WaterISAC Navigation
  • About
  • Report Incident
  • Contact Us
  • Become a Member
  • NRWA Signup
  • WaterISAC Champions
  • About
  • Report Incident
  • Contact Us
  • Become a Member
  • NRWA Signup
  • WaterISAC Champions
Home Community Partnerships Report – Google and Mandiant Report Show Zero-Day Trends Exploited In-the-Wild
Become a Member

Log in

  • Upcoming Events
  • Resource Center
  • Tools
  • Webcasts
  • Contaminant Databases
  • Directory
  • About
  • Log in

  • My Account

  • Logout

  • Report Incident
  • Contact Us
  • NRWA Signup
  • WaterISAC Champions
More Resources

Report – Google and Mandiant Report Show Zero-Day Trends Exploited In-the-Wild

Author: Chase Snow

Created: Thursday, March 28, 2024 - 17:37

Categories: Cybersecurity, Security Preparedness

Google’s Threat Analysis Group (TAG) and Mandiant produced a first-ever joint report that digs into the zero-day vulnerabilities that were exploited in 2023 to better understand threat actor behavior and key trends. The report shows 97 zero-day vulnerabilities were exploited in 2023, 50 percent more than the 62 in 2022, but slightly less than the 106 peak in 2021. It also focuses on two main categories of vulnerabilities: end-user platforms and products, and enterprise-focused technologies.

Some key zero-day findings from the report include:

  • Vendors’ security investments are working, making certain attacks harder.
  • Attacks increasingly target third-party components, affecting multiple products.
  • Enterprise targeting is rising, with more focus on security software and appliances.
  • Commercial surveillance vendors lead browser and mobile device exploits.
  • People’s Republic of China (PRC) remains the top state-backed exploiter of zero-days.
  • Financially-motivated attacks proportionally decreased.

These findings show an interesting shift in the zero-day landscape, with security investments into OS and software mitigations forcing attackers to find new attack surfaces and bug patterns. Attackers are focusing more on third-party components as well as targeting enterprise security software and appliances. For more information, visit Google or SecurityWeek.

Related Resources

Members Only

(TLP:AMBER+STRICT) Situation Report: Heightened Threat Environment – Potential Retaliation by Iranian Threat Actors Following U.S. Strikes on Iran (Updated May 1, 2026)

May 1, 2026 in Cybersecurity, OT-ICS Security, Physical Security, Security Preparedness

Tip of the Week – April 30, 2026

Apr 30, 2026 in Cybersecurity, Security Preparedness

(TLP:CLEAR) Cyber Readiness Institute Joins WaterISAC as a Community Partner to Strengthen Cyber Readiness Across the Water Sector

Apr 30, 2026 in Cybersecurity, Security Preparedness

Become a Member
FAQs
About
Report Incident

Terms & Conditions
Privacy Policy
AI Policy
Contact Us

LinkedIn

1250 I Street NW, Suite 350
Washington, DC 20005
1-866-H2O-ISAC (1-866-426-4722)
© 2026 WaterISAC. All Rights Reserved.

Toggle the Widgetbar