Google Says Half Of All Zero-Days It Tracked In 2025 Targeted Buggy Enterprise Tech

Half of all zero-day vulnerabilities tracked in 2025 targeted enterprise technology — a record-breaking milestone that signals a dramatic and dangerous shift in how cybercriminals are choosing their victims. If your organization relies on firewalls, VPNs, or virtualization software, this report directly concerns you.

Google Says Half Of All Zero-Days It Tracked In 2025 Targeted Buggy Enterprise Tech
Credit: Patrick George / Getty Images

Zero-Day Attacks on Enterprise Tech Reached an Alarming New High in 2025

A comprehensive annual security report published in early 2026 revealed that 48% of all tracked zero-day vulnerabilities last year were found in technologies used by corporations and large businesses. That figure marks the highest share ever recorded for enterprise-targeted zero-days — and it's a trend that cybersecurity professionals say shows no sign of slowing down.

Zero-day vulnerabilities are software flaws that are unknown to the software maker at the time they are exploited. That means there's no available patch, no warning, and no defense until the vendor discovers the flaw and rushes out a fix. In the enterprise world, where a single breach can expose thousands of employees' records and cost millions of dollars, this is an especially frightening reality.

What makes the 2025 numbers so striking is not just the volume, but the nature of what's being targeted. Attackers are no longer simply trying to sneak past defenses — they're targeting the defenses themselves.

Hackers Are Exploiting the Tools Designed to Keep Them Out

Among the most alarming findings: roughly half of those enterprise zero-days were used to compromise the very security and networking devices built to protect corporate networks. Firewalls, VPNs, and virtualization platforms — the critical gatekeepers of enterprise infrastructure — became prime attack targets in 2025.

Products from major vendors in the security and networking space were among the most heavily targeted. Firewalls, VPN solutions, and virtualization platforms all appeared prominently in the report's list of exploited technologies, with multiple vendors publicly confirming that hackers had successfully exploited their products on live customer networks in recent months.

This is a troubling development because these devices sit at the perimeter of corporate networks. When they fall, attackers often gain broad access to internal systems, sensitive data, and communications. It's like hiring a security guard — and having the criminal steal their uniform and badge.

Security researchers noted that hackers are not necessarily relying on exotic, highly sophisticated exploits to achieve this. Instead, they're taking advantage of common, well-understood software flaws.

The Most Common Attack Techniques Targeting Enterprise Networks

Researchers identified two particularly prevalent classes of vulnerabilities driving the surge in enterprise zero-day exploitation: input validation flaws and incomplete authorization processes.
Input validation bugs occur when software fails to properly check or sanitize the data it receives, allowing attackers to feed it malicious commands or data. Authorization flaws, meanwhile, allow unauthorized users to access systems or functions they shouldn't be able to reach. Together, these two vulnerability types represent a significant and often underestimated risk, particularly in security devices that are frequently trusted implicitly.

What's especially concerning is that while these bugs are generally easier to exploit than more complex vulnerabilities, they are also harder to defend against in the short term. Unlike behavioral or configuration-based defenses, the only real fix for these flaws is a software update from the vendor — which means organizations are entirely dependent on the vendor's response time, and on their own patch management practices.

For many enterprises, that gap between a vulnerability being exploited and a patch being deployed can stretch from days to weeks. For attackers, that's more than enough time.

Ransomware Gangs Are Cashing In on Enterprise Software Weaknesses

The enterprise zero-day problem isn't limited to network devices. Researchers also highlighted attacks targeting enterprise software platforms — the kind used to manage business operations across entire organizations.

One of the most notable examples involved a prolific extortion group's campaign targeting a widely used enterprise resource planning suite. The attackers exploited a zero-day vulnerability to extract vast quantities of human resources data from dozens of companies — exposing sensitive personnel records for employees and executives alike.

The breach affected a striking range of organizations: a prestigious Ivy League university, a major airline subsidiary, and one of the most widely read newspapers in the United States, among others. The diversity of those victims illustrates just how broadly enterprise software vulnerabilities can ripple across industries and sectors.

This type of attack is particularly damaging because HR data is extraordinarily sensitive. Names, salaries, Social Security numbers, home addresses, and employment history can all be weaponized — used for identity theft, targeted phishing, corporate espionage, or sold on dark web marketplaces.

Consumer Software Still Accounts for Over Half of Zero-Days — But Trends Are Shifting

Enterprise technology may be the fastest-growing target, but consumer and end-user software still represents the majority of tracked zero-day vulnerabilities. According to the report, 52% of zero-days in 2025 were found in consumer-facing products, including operating systems and mobile devices.

Mobile devices in particular saw a notable uptick in zero-day exploitation compared to previous years. This is significant because the line between personal and professional devices continues to blur. Many employees access corporate systems from personal phones and laptops, meaning a consumer-grade exploit can quickly become an enterprise-level breach.

Operating systems — the software foundation upon which everything else runs — remained the most common category of consumer-facing zero-days. This is consistent with historical trends, as operating systems represent a high-value target due to the deep system access they can provide to a successful attacker.

A Growing Role for Commercial Surveillance Vendors — Not Just Nation-States

One of the more nuanced findings in the report involves who is actually behind many of these zero-day exploits. Traditionally, sophisticated zero-day attacks have been associated with nation-state hacking groups — government-backed teams conducting espionage on behalf of foreign governments.

But researchers observed a meaningful shift in 2025: more zero-day attacks are now being attributed to commercial surveillance vendors rather than traditional state-sponsored groups. These are private companies that develop spyware and hacking tools, selling their capabilities to government clients who want to conduct surveillance or gain access to targeted devices.

Researchers described this pattern as representing a gradual but unmistakable movement in the threat landscape — one where the line between government hacking and commercial cyber mercenaries is becoming increasingly difficult to draw. This has serious implications for regulation, attribution, and the ability of governments and companies to hold attackers accountable.

The commercialization of zero-day exploitation means that more actors now have access to powerful attack capabilities that were once the exclusive domain of the world's most sophisticated intelligence agencies.

What This Means for Businesses in 2026 and Beyond

The findings paint a sobering picture for enterprise security teams heading into 2026. The tools organizations depend on to keep attackers out are themselves becoming high-value targets. The vulnerabilities being exploited are not exotic — they're well-known classes of bugs that have existed for years. And the actors behind these attacks are increasingly professional, well-funded, and commercially motivated.

For organizations serious about reducing their risk, the report reinforces several urgent priorities. Patch management needs to be treated as a continuous, high-priority process rather than a periodic maintenance task. Security and networking devices require the same rigorous attention as the systems they protect. And HR and operational software platforms, which sit at the heart of corporate data ecosystems, deserve far more scrutiny than they typically receive.

Perhaps most importantly, the surge in enterprise zero-day attacks is a reminder that cybersecurity is not a problem that gets solved once and stays solved. The threat landscape evolves constantly — and in 2025, it evolved squarely in the direction of the enterprise.

The organizations that will weather this era best are those that treat security as an ongoing investment rather than a compliance checkbox. Because the attackers tracking down enterprise zero-days are certainly treating it like a full-time job.

Stay informed on the latest enterprise cybersecurity developments and zero-day vulnerability disclosures by following trusted security research publications and subscribing to your vendors' security advisories.

Comments