Google’s security teams tracked a staggering 75 zero-day vulnerabilities actively exploited by attackers in 2024. These aren’t just theoretical weaknesses; these are critical flaws attackers found and used before software makers could even fix them, hitting targets around the world. What’s truly alarming from Google’s analysis is the significant shift in focus: a shocking 44% of these zero-days specifically targeted enterprise security products. Yes, the very tools designed to protect businesses became the entry point for attackers. This isn’t just a statistic; it is a harsh wake-up call for every organization relying on these products for their defense.
Think about that for a moment. Nearly half of the most dangerous, previously unknown software flaws attackers used last year opened doors directly into corporate networks through security software and appliances. This includes products you trust to guard your perimeter, manage access, and detect threats. It feels like a betrayal, a stark reminder that nothing in cybersecurity is truly immune.
Google’s Threat Intelligence Group (GTIG) laid out these findings, painting a clear picture of the evolving threat landscape. While the total number of zero-days tracked in 2024 (75) saw a decrease from the 98 observed in 2023, the proportion aimed at enterprise technology jumped significantly, from 37% to 44%. This surge is largely fueled by attackers specifically going after security and networking gear.
Why the focus on security products? It’s a strategic move by attackers. Compromising a security appliance or network device can provide a high level of access and control within an organization’s network, often without triggering immediate alarms. These products sit in critical positions, often with extensive permissions, making them a prime target for threat actors seeking to gain a foothold, move laterally, and ultimately achieve their objectives, whether espionage, financial gain, or disruption.
Out of the 33 enterprise-focused zero-days, a striking 20 hit security and networking products. This wasn’t a scattered approach; it shows a concentrated effort by attackers to undermine the very foundations of enterprise defense. We saw this play out with notable vulnerabilities exploited in products from major vendors like Ivanti, Palo Alto Networks, and Cisco. Attackers actively chained together multiple zero-days, demonstrating a willingness to invest resources for maximum impact. For instance, specific campaigns against Ivanti appliances used multiple zero-days to breach defenses.
While the targeting of enterprise security products surged, Google’s report did offer a glimmer of positive news on other fronts. Zero-day exploitation in browsers and mobile devices saw a noticeable decrease in 2024 compared to the previous year. This suggests that investments by major vendors in hardening these platforms and implementing better exploit mitigations are having a tangible effect. It is a testament to the ongoing arms race between defenders and attackers – when one area becomes harder to exploit, attackers shift their focus.
However, the decrease in end-user focused zero-days does not lessen the severity of the threat to enterprises. The attackers are not disappearing; they are simply re-targeting. And their new preferred targets are the high-value assets within corporate networks, accessible through the trusted security infrastructure.
The report highlights that cyber espionage actors, including state-sponsored groups and customers of commercial surveillance vendors, remain major players in zero-day exploitation. These groups possess significant resources and motivation to find and use these critical flaws. For the first time, Google observed North Korean actors exploiting the same volume of zero-days as China-backed groups, demonstrating a clear intent to use these capabilities for both espionage and financial gain.
The attackers’ playbook is adapting. They are moving beyond simply targeting end-users with phishing attempts or malware downloads. They are now directly attacking the core infrastructure that organizations rely on for protection. This requires a shift in defensive strategy for businesses. It is no longer enough to simply deploy security products; organizations must also prioritize patching and actively monitoring these critical systems for any signs of compromise.
The number of unique enterprise vendors targeted by zero-days in 2024 was 18. While slightly lower than the 22 seen in 2023, it remains higher than in years prior, indicating a broadening of the attack surface across the enterprise landscape. Companies like Microsoft, Google, and Apple were among the most targeted vendors overall, given the widespread use of their products, but the specific targeting of security and networking vendors underscores a calculated approach by attackers.
This report from Google serves as a stark reminder that the threat of zero-day exploits is real and present. It is not a theoretical problem confined to the realm of nation-state espionage; these capabilities are actively used against a wide range of targets. The increased focus on enterprise security products means that businesses must be more vigilant than ever.
For businesses, this means revisiting security strategies, prioritizing patching of security and networking devices, and enhancing monitoring capabilities to detect unusual activity within these critical systems. It also means demanding more transparency and faster patch releases from security vendors when zero-days are discovered and exploited. The security of the enterprise depends on the collective efforts of vendors and the organizations using their products.
The battle against zero-days is ongoing. While progress is being made in some areas, attackers are constantly adapting their tactics. The significant targeting of enterprise security products in 2024 shows where the front lines are now. It is a critical time for organizations to strengthen their defenses and be prepared for attacks that strike at the heart of their security infrastructure. Ignoring this trend leaves businesses dangerously exposed.


