cxo voice
  • Home
  • Technology
    • AI
    • Cloud
    • Telecom
    • Data Center
    • BPM
    • Blockchain
  • Finance
    • Banking
  • Cyber Security
  • View Points
  • Leaders Talk
  • News
  • Press Release
    • Submit Press Release
No Result
View All Result
  • Home
  • Technology
    • AI
    • Cloud
    • Telecom
    • Data Center
    • BPM
    • Blockchain
  • Finance
    • Banking
  • Cyber Security
  • View Points
  • Leaders Talk
  • News
  • Press Release
    • Submit Press Release
No Result
View All Result
Leaders Talk and Latest Tech News | CXO VOICE
No Result
View All Result
Home News Cyber Security

Hackers targeted Google, Microsoft products via zero-day exploitation in 2022: Report

IANS by IANS
May 6, 2023
Zero click attacks

Researchers have tracked 55 zero-day vulnerabilities that were exploited in 2022 by the hackers, most targeting Microsoft, Google and Apple products, a new report has shown.

According to information security company Mandiant, products of Microsoft, Google and Apple made up the majority of zero-day vulnerabilities in 2022, consistent with the previous years, and the most exploited product types were operating systems (19), followed by browsers (11), security, IT, and network management products (10), and mobile OS (six).

Zero-day vulnerabilities are security flaws in software that are publicly disclosed or exploited before a developer is aware of it or releases a fix.

They are extremely valuable to hackers because exploiting them is simple and stealthy because there are no protection measures or specific monitoring to track and stop the attacks.

In terms of the targeted products, Windows was hit with 15 zero-day flaws in 2022, followed by Chrome with nine actively exploited flaws, iOS with five zero-day flaws, and macOS with four zero-day flaws.

The report said that the Chinese state-sponsored cyber espionage groups exploited more zero-days than other cyber espionage actors in 2022, which is consistent with the previous years.

ADVERTISEMENT

Threat actors exploited 80 zero-day flaws in various products to perform security breaches in 2021, indicating a slight decrease from the previous year.

About four zero-day vulnerabilities were exploited by financially motivated threat actors, with 75 per cent of these instances appearing to be linked to ransomware operations.

The report said that cyber-espionage groups exploited 13 of the 55 zero-day flaws exploited in 2022, while Chinese cyberspies leveraged seven.

IANS

IANS

For any query, [email protected]

Related Posts

Sophos Cyber Insurance f
Cyber Security

Unlocking Cyber Resilience: Sophos and Capsule Partner to Simplify Cyber Insurance for Businesses

May 21, 2025
Online Scams
Cyber Security

Airtel Launches AI-Powered Security Solution to Protect Customers from Online Scams

May 16, 2025
Secure Browsers
Cyber Security

The Rise of Secure Enterprise Browsers (SEBs): A Game Changer for Remote Work and Endpoint Security by 2028

April 29, 2025
Palo Alto Protect AI
Cyber Security

Palo Alto Networks to Acquire Protect AI, Amplifying AI Security Solutions

April 29, 2025
F-Secure and Orange
Cyber Security

F-Secure teams up with Orange to help protect consumers from online threats and scams

April 24, 2025
Attackers
Cyber Security

Most Attackers Logged In Instead of Breaking In: Sophos Report

April 3, 2025
Vodafone IBM
Cyber Security

Vodafone and IBM Collaborate to Strengthen Smartphone Security with Quantum-Safe Cryptography

March 3, 2025
Verizon Accenture
Cyber Security

Verizon and Accenture Forge Strategic Alliance to Develop Advance Cybersecurity Solutions for Businesses

March 3, 2025
Load More
ADVERTISEMENT

Latest Updates

Infosys and LogicMonitor

Infosys and LogicMonitor Join Forces to Revolutionize IT Monitoring with AI-Driven Solutions

by Deepa Sharma
3 hours ago

The Acer Nitro Intel Arc B580 OC 12GB

Acer Launches Next-Gen Nitro Graphics Cards for Gamers and Creators

by Deepa Sharma
16 hours ago

Airtel Google Storage

Airtel and Google Launch 100 GB Free Cloud Storage for Postpaid Customers with Google One

by Deepa Sharma
22 hours ago

AI in Public Sector

How AI is Transforming Public Sector Service: Report

by Deepa Sharma
23 hours ago

Sophos Cyber Insurance f

Unlocking Cyber Resilience: Sophos and Capsule Partner to Simplify Cyber Insurance for Businesses

by Deepa Sharma
1 day ago

Asus Graphics Cards

ASUS Unveils New Radeon RX 9060 XT Graphics Cards: Power, Performance, and Compact Design for Every Gamer

by Deepa Sharma
1 day ago

Expert Views

Opinion

When AI Empowers Both Networks and Hackers: The New Battlefield for India’s Telecoms

May 20, 2025
Molly Sands AI
AI

AI RIP: 5 Things Knowledge Workers Will Say ‘Sayonara’ to in the Next Decade

March 8, 2025
multi cloud
Cloud

Multi-Cloud Made Simple: Strategies for Smart Business Management

March 5, 2025
Soft Skills
Opinion

Soft Skills and Technical Know-How: A Winning Combination in the Tech Industry

March 4, 2025
Digital Freedom
Cyber Security

Your Data, Their Gold: The Silent Battle for Digital Freedom

February 25, 2025

Get Latest Update

Subscribe to our mailing list to receives newsletter direct to your inbox!

ADVERTISEMENT

Leaders Interviews

Steve Wilson, GenAI Cybersecurity LLMs
Cyber Security

How effective is GenAI in cybersecurity? The role of LLMs and AI in security solutions. [Interview with Steve Wilson]

-
Interview on Counterfeit products with Nikhil Narayan
Leaders Talk

Advancements in ML & AI made it possible to detect counterfeit products in real-time, says Nikhil Narayan

-
Newgenone bridges the gap between business users and IT teams with its low code capability: Varun Goswami
Leaders Talk

Newgenone bridges the gap between business users and IT teams with its low code capability: Varun Goswami

-
AI chatbots, Prasanna-Kumar
Leaders Talk

Can AI chatbots enhance customer experience and reduce the cost of serving customers?

-

Entrepreneur

Samsung Electronics appoints its first female president

Inspiring Women Entrepreneurs in India (2022)

Technology Adoption For Entrepreneurs

Volunteering management is the need of the Hour

CXOVoice.com is a leading online publication for CXOs, entrepreneurs, senior leaders, developers, and industry professionals. Our coverage spans key sectors, including IT, technology, banking, finance, cybersecurity, engineering, and automobiles.

Connect with us

Easy Links

  • Cryptocurrency
  • Event
  • Blockchain
  • Press Release
  • Resources & Downloads

Write Us

[email protected]
  • Home
  • About Us
  • Contact Us
  • Advertise
  • Privacy & Policy
  • Feedback

Copyright © 2025 CXOVoice - All Right Reserved

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Add New Playlist

Our Spring Sale Has Started

You can see how this popup was set up in our step-by-step guide: https://wppopupmaker.com/guides/auto-opening-announcement-popups/

No Result
View All Result
  • Home
  • Technology
    • AI
    • Cloud
    • Telecom
    • Data Center
    • BPM
    • Blockchain
  • Finance
    • Banking
  • Cyber Security
  • View Points
  • Leaders Talk
  • News
  • Press Release
    • Submit Press Release

Copyright © 2025 CXOVoice - All Right Reserved