Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Inside the EU’s military innovation push

Fake Laravel packages on Packagist deploy RAT on Windows, macOS, and Linux

Artemis II mission sets stage for lunar return and beyond

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Government hackers are leading the use of zero-days, Google says
Startups

Government hackers are leading the use of zero-days, Google says

userBy userApril 29, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

According to a new Google research, the government hackers were responsible for most of the zero-day exploits used in real-world cyberattacks last year.

According to a Google report, the number of zero-day exploits that mentioned security flaws unknown to software manufacturers at the time of the hacker’s abuse fell from 98 exploits in 2023 to 75 exploits in 2024. Government-supported hackers.

Of these 23 exploits, 10 Zero Days were attributed to hackers working directly for the government, including five exploits related to China and five other exploits in North Korea.

Another eight exploits were identified as being developed by spyware manufacturers and surveillance enablers such as NSO groups, which normally claim to only sell to the government. Of the eight exploits created by Spyware Companies, Google also counts bugs that have been exploited recently by Serbian authorities.

The 34 zero-day graphics include 10 due to state-sponsored spies (5 to China, 5 to DPRK), and another eight zero-days due to commercial surveillance vendors.
Chart showing zero-day exploits caused by 2024 (Image: Google)

Despite the fact that there are eight recorded cases of zero-day developed by the Spyware manufacturer, Clément Leciigne, security engineer at Google’s Threat Intelligence Group (GTIG), told TechCrunch that the companies are “investing more resources into operational security so their capabilities aren’t ending in the news.”

Google added that surveillance vendors continue to multiply.

“We have seen new vendors arise to provide similar services if a vendor completes its business,” James Sadowkey, principal analyst at GTIG, told TechCrunch. “The industry will continue to grow as long as government customers continue to request and pay for these services.”

The remaining 11 zero-days could have been misused by cybercriminals, including ransomware operators targeting enterprise devices, including VPNs and routers.

The report also found that the majority of the total 75 zero days exploited in 2024 targeted consumer platforms and products such as mobile phones and browsers. The rest was using devices that can be seen on corporate networks.

According to a Google report, the good news is that it’s becoming more and more difficult for software manufacturers defending against zero-day attacks to spot bugs.

“We have seen a noticeable decline in the use of zero-days in several historically popular targets, such as browsers and mobile operating systems,” the report states.

Sadowski specifically pointed out Lockdown Mode, a special feature on iOS and MacO that disables certain features with the aim of hardening phones and computers that have a proven track record of stopping government hackers. It also like the Memory Tagging Extension (MTE), a security feature of the latest Google Pixel Chipsets that helps detect certain types of bugs and improve device security.

Reports like Google are valuable because reports like Google provide the industry with data points that contribute to an understanding of how government hackers work.


Source link

Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleUnlock EU Finance for the Energy Community
Next Article Google reports 75 Zero Days Abuse in 2024 – 44% Targeted Enterprise Security Products
user
  • Website

Related Posts

Why are AI startups selling the same stock at two different prices?

March 4, 2026

A series of government hacking tools targeting iPhones are being used by cybercriminals

March 3, 2026

Alibaba’s Qwen technology chief resigns amid massive AI push

March 3, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Inside the EU’s military innovation push

Fake Laravel packages on Packagist deploy RAT on Windows, macOS, and Linux

Artemis II mission sets stage for lunar return and beyond

APT41-linked Silver Dragon uses Cobalt Strike and Google Drive C2 to target governments

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Castilla-La Mancha Ignites Innovation: fiveclmsummit Redefines Tech Future

Local Power, Health Innovation: Alcolea de Calatrava Boosts FiveCLM PoC with Community Engagement

The Future of Digital Twins in Healthcare: From Virtual Replicas to Personalized Medical Models

Human Digital Twins: The Next Tech Frontier Set to Transform Healthcare and Beyond

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2026 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.