Microsoft Tops 2025 Zero-Day Exploit List with 25 Vulnerabilities: Google Report
Microsoft Leads 2025 Zero-Day Exploits: Google Report

Microsoft Emerges as Prime Target in 2025 Zero-Day Vulnerability Surge

In a stark revelation from Google's Threat Intelligence Group (GTIG), Microsoft has been identified as the most heavily targeted technology company during the year 2025. The comprehensive report highlights that a staggering 25 zero-day vulnerabilities were actively exploited against Microsoft's diverse product portfolio, underscoring a significant cybersecurity challenge for the tech giant.

Overall Zero-Day Landscape Shows Notable Increase

GTIG's meticulous tracking throughout 2025 documented a total of 90 zero-day vulnerabilities that were actively exploited by malicious actors. This figure represents a substantial 15% increase compared to the 78 zero-days recorded in the previous year, 2024. However, it is important to note that this number remains below the all-time high of 100 zero-day exploits set back in 2023, indicating a fluctuating but persistent threat environment.

Understanding the Critical Nature of Zero-Day Flaws

A zero-day vulnerability is defined as a critical security weakness within software that is discovered and leveraged by attackers before the software's developer becomes aware of its existence. These flaws are highly prized in the cybercriminal underworld because they provide a window of opportunity to infiltrate systems, execute malicious code from a remote location, or gain unauthorized elevated access to sensitive and confidential data without any prior defensive measures in place.

Wide Pickt banner — collaborative shopping lists app for Telegram, phone mockup with grocery list

Operating Systems Bear the Brunt of Attacks

According to the detailed findings from Google's report, the 90 tracked zero-days in 2025 were strategically split between two primary categories. A total of 47 vulnerabilities targeted everyday consumer products, with a heavy focus on widely used operating systems such as Microsoft Windows, Google's Android, and Apple's iOS, as well as popular web browsers including Microsoft Edge and Google Chrome.

Conversely, 43 zero-days were directed at enterprise-grade software utilized by businesses and large organizations. The report explicitly states that operating systems constituted the most heavily exploited category overall. Attackers deployed 24 zero-days specifically against desktop operating systems and an additional 15 against mobile platforms, highlighting the pervasive risk across device types.

Enterprise Systems and Shifting Browser Threats

On the enterprise front, the most frequently targeted systems included critical infrastructure such as security appliances, Virtual Private Networks (VPNs), networking hardware, and virtualization platforms. These systems are particularly attractive to attackers because they often provide broad, privileged access to entire corporate networks and can be more challenging to monitor for anomalous or suspicious activities.

In a notable shift from previous years, web browsers experienced a significant reduction in targeting, with only eight zero-days recorded. Google's cybersecurity analysts propose that this decline could signal improved security hardening within browsers, making them more resistant to exploitation. However, they also cautiously note the possibility that hackers are simply becoming more adept at concealing their exploitation techniques, avoiding detection.

Vendor Rankings and Exploit Characteristics

The report provides a clear hierarchy of the most affected technology vendors in 2025. Following Microsoft at the top with 25 zero-day exploits, Google secured the second position with 11, and Apple followed with eight. Other notable companies included Cisco and Fortinet, each with four exploited vulnerabilities, and Ivanti and VMware, each with three.

The nature of the exploited flaws was diverse, encompassing remote code execution bugs, privilege escalation vulnerabilities, various injection attacks, and memory corruption issues. Alarmingly, memory safety problems alone were responsible for 35% of all the zero-days exploited throughout the year, pointing to a critical area for software development focus.

Pickt after-article banner — collaborative shopping lists app with family illustration

Geopolitical and Financial Motivations Behind Attacks

From a geopolitical perspective, the report indicates that hacking groups linked to China maintained their status as the most active state-sponsored threat actors. These groups exploited 10 zero-days in 2025, primarily targeting networking equipment and security appliances to potentially facilitate espionage or disruption.

Simultaneously, financially motivated cybercriminals emerged as a growing and formidable force, accounting for nine of the exploited zero-day flaws. This trend underscores the dual motivations of modern cyber threats, blending state-sponsored objectives with criminal profit-seeking activities.