%) used to focus on mobile devices.”

While Microsoft Windows was 22 flaws with zero day, which were operated in 2024, the Safari in Apple had three in iOS, Android had seven, Chrome had seven, and Mozilla Firefox-only disadvantage. Three of the seven zero days operated in Android were found in other components.

Cybersecurity

Among the exploited 33 zero days in the software and enterprise appliances, 20 of them are focused security and network products, such as Ivanti, Palo Alto Networks and Cisco.

“The safety and network tools and devices are designed to connect wide systems and devices with high permits required to manage products and their services, making them very valuable targets for threatening subjects that seek effective access to enterprises,” GTIG researchers said.

A total of 18 unique suppliers of enterprises were sent in 2024, compared to 12 in 2021, 17 in 2022 and 22 in 2023. Companies with the most focused zero days were Microsoft (26), Google (11), Ivanti (7) and Apple (5).

Moreover, the operation of the zero day in 34 out of 75 deficiencies was associated with six extensive clusters of the threat –

  • Spied by the state (10), led by China (5), Russia (1) and South Korea (1) (for example ,, for example, Cve-2023-46805. Cve-2024-2187)
  • Commercial Supervisors (8) (eg Cve-2024-53104. Cve-2024-32896. CVE-2024-29745, CVE-2024-29748)
  • Non -state financially motivated groups (5) (eg Cve-2024-55956)
  • State espionage and financially motivated groups (5), all from North Korea (eg Cve-2024-2138. Cve-2024-38178)
  • Non -governmental financially motivated groups also conduct espionage (2), all from Russia (eg Cve-2024-9680, Cve-2024-49039)

Google stated that he had discovered in November 2024 a malicious injection of JavaScript on the website of the diplomatic academy of Ukraine (online.da.mfa.gov (.) UA) that caused a feat for Cve-2024-44308leading to an arbitrary code.

Then it was chained Cve-2024-44309The Cookie Vulnerability of the Webkit, to launch the script attack on the site (XSS) and ultimately collect the files of users to unauthorized access to login.microsoftonline (.) Com.

Further, the technological giant noted that it independently discovered a network of operation for Firefox and Tor observers, which used the combination of the CVE-2024-9680 and CVE-2024-49039 to escape from the Firefox sandbox and perform a malicious code with increased privileges, thus laiding the way for the outburst.

Activities earlier named ESET was associated with an actor threatened called Romcom (aka Storm-0978, Tropical Scorpius, UAC-0180, UNC2596 and Void Rabisu). Google tracks a double group of threats motivated to motivate called Cigar.

Cybersecurity

Both shortcomings are said to have been abused as zero day to another, probably a financially motivated hacking crew that used a legitimate, compromised news website as a fuel hole to redirect visitors to a domain controlled by the operating network.

“The exploitation of the zero day continues to grow slow but sustainable. However, we also started seeing the work providers to mitigate the operation with zero day starting to pay off,” said Casey Sharer, Gtig Senior Analyst, in a statement shared with Hacker News.

“For example, we have observed fewer cases of zero-oriented products that were historically popular, probably because of the efforts and resources that many major suppliers have invested to prevent operation.”

“At the same time, we see the operational exploitation with zero days before increasing the targeting of products focused on enterprises, which requires a broader and diverse set of suppliers to increase active safety measures. The future operation of the zero day will ultimately be dictated by solutions.

Found this article interesting? Keep track of us further Youter  and LinkedIn To read more exclusive content we publish.





Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Admin
  • Website

Related Posts

Operation malicious network supply software gets to NPM and Pypi ecosystems, focusing on millions worldwide

June 8, 2025

Extension of the malicious browser has infected 722 users across Latin America since the beginning of 2025

June 8, 2025

New company Atomic MacOS Campation Exploaits Clickfix to focus on Apple users

June 6, 2025

Microsoft helps CBI disassemble the Indian Centers for Japanese Technical Support

June 6, 2025

Expand users’ capabilities and protect against Genai data loss

June 6, 2025

Why are more security leaders choose AEV

June 6, 2025
Add A Comment
Leave A Reply Cancel Reply

Loading poll ...
Coming Soon
Do You Like Our Website
: {{ tsp_total }}

Subscribe to Updates

Get the latest security news from Indoguardonline.com

Latest Posts

Operation malicious network supply software gets to NPM and Pypi ecosystems, focusing on millions worldwide

June 8, 2025

Extension of the malicious browser has infected 722 users across Latin America since the beginning of 2025

June 8, 2025

New company Atomic MacOS Campation Exploaits Clickfix to focus on Apple users

June 6, 2025

Microsoft helps CBI disassemble the Indian Centers for Japanese Technical Support

June 6, 2025

Expand users’ capabilities and protect against Genai data loss

June 6, 2025

Why are more security leaders choose AEV

June 6, 2025

New data Wiper Pathwiper Data Wiper violates Ukrainian critical infrastructure in 2025 attack

June 6, 2025

Popular Chrome Extensions API leaks, user data via HTTP and Hard Codes

June 5, 2025
About Us
About Us

Provide a constantly updating feed of the latest security news and developments specific to Indonesia.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

Operation malicious network supply software gets to NPM and Pypi ecosystems, focusing on millions worldwide

June 8, 2025

Extension of the malicious browser has infected 722 users across Latin America since the beginning of 2025

June 8, 2025

New company Atomic MacOS Campation Exploaits Clickfix to focus on Apple users

June 6, 2025
Most Popular

In Indonesia, crippling immigration ransomware breach sparks privacy crisis

July 6, 2024

Why Indonesia’s Data Breach Crisis Calls for Better Security

July 6, 2024

Indonesia’s plan to integrate 27,000 govt apps in one platform welcomed but data security concerns linger

July 6, 2024
© 2025 indoguardonline.com
  • Home
  • About us
  • Contact us
  • Privacy Policy

Type above and press Enter to search. Press Esc to cancel.