Product
Jake Trujillo
Jan 23, 2025
In the ever-evolving cybersecurity landscape, staying ahead of threats is critical. That’s why Fletch crawls, ranks, and trends threat articles, blogs, and forums to pinpoint the technologies most targeted by adversaries. Our trusted platform correlates intelligence from reliable sources to identify threats being exploited right now.
By simplifying the noise and advising you on what to do and what to say in your day to day work, Fletch empowers organizations and individuals to stay one step ahead of cybercriminals. Here’s what you need to know about the top twenty most targeted technologies over the past 30 days:
Microsoft Windows remains a perennial target due to its widespread use in enterprises and homes. Attackers exploit vulnerabilities in its operating system to distribute malware, execute ransomware attacks, and more.
Threats over the last 30 days: 62
Top threats affecting Microsoft Windows
2. WordPress Related Technologies and Plugins
WordPress powers a significant portion of websites globally, making it a favorite target. Unpatched plugins and outdated versions remain the primary entry points for attackers.
Threats over the last 30 days: 12
Top threats affecting WordPress Related Technologies and Plugins
Fortinet’s security products are often targeted by attackers attempting to exploit configuration errors or vulnerabilities to bypass defenses.
Threats over the last 30 days: 9
Top threats affecting Fortinet Technologies
With the growing popularity of Apple’s ecosystem, cybercriminals continue to target macOS, iOS, and related applications through phishing and zero-day vulnerabilities.
Threats over the last 30 days: 9
Top threats affecting Apple Ecosystem
While Linux is known for its robust security, its distributions are increasingly targeted by advanced persistent threat (APT) groups and ransomware campaigns.
Threats over the last 30 days: 8
Top threats affecting Linux Distributions
Cybercriminals continue to leverage macros and other features in Office applications to spread malicious payloads and phishing campaigns.
Threats over the last 30 days: 7
Top threats affecting Microsoft Office
Android devices face numerous threats, including malicious apps and vulnerabilities in the operating system. Ensure your devices are updated regularly.
Threats over the last 30 days: 6
Top threats affecting Google Android
From libraries to frameworks, the JavaScript ecosystem is frequently exploited. Supply chain attacks targeting dependencies remain a growing concern.
Threats over the last 30 days: 6
Top threats affecting Javascript Ecosystem
Ivanti’s endpoint and service management tools have been under scrutiny, with attackers leveraging vulnerabilities to compromise corporate networks.
Threats over the last 30 days: 5
Top threats affecting Ivanti Products
Chrome’s ubiquity makes it a prime target for browser-based exploits and phishing campaigns aimed at stealing credentials.
Threats over the last 30 days: 5
Top threats affecting Google Chrome
IBM’s enterprise solutions, including cloud and hardware, face a variety of threats as attackers aim for high-value targets.
Threats over the last 30 days: 5
Top threats affecting IBM Technologies
Adobe’s software suite, including Acrobat and Photoshop, remains a target for attackers exploiting both new and existing vulnerabilities.
Threats over the last 30 days: 4
Top threats affecting Adobe Products
Atlassian tools like Jira and Confluence are essential for many organizations but have been targeted for both known and zero-day vulnerabilities.
Threats over the last 30 days: 4
Top threats affecting Atlassian Software Suite
DrayTek’s networking products are increasingly targeted by attackers aiming to exploit vulnerabilities in routers and other hardware.
Threats over the last 30 days: 4
Top threats affecting DrayTek Technologies
PHP-based web applications, often the backbone of many websites, are frequent targets for attackers exploiting code injection vulnerabilities.
Threats over the last 30 days: 4
Top threats affecting PHP Technologies
Juniper’s networking and security solutions have been under attack from advanced threat actors aiming to exploit critical vulnerabilities.
Threats over the last 30 days: 3
Top threats affecting Juniper Networks
Zyxel’s networking products are targeted by attackers looking to exploit firmware vulnerabilities and gain unauthorized access to networks.
Threats over the last 30 days: 3
Top threats affecting Zyxel Technologies
As a leader in network security, Palo Alto’s products are often in the crosshairs of attackers seeking to bypass sophisticated defenses.
Threats over the last 30 days: 3
Top threats affecting Palo Alto Networks
Cleo’s integration and data movement solutions have been targeted for vulnerabilities that can lead to data breaches and unauthorized access.
Threats over the last 30 days: 2
Top threats affecting Cleo Products
Cisco’s hardware and software solutions are critical infrastructure components, making them prime targets for cyberattacks seeking to disrupt operations.
Threats over the last 30 days: 2
Top threats affecting Cisco Technologies
To stay informed about the threats targeting the technologies you care about, prioritized in real time within the context of the entire threat landscape, create your free Fletch account today.
Source: Fletch internal data December 24th to January 23rd