Skip to article
Security Alert
Emergent Story mode

Now reading

Overview

1 / 12 3 min 5 sources Multi-Source
Sources

Story mode

Security AlertMulti-Source7 sections

Enterprise Security Under Siege: Zero-Days and Vulnerabilities Expose Weaknesses

Cisco patches critical firewall flaws as Google reports surge in zero-day exploits and browser security risks

Read
3 min
Sources
5 sources
Domains
2
Sections
7

What Happened In a concerning turn of events, Cisco has issued emergency patches for critical firewall vulnerabilities, Google has reported a significant increase in zero-day exploits, and a new report has exposed major...

Story state
Deep multi-angle story
Evidence
What Happened
Coverage
7 reporting sections
Next focus
Key Facts

Story step 1

Multi-Source

What Happened

In a concerning turn of events, Cisco has issued emergency patches for critical firewall vulnerabilities, Google has reported a significant increase...

Step
1 / 7

In a concerning turn of events, Cisco has issued emergency patches for critical firewall vulnerabilities, Google has reported a significant increase in zero-day exploits, and a new report has exposed major security blind spots in enterprise browser security. These developments underscore the growing threat landscape for enterprise security.

Cisco's latest patch release addresses 25 security advisories covering 48 individual CVEs, including two critical vulnerabilities in its Secure Firewall Management Center (FMC) Software. These flaws, rated 'perfect 10' for severity, relate to the platform's web management interface and give unauthenticated root access.

Meanwhile, Google's Threat Intelligence Group (GTIG) has reported a 15% increase in zero-day exploits, with 90 vulnerabilities actively exploited in 2025. The majority of these targeted enterprise software and appliances, highlighting the growing risk for businesses.

Continue in the field

Focused storyNearby context

Open the live map from this story.

Carry this article into the map as a focused origin point, then widen into nearby reporting.

Leave the article stream and continue in live map mode with this story pinned as your origin point.

  • Open the map already centered on this story.
  • See what nearby reporting is clustering around the same geography.
  • Jump back to the article whenever you want the original thread.
Open live map mode

Story step 2

Multi-Source

Why It Matters

The surge in zero-day exploits and critical vulnerabilities has significant implications for enterprise security. As threat actors continue to evolve...

Step
2 / 7

The surge in zero-day exploits and critical vulnerabilities has significant implications for enterprise security. As threat actors continue to evolve and adapt, organizations must prioritize secure-by-design practices and implement robust security measures to stay ahead of the threat curve.

"The proliferation of zero-day exploits and critical vulnerabilities underscores the need for a proactive approach to security," said a security expert. "Organizations must prioritize secure development practices, patch management, and threat intelligence to protect against these emerging threats."

Story step 3

Multi-Source

What Experts Say

The Coruna iOS exploit kit is a prime example of how high-end zero-day exploits can be repurposed and modified for malicious use. This highlights the...

Step
3 / 7
"The Coruna iOS exploit kit is a prime example of how high-end zero-day exploits can be repurposed and modified for malicious use. This highlights the need for a robust security posture that includes advanced threat detection and response capabilities." — Google Threat Intelligence Group

Story step 4

Multi-Source

Key Numbers

90: Number of zero-day vulnerabilities exploited in 2025, according to Google's Threat Intelligence Group 48: Number of individual CVEs addressed in...

Step
4 / 7
  • **90: Number of zero-day vulnerabilities exploited in 2025, according to Google's Threat Intelligence Group
  • **48: Number of individual CVEs addressed in Cisco's latest patch release
  • **25: Number of security advisories covered in Cisco's patch release
  • **15%: Increase in zero-day exploits reported by Google's Threat Intelligence Group
  • **2: Number of critical vulnerabilities in Cisco's Secure Firewall Management Center (FMC) Software

Story step 5

Multi-Source

Background

The escalating threat landscape for enterprise security is driven by the increasing sophistication of threat actors and the growing complexity of...

Step
5 / 7

The escalating threat landscape for enterprise security is driven by the increasing sophistication of threat actors and the growing complexity of technology ecosystems. As organizations continue to adopt new technologies and expand their digital footprints, they must prioritize security to protect against emerging threats.

Story step 6

Multi-Source

What Comes Next

As the threat landscape continues to evolve, organizations must prioritize secure-by-design practices, patch management, and threat intelligence to...

Step
6 / 7

As the threat landscape continues to evolve, organizations must prioritize secure-by-design practices, patch management, and threat intelligence to stay ahead of the curve. This includes implementing robust security measures, such as advanced threat detection and response capabilities, to protect against zero-day exploits and critical vulnerabilities.

Story step 7

Multi-Source

Key Facts

Who: Cisco, Google, and various threat actors What: Critical vulnerabilities, zero-day exploits, and browser security risks Impact: Significant risk...

Step
7 / 7
  • Who: Cisco, Google, and various threat actors
  • What: Critical vulnerabilities, zero-day exploits, and browser security risks
  • Impact: Significant risk to enterprise security and data protection

Source bench

Multi-Source

5 cited references across 2 linked domains.

References
5
Domains
2

5 cited references across 2 linked domains.

  1. Source 1 · Fulqrum Sources

    Cisco issues emergency patches for critical firewall vulnerabilities

  2. Source 2 · Fulqrum Sources

    Google says 90 zero-days were exploited in attacks last year

  3. Source 3 · Fulqrum Sources

    2026 Browser Data Reveals Major Enterprise Security Blind Spots

Open source workbench

Keep reporting

ContradictionsEvent arcNarrative drift

Open the deeper evidence boards.

Take the mobile reel into contradictions, event arcs, narrative drift, and the full source workspace.

  • Scan the cited sources and coverage bench first.
  • Open contradiction and narrative drift checks after the first read.
  • Revisit the core evidence in What Happened.
Open evidence boards

Stay in the reporting trail

Open the evidence boards, source bench, and related analysis.

Jump from the app-style read into the deeper workbench without losing your place in the story.

Open source workbenchBack to Security Alert
🔒 Security Alert

Enterprise Security Under Siege: Zero-Days and Vulnerabilities Expose Weaknesses

Cisco patches critical firewall flaws as Google reports surge in zero-day exploits and browser security risks

Thursday, March 5, 2026 • 3 min read • 5 source references

  • 3 min read
  • 5 source references

What Happened

In a concerning turn of events, Cisco has issued emergency patches for critical firewall vulnerabilities, Google has reported a significant increase in zero-day exploits, and a new report has exposed major security blind spots in enterprise browser security. These developments underscore the growing threat landscape for enterprise security.

Cisco's latest patch release addresses 25 security advisories covering 48 individual CVEs, including two critical vulnerabilities in its Secure Firewall Management Center (FMC) Software. These flaws, rated 'perfect 10' for severity, relate to the platform's web management interface and give unauthenticated root access.

Meanwhile, Google's Threat Intelligence Group (GTIG) has reported a 15% increase in zero-day exploits, with 90 vulnerabilities actively exploited in 2025. The majority of these targeted enterprise software and appliances, highlighting the growing risk for businesses.

Why It Matters

The surge in zero-day exploits and critical vulnerabilities has significant implications for enterprise security. As threat actors continue to evolve and adapt, organizations must prioritize secure-by-design practices and implement robust security measures to stay ahead of the threat curve.

"The proliferation of zero-day exploits and critical vulnerabilities underscores the need for a proactive approach to security," said a security expert. "Organizations must prioritize secure development practices, patch management, and threat intelligence to protect against these emerging threats."

What Experts Say

"The Coruna iOS exploit kit is a prime example of how high-end zero-day exploits can be repurposed and modified for malicious use. This highlights the need for a robust security posture that includes advanced threat detection and response capabilities." — Google Threat Intelligence Group

Key Numbers

  • **90: Number of zero-day vulnerabilities exploited in 2025, according to Google's Threat Intelligence Group
  • **48: Number of individual CVEs addressed in Cisco's latest patch release
  • **25: Number of security advisories covered in Cisco's patch release
  • **15%: Increase in zero-day exploits reported by Google's Threat Intelligence Group
  • **2: Number of critical vulnerabilities in Cisco's Secure Firewall Management Center (FMC) Software

Background

The escalating threat landscape for enterprise security is driven by the increasing sophistication of threat actors and the growing complexity of technology ecosystems. As organizations continue to adopt new technologies and expand their digital footprints, they must prioritize security to protect against emerging threats.

What Comes Next

As the threat landscape continues to evolve, organizations must prioritize secure-by-design practices, patch management, and threat intelligence to stay ahead of the curve. This includes implementing robust security measures, such as advanced threat detection and response capabilities, to protect against zero-day exploits and critical vulnerabilities.

Key Facts

  • Who: Cisco, Google, and various threat actors
  • What: Critical vulnerabilities, zero-day exploits, and browser security risks
  • Impact: Significant risk to enterprise security and data protection
Story pulse
Story state
Deep multi-angle story
Evidence
What Happened
Coverage
7 reporting sections
Next focus
Key Facts

What Happened

In a concerning turn of events, Cisco has issued emergency patches for critical firewall vulnerabilities, Google has reported a significant increase in zero-day exploits, and a new report has exposed major security blind spots in enterprise browser security. These developments underscore the growing threat landscape for enterprise security.

Cisco's latest patch release addresses 25 security advisories covering 48 individual CVEs, including two critical vulnerabilities in its Secure Firewall Management Center (FMC) Software. These flaws, rated 'perfect 10' for severity, relate to the platform's web management interface and give unauthenticated root access.

Meanwhile, Google's Threat Intelligence Group (GTIG) has reported a 15% increase in zero-day exploits, with 90 vulnerabilities actively exploited in 2025. The majority of these targeted enterprise software and appliances, highlighting the growing risk for businesses.

Why It Matters

The surge in zero-day exploits and critical vulnerabilities has significant implications for enterprise security. As threat actors continue to evolve and adapt, organizations must prioritize secure-by-design practices and implement robust security measures to stay ahead of the threat curve.

"The proliferation of zero-day exploits and critical vulnerabilities underscores the need for a proactive approach to security," said a security expert. "Organizations must prioritize secure development practices, patch management, and threat intelligence to protect against these emerging threats."

What Experts Say

"The Coruna iOS exploit kit is a prime example of how high-end zero-day exploits can be repurposed and modified for malicious use. This highlights the need for a robust security posture that includes advanced threat detection and response capabilities." — Google Threat Intelligence Group

Key Numbers

  • **90: Number of zero-day vulnerabilities exploited in 2025, according to Google's Threat Intelligence Group
  • **48: Number of individual CVEs addressed in Cisco's latest patch release
  • **25: Number of security advisories covered in Cisco's patch release
  • **15%: Increase in zero-day exploits reported by Google's Threat Intelligence Group
  • **2: Number of critical vulnerabilities in Cisco's Secure Firewall Management Center (FMC) Software

Background

The escalating threat landscape for enterprise security is driven by the increasing sophistication of threat actors and the growing complexity of technology ecosystems. As organizations continue to adopt new technologies and expand their digital footprints, they must prioritize security to protect against emerging threats.

What Comes Next

As the threat landscape continues to evolve, organizations must prioritize secure-by-design practices, patch management, and threat intelligence to stay ahead of the curve. This includes implementing robust security measures, such as advanced threat detection and response capabilities, to protect against zero-day exploits and critical vulnerabilities.

Key Facts

  • Who: Cisco, Google, and various threat actors
  • What: Critical vulnerabilities, zero-day exploits, and browser security risks
  • Impact: Significant risk to enterprise security and data protection

Coverage tools

Sources, context, and related analysis

Visual reasoning

How this briefing, its evidence bench, and the next verification path fit together

A server-rendered QWIKR board that keeps the article legible while showing the logic of the current read, the attached source bench, and the next high-value reporting move.

Cited sources

0

Reasoning nodes

3

Routed paths

2

Next checks

1

Reasoning map

From briefing to evidence to next verification move

SSR · qwikr-flow

Story geography

Where this reporting sits on the map

Use the map-native view to understand what is happening near this story and what adjacent reporting is clustering around the same geography.

Geo context
0.00° N · 0.00° E Mapped story

This story is geotagged, but the nearby reporting bench is still warming up.

Continue in live map mode

Coverage at a Glance

5 sources

Compare coverage, inspect perspective spread, and open primary references side by side.

Linked Sources

4

Distinct Outlets

2

Viewpoint Center

Not enough mapped outlets

Outlet Diversity

Very Narrow
0 sources with viewpoint mapping 0 higher-credibility sources 1 reference without direct URL
Coverage is still narrow. Treat this as an early map and cross-check additional primary reporting.

Coverage Gaps to Watch

  • Thin mapped perspectives

    Most sources do not have mapped perspective data yet, so viewpoint spread is still uncertain.

  • No high-credibility anchors

    No source in this set reaches the high-credibility threshold. Cross-check with stronger primary reporting.

Read Across More Angles

Source-by-Source View

Search by outlet or domain, then filter by credibility, viewpoint mapping, or the most-cited lane.

Showing 4 of 4 cited sources with links.

1 citation-only reference will appear once direct links are available.

Unmapped Perspective (4)

bleepingcomputer.com

Google says 90 zero-days were exploited in attacks last year

Open

bleepingcomputer.com

Unmapped bias Credibility unknown Dossier
bleepingcomputer.com

2026 Browser Data Reveals Major Enterprise Security Blind Spots

Open

bleepingcomputer.com

Unmapped bias Credibility unknown Dossier
csoonline.com

Cisco issues emergency patches for critical firewall vulnerabilities

Open

csoonline.com

Unmapped bias Credibility unknown Dossier
csoonline.com

Coruna iOS exploit kit moved from spy tool to mass criminal campaign in under a year

Open

csoonline.com

Unmapped bias Credibility unknown Dossier
Fact-checked Real-time synthesis Bias-reduced

This article was synthesized by Fulqrum AI from 5 trusted sources, combining multiple perspectives into a comprehensive summary. All source references are listed below.