Blogs

The 20 most targeted technologies | December

Product

The 20 most targeted technologies | December

The 20 most targeted technologies | December

Jake Trujillo

Dec 18, 2024

In the ever-evolving cybersecurity landscape, staying ahead of threats is critical. That’s why Fletch crawls, ranks, and trends threat articles, blogs, and forums to pinpoint the technologies most targeted by adversaries. Our trusted platform correlates intelligence from reliable sources to identify threats being exploited right now.

By simplifying the noise and advising you on what to do and what to say in your day to day work, Fletch empowers organizations and individuals to stay one step ahead of cybercriminals. Here’s what you need to know about the top twenty most targeted technologies over the past 30 days:



  1. Microsoft Windows

As the most widely used operating system globally, Windows remains a prime target for attackers. Exploits often target unpatched vulnerabilities, making it essential to prioritize updates and monitor for emerging threats.

Threats over the last 30 days: 80

Top threats affecting Microsoft Windows


  1. Google Android

Android’s open ecosystem and vast user base make it a prime target for attackers. Threats such as malware, phishing, and trojans—including the recently surfaced AppLite Banker—aim to steal credentials and enable remote access.

Threats over the last 30 days: 17

Top threats affecting Google Android


  1. Apple Ecosystem

Although often considered more secure, Apple devices are not immune to attacks. Exploits targeting macOS, iOS, and associated apps are increasing, often delivered through sophisticated social engineering campaigns.

Threats over the last 30 days: 16

Top threats affecting Apple Ecosystem


  1. Linux Distributions

Linux’s flexibility and ubiquity in enterprise environments make it an attractive target for advanced persistent threats (APTs), ransomware campaigns, and more. Attackers exploit vulnerabilities in unprotected servers or containers.

Threats over the last 30 days: 14

Top threats affecting Linux Distributions


  1. WordPress-Related Technologies and Plugins

WordPress powers over 40% of the web, and its third-party plugins are often exploited to gain unauthorized access. Routine updates and plugin vetting are crucial for website security.

Threats over the last 30 days: 12

Top threats affecting WordPress-Related Technologies and Plugins


  1. Fortinet Technologies

Firewalls and VPNs from Fortinet are critical infrastructure for many organizations, and attackers aggressively exploit any discovered vulnerabilities. Applying patches immediately is vital.

Threats over the last 30 days: 9

Top 10 threats affecting Fortinet Technologies


  1. Cisco Technologies

Routers, switches, and enterprise network devices from Cisco continue to be high-value targets for attackers seeking to disrupt or gain access to critical network infrastructures.

Threats over the last 30 days: 8

Top threats affecting Cisco Technologies


  1. Microsoft Office

Phishing campaigns frequently exploit macros or malicious document attachments to deliver malware. Awareness training and email filtering are essential defense mechanisms.

Threats over the last 30 days: 8

Top 10 threats affecting Microsoft Office


  1. VMware Technologies

Virtual environments managed by VMware are a growing target, especially for ransomware groups that exploit vulnerabilities to gain control of critical systems.

Threats over the last 30 days: 7

Top threats affecting VMware Technologies


  1. TP-Link Routers

Home and small business routers are often the weakest link in security chains. Exploits targeting default credentials and unpatched firmware underscore the need for proactive management.

Threats over the last 30 days: 5

Top threats affecting TP-Link Routers


  1. Mozilla Products

Mozilla's Firefox browser and associated technologies have seen increased targeting due to unpatched vulnerabilities and plugins. Regular updates are essential for mitigating risks.

Threats over the last 30 days: 5

Top threats affecting Mozilla Products


  1. Google Chrome

As the most widely used browser, Chrome is a major target for attackers who exploit zero-day vulnerabilities to deliver malicious payloads or steal sensitive data.

Threats over the last 30 days: 5

Top threats affecting Google Chrome


  1. Microsoft Azure Services

Cloud platforms like Azure are being targeted for misconfigurations and vulnerabilities. Secure identity management and monitoring are critical for protecting cloud assets.

Threats over the last 30 days: 4

Top threats affecting Microsoft Azure Services


  1. Netgear Products

Netgear routers and devices are frequently targeted, especially those running outdated firmware. Attackers exploit weak configurations to gain network access.

Threats over the last 30 days: 4

Top threats affecting Netgear Products


  1. SonicWall Technologies

SonicWall firewalls and VPN solutions are popular targets for ransomware groups. Prompt patching and monitoring of security advisories are necessary.

Threats over the last 30 days: 3

Top threats affecting SonicWall Technologies


  1. PHP Technologies

PHP remains a staple in web development, making it a frequent target for attackers exploiting insecure code and unpatched vulnerabilities in CMS platforms.

Threats over the last 30 days: 3

Top threats affecting PHP Technologies


  1. Veeam Products

Backup and recovery solutions like Veeam are critical targets for ransomware actors looking to disable recovery mechanisms and pressure organizations to pay.

Threats over the last 30 days: 3

Top threats affecting Veeam Products


  1. Zyxel Products

Network devices from Zyxel have been under increased scrutiny as attackers exploit firmware vulnerabilities and weak authentication controls.

Threats over the last 30 days: 3

Top threats affecting Zyxel Products


  1. Zabbix

Zabbix, a popular open-source monitoring tool, is targeted for privilege escalation and lateral movement within enterprise networks. Securing configurations is key.

Threats over the last 30 days: 3

Top threats affecting Zabbix


  1. Palo Alto Networks                                                                          

Firewalls and security tools from Palo Alto Networks are critical infrastructure that attackers aggressively target to bypass defenses or disable protections.

Threats over the last 30 days: 3

Top threats affecting Palo Alto Networks


To stay informed about the threats targeting the technologies you care about, prioritized in real time within the context of the entire threat landscape, create your free Fletch account today

Source: Fletch internal data November 17th to December 18th

See how much time you can save

Fletch surfaces the 5% of threats that matter to you right now. You’ll have every detail about the threat, what to do about it and what to say. 

Get API access

See how much time you can save

Fletch surfaces the 5% of threats that matter to you right now. You’ll have every detail about the threat, what to do about it and what to say. 

Get API access

See how much time you can save

Fletch surfaces the 5% of threats that matter to you right now. You’ll have every detail about the threat, what to do about it and what to say. 

Get API access

See how much time you can save

Fletch surfaces the 5% of threats that matter to you right now. You’ll have every detail about the threat, what to do about it and what to say. 

Get API access

See how much time you can save

Fletch surfaces the 5% of threats that matter to you right now. You’ll have every detail about the threat, what to do about it and what to say. 

Get API access