VulnerabilitiesHIGH

90 Zero-Day Vulnerabilities Exploited in 2025, Google Reports

CSCyber Security News17h ago2 min read
Googlezero-dayvulnerabilitiescybersecurity
🎯

Basically, Google found 90 serious security flaws that hackers are using right now.

Quick Summary

Google has revealed that 90 zero-day vulnerabilities were exploited in 2025. This affects users of various software, increasing the risk of breaches and attacks. Stay updated and protect your systems against these threats.

What Happened

In a startling revelation, the Google Threat Intelligence Group (GTIG) has reported that 90 zero-day vulnerabilities were actively exploited? in 2025. This figure, while lower than the record 100 zero-days identified in 2023, shows a significant rise from the 78 vulnerabilities reported in 2024. The increase indicates that cybercriminals? are becoming more adept at finding and exploiting these critical security flaws.

Zero-day vulnerabilities? are security holes in software that developers are unaware of, meaning there are no patches or fixes available when they are exploited. This gives attackers a unique window of opportunity to compromise systems before the vulnerabilities are disclosed and addressed. Google’s researchers suggest that the trend of increasing zero-day exploits reflects a shift in attackers' focus, making it crucial for users and organizations to stay vigilant.

Why Should You Care

You might think zero-day vulnerabilities? are just a tech problem, but they can affect you directly. Imagine if a hacker found a way to sneak into your bank account without you knowing. That’s what zero-day vulnerabilities? can do — they allow attackers to exploit weaknesses in software before anyone has a chance to fix them. If you use software that has these vulnerabilities, you could be at risk without even realizing it.

In today’s digital world, where everything from your phone to your work systems relies on software, these vulnerabilities can lead to data breaches, financial loss, and even identity theft. It’s like leaving your front door wide open — you wouldn’t do that, so why leave your digital life unprotected?

What's Being Done

Google is actively monitoring these vulnerabilities and working with software developers to address them. Here’s what you should do right now:

  • Update your software regularly to ensure you have the latest security patches?.
  • Use security tools that can help detect and block potential threats.
  • Stay informed about the latest vulnerabilities and how they might affect your systems.

Experts are closely watching this trend to see if the number of zero-day vulnerabilities? continues to rise or if new defensive measures will help curb these attacks.

💡 Tap dotted terms for explanations

🔒 Pro insight: The rise in zero-day exploits signals an evolving threat landscape, necessitating proactive defense strategies and real-time monitoring.

Original article from

Cyber Security News · Abinaya

Read Full Article

Related Pings

HIGHVulnerabilities

HttpOnly Cookies at Risk from New 'Cookie Sandwich' Technique

A new technique called 'cookie sandwich' can steal secure cookies from websites. This affects users relying on HttpOnly flags for protection. Stay informed and ensure your online security measures are up to date.

PortSwigger Research·40m ago·2m
HIGHVulnerabilities

Exploitation Alert: Gladinet Vulnerability Targets Cryptography

A vulnerability in Gladinet's CentreStack and Triofox software is being actively exploited. Users are at risk of data breaches due to hardcoded cryptographic keys. Gladinet is working on a fix, but immediate action is needed to secure your systems.

Huntress Blog·40m ago·2m
HIGHVulnerabilities

XSS Vulnerability Found in RPi-Jukebox-RFID 2.8.0

A serious XSS vulnerability has been found in RPi-Jukebox-RFID 2.8.0. Users are at risk of attackers injecting harmful scripts. Update your software immediately to protect your device and data.

Exploit-DB·40m ago·2m
HIGHVulnerabilities

Hacked Construction Apps Threaten Jobsite Security

Hacked construction apps are exposing job sites to security risks. This affects contractors and workers alike, leading to potential project delays and safety issues. Stay updated on software patches and security measures to protect your projects.

Huntress Blog·40m ago·2m
HIGHVulnerabilities

URL Validation Bypass Cheat Sheet Gets Powerful New Payloads

A new update to the URL Validation Bypass Cheat Sheet introduces powerful payloads for web security experts. This matters because weak URL validations can lead to serious security breaches. Stay informed and protect your online activities!

PortSwigger Research·40m ago·2m
HIGHVulnerabilities

Windows 10 Faces Spoofing Vulnerability Risk

A spoofing vulnerability has been found in Windows 10 version 10.0.17763.7009. This flaw could allow attackers to impersonate legitimate users, risking your sensitive information. Microsoft is working on a patch, so stay alert and update your system when available.

Exploit-DB·40m ago·2m