Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Important unpaid SharePoint Zero-Day will be actively utilized and violated global organizations over the age of 75

Malware injected into 6 npm package after maintainer token was stolen in a phishing attack

Hackers exploit critical CrushFTP flaws to gain admin access on unearned servers

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Government hackers are leading the use of zero-days, Google says
Startups

Government hackers are leading the use of zero-days, Google says

userBy userApril 29, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

According to a new Google research, the government hackers were responsible for most of the zero-day exploits used in real-world cyberattacks last year.

According to a Google report, the number of zero-day exploits that mentioned security flaws unknown to software manufacturers at the time of the hacker’s abuse fell from 98 exploits in 2023 to 75 exploits in 2024. Government-supported hackers.

Of these 23 exploits, 10 Zero Days were attributed to hackers working directly for the government, including five exploits related to China and five other exploits in North Korea.

Another eight exploits were identified as being developed by spyware manufacturers and surveillance enablers such as NSO groups, which normally claim to only sell to the government. Of the eight exploits created by Spyware Companies, Google also counts bugs that have been exploited recently by Serbian authorities.

The 34 zero-day graphics include 10 due to state-sponsored spies (5 to China, 5 to DPRK), and another eight zero-days due to commercial surveillance vendors.
Chart showing zero-day exploits caused by 2024 (Image: Google)

Despite the fact that there are eight recorded cases of zero-day developed by the Spyware manufacturer, Clément Leciigne, security engineer at Google’s Threat Intelligence Group (GTIG), told TechCrunch that the companies are “investing more resources into operational security so their capabilities aren’t ending in the news.”

Google added that surveillance vendors continue to multiply.

“We have seen new vendors arise to provide similar services if a vendor completes its business,” James Sadowkey, principal analyst at GTIG, told TechCrunch. “The industry will continue to grow as long as government customers continue to request and pay for these services.”

The remaining 11 zero-days could have been misused by cybercriminals, including ransomware operators targeting enterprise devices, including VPNs and routers.

The report also found that the majority of the total 75 zero days exploited in 2024 targeted consumer platforms and products such as mobile phones and browsers. The rest was using devices that can be seen on corporate networks.

According to a Google report, the good news is that it’s becoming more and more difficult for software manufacturers defending against zero-day attacks to spot bugs.

“We have seen a noticeable decline in the use of zero-days in several historically popular targets, such as browsers and mobile operating systems,” the report states.

Sadowski specifically pointed out Lockdown Mode, a special feature on iOS and MacO that disables certain features with the aim of hardening phones and computers that have a proven track record of stopping government hackers. It also like the Memory Tagging Extension (MTE), a security feature of the latest Google Pixel Chipsets that helps detect certain types of bugs and improve device security.

Reports like Google are valuable because reports like Google provide the industry with data points that contribute to an understanding of how government hackers work.


Source link

Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleUnlock EU Finance for the Energy Community
Next Article Google reports 75 Zero Days Abuse in 2024 – 44% Targeted Enterprise Security Products
user
  • Website

Related Posts

Astronomer CEO resigns following Cold Play Concert Scandal

July 19, 2025

David Sacks and a blurred line of government services

July 19, 2025

Windsurf CEO opens about a “very dark” mood before recognition

July 19, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Important unpaid SharePoint Zero-Day will be actively utilized and violated global organizations over the age of 75

Malware injected into 6 npm package after maintainer token was stolen in a phishing attack

Hackers exploit critical CrushFTP flaws to gain admin access on unearned servers

Astronomer CEO resigns following Cold Play Concert Scandal

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Next-Gen Digital Identity: How TwinH and Avatars Are Redefining Creation

BREAKING: TwinH Set to Revolutionize Legal Processes – Presented Today at ICEX Forum 2025

Building AGI: Zuckerberg Commits Billions to Meta’s Superintelligence Data Center Expansion

ICEX Forum 2025 Opens: FySelf’s TwinH Showcases AI Innovation

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.