Product
Jake Trujillo
Dec 18, 2024
In the ever-evolving cybersecurity landscape, staying ahead of threats is critical. That’s why Fletch crawls, ranks, and trends threat articles, blogs, and forums to pinpoint the technologies most targeted by adversaries. Our trusted platform correlates intelligence from reliable sources to identify threats being exploited right now.
By simplifying the noise and advising you on what to do and what to say in your day to day work, Fletch empowers organizations and individuals to stay one step ahead of cybercriminals. Here’s what you need to know about the top twenty most targeted technologies over the past 30 days:
As the most widely used operating system globally, Windows remains a prime target for attackers. Exploits often target unpatched vulnerabilities, making it essential to prioritize updates and monitor for emerging threats.
Threats over the last 30 days: 80
Top threats affecting Microsoft Windows
Android’s open ecosystem and vast user base make it a prime target for attackers. Threats such as malware, phishing, and trojans—including the recently surfaced AppLite Banker—aim to steal credentials and enable remote access.
Threats over the last 30 days: 17
Top threats affecting Google Android
Although often considered more secure, Apple devices are not immune to attacks. Exploits targeting macOS, iOS, and associated apps are increasing, often delivered through sophisticated social engineering campaigns.
Threats over the last 30 days: 16
Top threats affecting Apple Ecosystem
Linux’s flexibility and ubiquity in enterprise environments make it an attractive target for advanced persistent threats (APTs), ransomware campaigns, and more. Attackers exploit vulnerabilities in unprotected servers or containers.
Threats over the last 30 days: 14
Top threats affecting Linux Distributions
WordPress powers over 40% of the web, and its third-party plugins are often exploited to gain unauthorized access. Routine updates and plugin vetting are crucial for website security.
Threats over the last 30 days: 12
Top threats affecting WordPress-Related Technologies and Plugins
Firewalls and VPNs from Fortinet are critical infrastructure for many organizations, and attackers aggressively exploit any discovered vulnerabilities. Applying patches immediately is vital.
Threats over the last 30 days: 9
Top 10 threats affecting Fortinet Technologies
Routers, switches, and enterprise network devices from Cisco continue to be high-value targets for attackers seeking to disrupt or gain access to critical network infrastructures.
Threats over the last 30 days: 8
Top threats affecting Cisco Technologies
Phishing campaigns frequently exploit macros or malicious document attachments to deliver malware. Awareness training and email filtering are essential defense mechanisms.
Threats over the last 30 days: 8
Top 10 threats affecting Microsoft Office
Virtual environments managed by VMware are a growing target, especially for ransomware groups that exploit vulnerabilities to gain control of critical systems.
Threats over the last 30 days: 7
Top threats affecting VMware Technologies
Home and small business routers are often the weakest link in security chains. Exploits targeting default credentials and unpatched firmware underscore the need for proactive management.
Threats over the last 30 days: 5
Top threats affecting TP-Link Routers
Mozilla's Firefox browser and associated technologies have seen increased targeting due to unpatched vulnerabilities and plugins. Regular updates are essential for mitigating risks.
Threats over the last 30 days: 5
Top threats affecting Mozilla Products
As the most widely used browser, Chrome is a major target for attackers who exploit zero-day vulnerabilities to deliver malicious payloads or steal sensitive data.
Threats over the last 30 days: 5
Top threats affecting Google Chrome
Cloud platforms like Azure are being targeted for misconfigurations and vulnerabilities. Secure identity management and monitoring are critical for protecting cloud assets.
Threats over the last 30 days: 4
Top threats affecting Microsoft Azure Services
Netgear routers and devices are frequently targeted, especially those running outdated firmware. Attackers exploit weak configurations to gain network access.
Threats over the last 30 days: 4
Top threats affecting Netgear Products
SonicWall firewalls and VPN solutions are popular targets for ransomware groups. Prompt patching and monitoring of security advisories are necessary.
Threats over the last 30 days: 3
Top threats affecting SonicWall Technologies
PHP remains a staple in web development, making it a frequent target for attackers exploiting insecure code and unpatched vulnerabilities in CMS platforms.
Threats over the last 30 days: 3
Top threats affecting PHP Technologies
Backup and recovery solutions like Veeam are critical targets for ransomware actors looking to disable recovery mechanisms and pressure organizations to pay.
Threats over the last 30 days: 3
Top threats affecting Veeam Products
Network devices from Zyxel have been under increased scrutiny as attackers exploit firmware vulnerabilities and weak authentication controls.
Threats over the last 30 days: 3
Top threats affecting Zyxel Products
Zabbix, a popular open-source monitoring tool, is targeted for privilege escalation and lateral movement within enterprise networks. Securing configurations is key.
Threats over the last 30 days: 3
Firewalls and security tools from Palo Alto Networks are critical infrastructure that attackers aggressively target to bypass defenses or disable protections.
Threats over the last 30 days: 3
Top threats affecting Palo Alto Networks
To stay informed about the threats targeting the technologies you care about, prioritized in real time within the context of the entire threat landscape, create your free Fletch account today.
Source: Fletch internal data November 17th to December 18th