What’s Google’s report on Cyber attacks about which CEO Sundar Pichai has expressed his satisfaction. Know More Over Here
While expressing a happiness about new report by Google’s Threat Analysis Group (TAG) and Mandiant, Google CEO Sundar Pichai said in a post on X New report from our Threat Analysis Group + Mandiant observed 97 zero-day vulnerabilities exploited in the wild in 2023, up 50% from 2022.”
Advertising
Advertising
Google recently revealed a report, which observed 97 zero-day vulnerabilities exploited in-the-wild which is over 50 percent more than in 2022, but still less than 2021’s record of 106. Google published its fifth annual review ‘A review of zero-day in-the-wild exploits in 2023′ report’
“Good news: investments are making a difference – vulnerabilities once common are virtually non-existent today,” Sundar Pichai added.
Also Read
What Is A Zero-Day Attack?
There could be unpatched security flaws in computer software, hardware, or firmware. Cyber attackers find such loopholes in the software to launch an attack which is called as A zero-day attack.
What Are Google’s Zero-Day In-The-Wild Exploits Reports Findings ?
In the report, We’re All in this Together: A Year in Review of Zero-Days Exploited In-the-Wild in 2023,” released by Google to find out zero-days that were actively exploited against both end-user platforms and products (e.g. mobile devices, operating systems, browsers, and other applications) and enterprise-focused technologies such as security software and appliances.
- Google’s MiraclePtr & Apple’s introduction of Lockdown mode for iOS, prevents exploitation of use-after-free vulnerabilities in Chrome and halt many exploit chains used in-the-wild.
- Report found that Zero-day vulnerabilities in third party components and libraries were a prime attack surface in 2023.
- Adversary exploitation of enterprise-specific technologies in 2023, increased by a 64 percent in the total number of vulnerabilities as compared to the previous year.
Recommendations In The Google Report
- Industry should bring more transparency and disclosure about such attacks and share lessons and patches publicly.
- Organizations need to build defensive strategies that prioritize threats that are most likely to cause damage to themselves and others.
- Build strong security foundations so the attackers can’t be successful with simpler attacks.
- While designing the product, Software and product vendors should prepare the response when in-the-wild zero-day is discovered targeting their product.
- For high risk users like iPhone users or Memory Tagging Extensions (MTE) who use a Pixel 8, can enable Lockdown mode.
Published Date:April 2, 2024 1:09 PM IST
Updated Date:April 2, 2024 1:09 PM IST