- T-Mobile's data breach settlement payments finally rolling out this month - after April delay
- Cisco unveils prototype quantum networking chip
- What’s Next for MCP Security? | Docker
- Zero Trust: Begin your journey with these first steps
- Ready to ditch Windows for good? This is the Linux distro I recommend for beginners
Network and security vulnerabilities linked to 60% of zero-day cyberattacks

According to Casey Charrier, senior analyst at GTIG: “Zero-day exploitation continues to grow at a slow but steady pace. However, we have also started to see vendors’ work to mitigate zero-day exploitation begin to pay off. For example, we have seen fewer instances of zero-day exploitation targeting products that have been historically popular, likely due to the efforts and resources that many large vendors have invested to prevent exploitation.”
“At the same time,” he adds, “we are seeing zero-day exploitation increasingly targeting enterprise-centric products, which requires a broader and more diverse set of vendors to increase proactive security measures. The future of zero-day exploitation will ultimately be dictated by the decisions of vendors and their ability to counter the goals and pursuits of threat actors.”
This article originally appeared on Computerworld Spain.