Product

Jake Trujillo
Feb 24, 2025
In the ever-evolving cybersecurity landscape, staying ahead of threats is critical. That’s why Fletch crawls, ranks, and trends threat articles, blogs, and forums to pinpoint the technologies most targeted by adversaries. Our trusted platform uses correlated intelligence from reliable sources to identify threats being exploited right now.
By simplifying the noise and advising you on what to do and what to say in your day to day work, Fletch empowers organizations and individuals to stay one step ahead of cybercriminals. Here’s what you need to know about the top twenty most targeted technologies over the past 30 days:

1. Microsoft Windows
Microsoft Windows remains a perennial target due to its widespread use in enterprises and homes. Attackers exploit vulnerabilities in its operating system to distribute malware, execute ransomware attacks, and more.
Threats over the last 30 days: 75
Top threats affecting Microsoft Windows
2. Linux Distributions
While Linux is known for its robust security, its distributions are increasingly targeted by advanced persistent threat (APT) groups and ransomware campaigns.
Threats over the last 30 days: 20
Top threats affecting Linux Distributions
3. Apple Ecosystem
With the growing popularity of Apple’s ecosystem, cybercriminals continue to target macOS, iOS, and related applications through phishing and zero-day vulnerabilities.
Threats over the last 30 days: 17
Top threats affecting Apple Ecosystem
4. Microsoft Office
Cybercriminals continue to leverage macros and other features in Office applications to spread malicious payloads and phishing campaigns.
Threats over the last 30 days: 12
Top threats affecting Microsoft Office
5. Google Android
Android devices face numerous threats, including malicious apps and vulnerabilities in the operating system. Ensure your devices are updated regularly.
Threats over the last 30 days: 11
Top threats affecting Google Android
6. VMware Technologies
VMware virtualization and cloud solutions have been a focus for attackers looking to exploit vulnerabilities in enterprise environments.
Threats over the last 30 days: 8
Top threats affecting VMware Technologies
7. Ivanti Products
Ivanti’s endpoint and service management tools have been under scrutiny, with attackers leveraging vulnerabilities to compromise corporate networks.
Threats over the last 30 days: 8
Top threats affecting Ivanti Products
8. Palo Alto Networks
As a leader in network security, Palo Alto’s products are often in the crosshairs of attackers seeking to bypass sophisticated defenses.
Threats over the last 30 days: 6
Top threats affecting Palo Alto Networks
9. Fortinet Technologies
Fortinet’s security products are often targeted by attackers attempting to exploit configuration errors or vulnerabilities to bypass defenses.
Threats over the last 30 days: 6
Top threats affecting Fortinet Technologies
10. WordPress Related Technologies and Plugins
WordPress powers a significant portion of websites globally, making it a favorite target. Unpatched plugins and outdated versions remain the primary entry points for attackers.
Threats over the last 30 days: 5
Top threats affecting WordPress Related Technologies and Plugins
11. Google Chrome
Chrome’s ubiquity makes it a prime target for browser-based exploits and phishing campaigns aimed at stealing credentials.
Threats over the last 30 days: 5
Top threats affecting Google Chrome
12. Cisco Technologies
Cisco’s hardware and software solutions are critical infrastructure components, making them prime targets for cyberattacks seeking to disrupt operations.
Threats over the last 30 days: 4
Top threats affecting Cisco Technologies
13. AMD Technologies
AMD’s processors and hardware components are increasingly under attack as cybercriminals seek to exploit firmware and hardware vulnerabilities.
Threats over the last 30 days: 4
Top threats affecting AMD Technologies
14. SonicWall Technologies
SonicWall security solutions, including firewalls and VPNs, continue to be targeted by attackers looking to exploit misconfigurations and vulnerabilities.
Threats over the last 30 days: 3
Top threats affecting SonicWall Technologies
15. ABB Power and Control Systems
ABB's industrial power and automation solutions have become a target for cybercriminals aiming to disrupt critical infrastructure.
Threats over the last 30 days: 3
Top threats affecting ABB Power and Control Systems
16. Rockwell Automation Group
Rockwell Automation technologies are increasingly targeted by attackers seeking to compromise industrial control systems.
Threats over the last 30 days: 3
Top threats affecting Rockwell Automation Group
17. JavaScript Ecosystem
From libraries to frameworks, the JavaScript ecosystem is frequently exploited. Supply chain attacks targeting dependencies remain a growing concern.
Threats over the last 30 days: 3
Top threats affecting JavaScript Ecosystem
18. PHP Technologies
PHP-based web applications, often the backbone of many websites, are frequent targets for attackers exploiting code injection vulnerabilities.
Threats over the last 30 days: 3
Top threats affecting PHP Technologies
19. Microsoft Azure Services
PHP-based web applications, often the backbone of many websites, are frequent targets for attackers exploiting code injection vulnerabilities.
Threats over the last 30 days: 2
Top threats affecting Microsoft Azure Services
20. Mitel Suite
PHP-based web applications, often the backbone of many websites, are frequent targets for attackers exploiting code injection vulnerabilities.
Threats over the last 30 days: 2
Top threats affecting Mitel Suite
To stay informed about the threats targeting the technologies you care about, prioritized in real time within the context of the entire threat landscape, sign up for the Fletch waitlist today.
Source: Fletch internal data January 25th to February 24th