Reviewing Google's 2024 Zero Day Report

The 2024 Zero Day report has been released by Google’s threat intelligence group.

If you’re crunched for time, feel free to take the below as your TL;DR. If you have some time, then I suggest skipping over the beginning where the report uses data to draw such dramatic conclusions as “More hamburgers are consumed in areas with higher population density!” In other words, the companies and technologies being targeted are the ones in use by the most people, and there were no callouts regarding divergent ratios.

Highlights

Some things that stood out to me:

The report includes a couple “Spotlights”, one being the acquisition of a user’s browser cookies and the other being local privesc through a browser exploit chain by the CIGAR threat actor. These are both quality reports and your threat hunting and incident response teams should read them.

Conclusion

Finally, the report closes with some broad advice about how to defend against attacks that are –by their very nature– unknown. First is to digest reports like these 🤨 and the other is to keep an eye out for emerging popular tech. After all, the creation of 0-days is time-consuming and costly, so no one is spending time on something used by a few thousand people. I’d keep an eye on tech that both new and has a steep adoption curve, since the developers and security teams behind these products have not had the time to develop robust security engineering practices or deploy defense-in-depth technologies.