• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
Cyber Security News

Google: Record Year for Zero Days in 2021

You are here: Home / General Cyber Security News / Google: Record Year for Zero Days in 2021
April 21, 2022

Previous year noticed the optimum amount of zero-working day exploits due to the fact Google started monitoring them, but the raise is likely the outcome of improved detection and disclosure instead than elevated prison activity.

The tech giant’s Project Zero crew tracked 58 these exploits in 2021, far more than double the previous highest of 28 detected in 2015 and past year’s haul of 25.

Even so, this is not essentially a reflection of a lot more zero-working day exploits becoming utilised by risk actors but of scientists and sellers undertaking a much better career discovering and disclosing them, according to Project Zero security researcher Maddie Stone.

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


“With this record selection of in-the-wild zero days to assess we noticed that attacker methodology has not basically experienced to improve considerably from preceding yrs. Attackers are possessing achievement working with the identical bug designs and exploitation tactics and heading soon after the exact same attack surfaces,” she ongoing.

“When we appear over these 58 zero times employed in 2021, what we see in its place are zero times that are related to earlier and publicly regarded vulnerabilities. Only two zero days stood out as novel: 1 for the complex sophistication of its exploit and the other for its use of logic bugs to escape the sandbox.”

This signifies an chance for defenders, she argued. However, distributors can make matters even harder for threat actors by agreeing to publicly disclose when it appears a solution is becoming exploited in the wild, Stone additional.

Exploit samples or thorough specialized descriptions really should also be shared a lot more extensively by vendors and researchers, and there ought to be a greater exertion to minimize the range and affect of memory corruption bugs, she said.

“The goal is to power attackers to begin from scratch just about every time we detect one of their exploits: they’re pressured to find a complete new vulnerability, they have to make investments the time in studying and examining a new attack area, they must establish a brand name new exploitation approach,” Stone concluded.

“While we manufactured unique progress in detection and disclosure it has revealed us regions where by that can continue to increase.”


Some components of this report are sourced from:
www.infosecurity-magazine.com

Previous Post: «Cyber Security News Two-Thirds of Global Banks Report Surge in Destructive Attacks
Next Post: Five Eyes Agencies Issue Detailed Russian Cyber-Threat Warning Cyber Security News»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Zero-Click Agentic Browser Attack Can Delete Entire Google Drive Using Crafted Emails
  • Critical XXE Bug CVE-2025-66516 (CVSS 10.0) Hits Apache Tika, Requires Urgent Patch
  • Chinese Hackers Have Started Exploiting the Newly Disclosed React2Shell Vulnerability
  • Intellexa Leaks Reveal Zero-Days and Ads-Based Vector for Predator Spyware Delivery
  • “Getting to Yes”: An Anti-Sales Guide for MSPs
  • CISA Reports PRC Hackers Using BRICKSTORM for Long-Term Access in U.S. Systems
  • JPCERT Confirms Active Command Injection Attacks on Array AG Gateways
  • Silver Fox Uses Fake Microsoft Teams Installer to Spread ValleyRAT Malware in China
  • ThreatsDay Bulletin: Wi-Fi Hack, npm Worm, DeFi Theft, Phishing Blasts— and 15 More Stories
  • 5 Threats That Reshaped Web Security This Year [2025]

Copyright © TheCyberSecurity.News, All Rights Reserved.