Blogs

The 20 most targeted technologies | January

Product

The 20 most targeted technologies | January

The 20 most targeted technologies | January

Jake Trujillo

Jan 23, 2025

In the ever-evolving cybersecurity landscape, staying ahead of threats is critical. That’s why Fletch crawls, ranks, and trends threat articles, blogs, and forums to pinpoint the technologies most targeted by adversaries. Our trusted platform correlates intelligence from reliable sources to identify threats being exploited right now.

By simplifying the noise and advising you on what to do and what to say in your day to day work, Fletch empowers organizations and individuals to stay one step ahead of cybercriminals. Here’s what you need to know about the top twenty most targeted technologies over the past 30 days:


1. Microsoft Windows

Microsoft Windows remains a perennial target due to its widespread use in enterprises and homes. Attackers exploit vulnerabilities in its operating system to distribute malware, execute ransomware attacks, and more.

Threats over the last 30 days: 62

Top threats affecting Microsoft Windows


2. WordPress Related Technologies and Plugins

WordPress powers a significant portion of websites globally, making it a favorite target. Unpatched plugins and outdated versions remain the primary entry points for attackers.

Threats over the last 30 days: 12

Top threats affecting WordPress Related Technologies and Plugins


3. Fortinet Technologies

Fortinet’s security products are often targeted by attackers attempting to exploit configuration errors or vulnerabilities to bypass defenses.

Threats over the last 30 days: 9

Top threats affecting Fortinet Technologies


4. Apple Ecosystem

With the growing popularity of Apple’s ecosystem, cybercriminals continue to target macOS, iOS, and related applications through phishing and zero-day vulnerabilities.

Threats over the last 30 days: 9

Top threats affecting Apple Ecosystem


5. Linux Distributions

While Linux is known for its robust security, its distributions are increasingly targeted by advanced persistent threat (APT) groups and ransomware campaigns.

Threats over the last 30 days: 8

Top threats affecting Linux Distributions


6. Microsoft Office

Cybercriminals continue to leverage macros and other features in Office applications to spread malicious payloads and phishing campaigns.

Threats over the last 30 days: 7

Top threats affecting Microsoft Office


7. Google Android

Android devices face numerous threats, including malicious apps and vulnerabilities in the operating system. Ensure your devices are updated regularly.

Threats over the last 30 days: 6

Top threats affecting Google Android


8. JavaScript Ecosystem

From libraries to frameworks, the JavaScript ecosystem is frequently exploited. Supply chain attacks targeting dependencies remain a growing concern.

Threats over the last 30 days: 6

Top threats affecting Javascript Ecosystem


9. Ivanti Products

Ivanti’s endpoint and service management tools have been under scrutiny, with attackers leveraging vulnerabilities to compromise corporate networks.

Threats over the last 30 days: 5

Top threats affecting Ivanti Products


10. Google Chrome

Chrome’s ubiquity makes it a prime target for browser-based exploits and phishing campaigns aimed at stealing credentials.

Threats over the last 30 days: 5

Top threats affecting Google Chrome


11. IBM Technologies

IBM’s enterprise solutions, including cloud and hardware, face a variety of threats as attackers aim for high-value targets.

Threats over the last 30 days: 5

Top threats affecting IBM Technologies


12. Adobe Products

Adobe’s software suite, including Acrobat and Photoshop, remains a target for attackers exploiting both new and existing vulnerabilities.

Threats over the last 30 days: 4

Top threats affecting Adobe Products


13. Atlassian Software Suite

Atlassian tools like Jira and Confluence are essential for many organizations but have been targeted for both known and zero-day vulnerabilities.

Threats over the last 30 days: 4

Top threats affecting Atlassian Software Suite


14. DrayTek Technologies

DrayTek’s networking products are increasingly targeted by attackers aiming to exploit vulnerabilities in routers and other hardware.

Threats over the last 30 days: 4

Top threats affecting DrayTek Technologies


15. PHP Technologies

PHP-based web applications, often the backbone of many websites, are frequent targets for attackers exploiting code injection vulnerabilities.

Threats over the last 30 days: 4

Top threats affecting PHP Technologies


16. Juniper Networks

Juniper’s networking and security solutions have been under attack from advanced threat actors aiming to exploit critical vulnerabilities.

Threats over the last 30 days: 3

Top threats affecting Juniper Networks


17. Zyxel Technologies

Zyxel’s networking products are targeted by attackers looking to exploit firmware vulnerabilities and gain unauthorized access to networks.

Threats over the last 30 days: 3

Top threats affecting Zyxel Technologies


18. Palo Alto Networks

As a leader in network security, Palo Alto’s products are often in the crosshairs of attackers seeking to bypass sophisticated defenses.

Threats over the last 30 days: 3

Top threats affecting Palo Alto Networks


19. Cleo Products

Cleo’s integration and data movement solutions have been targeted for vulnerabilities that can lead to data breaches and unauthorized access.

Threats over the last 30 days: 2

Top threats affecting Cleo Products


20. Cisco Technologies

Cisco’s hardware and software solutions are critical infrastructure components, making them prime targets for cyberattacks seeking to disrupt operations.

Threats over the last 30 days: 2

Top threats affecting Cisco Technologies


To stay informed about the threats targeting the technologies you care about, prioritized in real time within the context of the entire threat landscape, create your free Fletch account today

Source: Fletch internal data December 24th to January 23rd

See how much time you can save

Fletch surfaces the 5% of threats most likely to impact you right now. You’ll have every detail about the threat, what to do about it and what to say. 

Sign up for the waitlist

See how much time you can save

Fletch surfaces the 5% of threats most likely to impact you right now. You’ll have every detail about the threat, what to do about it and what to say. 

Sign up for the waitlist

See how much time you can save

Fletch surfaces the 5% of threats most likely to impact you right now. You’ll have every detail about the threat, what to do about it and what to say. 

Sign up for the waitlist

See how much time you can save

Fletch surfaces the 5% of threats most likely to impact you right now. You’ll have every detail about the threat, what to do about it and what to say. 

Sign up for the waitlist

See how much time you can save

Fletch surfaces the 5% of threats most likely to impact you right now. You’ll have every detail about the threat, what to do about it and what to say. 

Sign up for the waitlist