Blogs

The 20 most targeted technologies | February

Product

The 20 most targeted technologies | February

The 20 most targeted technologies | February

Jake Trujillo

Feb 24, 2025

In the ever-evolving cybersecurity landscape, staying ahead of threats is critical. That’s why Fletch crawls, ranks, and trends threat articles, blogs, and forums to pinpoint the technologies most targeted by adversaries. Our trusted platform uses correlated intelligence from reliable sources to identify threats being exploited right now.

By simplifying the noise and advising you on what to do and what to say in your day to day work, Fletch empowers organizations and individuals to stay one step ahead of cybercriminals. Here’s what you need to know about the top twenty most targeted technologies over the past 30 days:


1. Microsoft Windows

Microsoft Windows remains a perennial target due to its widespread use in enterprises and homes. Attackers exploit vulnerabilities in its operating system to distribute malware, execute ransomware attacks, and more.

Threats over the last 30 days: 75

Top threats affecting Microsoft Windows

2. Linux Distributions

While Linux is known for its robust security, its distributions are increasingly targeted by advanced persistent threat (APT) groups and ransomware campaigns.

Threats over the last 30 days: 20

Top threats affecting Linux Distributions

3. Apple Ecosystem

With the growing popularity of Apple’s ecosystem, cybercriminals continue to target macOS, iOS, and related applications through phishing and zero-day vulnerabilities.

Threats over the last 30 days: 17

Top threats affecting Apple Ecosystem

4. Microsoft Office

Cybercriminals continue to leverage macros and other features in Office applications to spread malicious payloads and phishing campaigns.

Threats over the last 30 days: 12

Top threats affecting Microsoft Office

5. Google Android

Android devices face numerous threats, including malicious apps and vulnerabilities in the operating system. Ensure your devices are updated regularly.

Threats over the last 30 days: 11

Top threats affecting Google Android

6. VMware Technologies

VMware virtualization and cloud solutions have been a focus for attackers looking to exploit vulnerabilities in enterprise environments.

Threats over the last 30 days: 8

Top threats affecting VMware Technologies

7. Ivanti Products

Ivanti’s endpoint and service management tools have been under scrutiny, with attackers leveraging vulnerabilities to compromise corporate networks.

Threats over the last 30 days: 8

Top threats affecting Ivanti Products

8. Palo Alto Networks

As a leader in network security, Palo Alto’s products are often in the crosshairs of attackers seeking to bypass sophisticated defenses.

Threats over the last 30 days: 6

Top threats affecting Palo Alto Networks

9. Fortinet Technologies

Fortinet’s security products are often targeted by attackers attempting to exploit configuration errors or vulnerabilities to bypass defenses.

Threats over the last 30 days: 6

Top threats affecting Fortinet Technologies

10. WordPress Related Technologies and Plugins

WordPress powers a significant portion of websites globally, making it a favorite target. Unpatched plugins and outdated versions remain the primary entry points for attackers.

Threats over the last 30 days: 5

Top threats affecting WordPress Related Technologies and Plugins

11. Google Chrome

Chrome’s ubiquity makes it a prime target for browser-based exploits and phishing campaigns aimed at stealing credentials.

Threats over the last 30 days: 5

Top threats affecting Google Chrome

12. Cisco Technologies

Cisco’s hardware and software solutions are critical infrastructure components, making them prime targets for cyberattacks seeking to disrupt operations.

Threats over the last 30 days: 4

Top threats affecting Cisco Technologies

13. AMD Technologies

AMD’s processors and hardware components are increasingly under attack as cybercriminals seek to exploit firmware and hardware vulnerabilities.

Threats over the last 30 days: 4

Top threats affecting AMD Technologies

14. SonicWall Technologies

SonicWall security solutions, including firewalls and VPNs, continue to be targeted by attackers looking to exploit misconfigurations and vulnerabilities.

Threats over the last 30 days: 3

Top threats affecting SonicWall Technologies

15. ABB Power and Control Systems

ABB's industrial power and automation solutions have become a target for cybercriminals aiming to disrupt critical infrastructure.

Threats over the last 30 days: 3

Top threats affecting ABB Power and Control Systems

16. Rockwell Automation Group

Rockwell Automation technologies are increasingly targeted by attackers seeking to compromise industrial control systems.

Threats over the last 30 days: 3

Top threats affecting Rockwell Automation Group

17. JavaScript Ecosystem

From libraries to frameworks, the JavaScript ecosystem is frequently exploited. Supply chain attacks targeting dependencies remain a growing concern.

Threats over the last 30 days: 3

Top threats affecting JavaScript Ecosystem

18. PHP Technologies

PHP-based web applications, often the backbone of many websites, are frequent targets for attackers exploiting code injection vulnerabilities.

Threats over the last 30 days: 3

Top threats affecting PHP Technologies

19. Microsoft Azure Services

PHP-based web applications, often the backbone of many websites, are frequent targets for attackers exploiting code injection vulnerabilities.

Threats over the last 30 days: 2

Top threats affecting Microsoft Azure Services

20. Mitel Suite

PHP-based web applications, often the backbone of many websites, are frequent targets for attackers exploiting code injection vulnerabilities.

Threats over the last 30 days: 2

Top threats affecting Mitel Suite


To stay informed about the threats targeting the technologies you care about, prioritized in real time within the context of the entire threat landscape, sign up for the Fletch waitlist today

Source: Fletch internal data January 25th to February 24th

See how much time you can save

Fletch gives cybersecurity professionals a prioritized list of critical tasks to start their day. Each task is correlated to and mitigates multiple alerts and threats, targeting several resources.

Join the private beta

See how much time you can save

Fletch gives cybersecurity professionals a prioritized list of critical tasks to start their day. Each task is correlated to and mitigates multiple alerts and threats, targeting several resources.

Join the private beta

See how much time you can save

Fletch gives cybersecurity professionals a prioritized list of critical tasks to start their day. Each task is correlated to and mitigates multiple alerts and threats, targeting several resources.

Join the private beta

See how much time you can save

Fletch gives cybersecurity professionals a prioritized list of critical tasks to start their day. Each task is correlated to and mitigates multiple alerts and threats, targeting several resources.

Join the private beta

See how much time you can save

Fletch gives cybersecurity professionals a prioritized list of critical tasks to start their day. Each task is correlated to and mitigates multiple alerts and threats, targeting several resources.

Join the private beta