Blogs

The 20 most targeted technologies | March

Product

The 20 most targeted technologies | March

The 20 most targeted technologies | March

Jake Trujillo

Apr 4, 2025

Cybersecurity threats evolve rapidly, and staying informed is crucial for keeping your organization safe. Each month, we analyze the most targeted technologies to help you focus your defenses where they’re needed most. Here are the 20 technologies that were most targeted by cyber threats over the past 30 days, along with top advice to mitigate threats for each.


1. Microsoft Windows

Threat Overview: Exploits in the OS are commonly used to distribute malware and ransomware.

Top Advice: Apply patches regularly and use endpoint detection and response (EDR) tools.

Threats over the last 30 days: 96

Top threats affecting Microsoft Windows


2. Linux Distributions

Threat Overview: Targeted by APT groups and used in ransomware campaigns.

Top Advice: Harden system configurations and monitor for unauthorized access.

Threats over the last 30 days: 26

Top threats affecting Linux Distribution


3. Apple Ecosystem

Threat Overview: Phishing, malware, and zero-day vulnerabilities affect macOS and iOS.

Top Advice: Use Apple’s built-in security tools and restrict app installations to trusted sources.

Threats over the last 30 days: 17

Top threats affecting Apple Ecosystem


4. Google Android

Threat Overview: Malicious apps and OS vulnerabilities are common vectors.

Top Advice: Only install apps from Google Play and keep the device updated.

Threats over the last 30 days: 16

Top threats affecting Google Android


5. WordPress Related Technologies and Plugins

Threat Overview: Vulnerable plugins and themes are primary attack vectors.

Top Advice: Keep all plugins and core components updated and use security plugins.

Threats over the last 30 days: 14

Top threats affecting WordPress Related Technologies and Plugins


6. VMware Technologies

Threat Overview: Attackers exploit virtual infrastructure vulnerabilities.

Top Advice: Regularly patch and segment virtual networks.

Threats over the last 30 days: 12

Top threats affecting VMware Technologies


7. Microsoft Office

Threat Overview: Macro-based malware is widely used in phishing attacks.

Top Advice: Disable macros from untrusted sources and use email filtering.

Threats over the last 30 days: 11

Top threats affecting Microsoft Office


8. Google Chrome

Threat Overview: Targets include browser exploits and phishing.

Top Advice: Enable automatic updates and use browser-based security extensions.

Threats over the last 30 days: 11

Top threats affecting Google Chrome


9. Fortinet Technologies

Threat Overview: Vulnerabilities in FortiGate and other Fortinet tools.

Top Advice: Apply firmware updates promptly and audit firewall rules.

Threats over the last 30 days: 9

Top threats affecting Fortinet Technologies


10. Cisco Technologies

Threat Overview: Targeted for network infiltration and remote code execution.

Top Advice: Regularly update firmware and secure remote management interfaces.

Threats over the last 30 days: 7

Top threats affecting Cisco Technologies


11. JavaScript Ecosystem

Threat Overview: Supply chain attacks on libraries and frameworks.

Top Advice: Use trusted repositories and audit third-party packages.

Threats over the last 30 days: 7

Top threats affecting JavaScript Ecosystem\


12. Ivanti Products

Threat Overview: Endpoint and service vulnerabilities exploited for access.

Top Advice: Patch management and strong access controls are key.

Threats over the last 30 days: 6

Top threats affecting Ivanti Products


13. Palo Alto Networks

Threat Overview: Attacks focus on bypassing network protections.

Top Advice: Keep PAN-OS updated and audit policies regularly.

Threats over the last 30 days: 5

Top threats affecting Palo Alto Networks


14. IBM Technologies

Threat Overview: High-value enterprise solutions attract targeted attacks.

Top Advice: Implement layered defenses and conduct regular risk assessments.

Threats over the last 30 days: 4

Top threats affecting IBM Technologies


15. Microsoft Web Technologies

Threat Overview: ASP.NET and related tools are frequent phishing and injection targets.

Top Advice: Use web application firewalls and secure coding practices.

Threats over the last 30 days: 4

Top threats affecting Microsoft Web Technologies


16. Mozilla Products

Threat Overview: Firefox and Thunderbird face exploit-based attacks.

Top Advice: Enable security features and apply updates automatically.

Threats over the last 30 days: 4

Top threats affecting Mozilla Products


17. HPE Products

Threat Overview: Servers and storage systems vulnerable to firmware attacks.

Top Advice: Use HPE-provided tools to maintain firmware integrity.

Threats over the last 30 days: 4

Top threats affecting HPE Products


18. Kubernetes Technologies

Threat Overview: Misconfigurations and exposed APIs are primary risks.

Top Advice: Use role-based access control (RBAC) and audit logs.

Threats over the last 30 days: 3

Top threats affecting Kubernetes Technologies


19. Veeam Products

Threat Overview: Backup tools are prime targets for ransomware attacks.

Top Advice: Isolate backups and secure Veeam interfaces with MFA.

Threats over the last 30 days: 3

Top threats affecting Veeam Products


20. Juniper Networks

Threat Overview: Network gear vulnerabilities and misconfigurations.

Top Advice: Regularly apply patches and audit device configurations.

Threats over the last 30 days: 3

Top threats affecting Juniper Networks


To stay informed about the threats targeting the technologies you care about, prioritized in real time within the context of the entire threat landscape, create your free Fletch account today


To stay informed about the threats targeting the technologies you care about and get prioritized advice contextualized to your data, sign up for the Fletch Private Beta today

Source: Fletch internal data March 5th to April 4th

See how much time you can save

Fletch gives cybersecurity professionals a prioritized list of critical tasks to start their day. Each task is correlated to and mitigates multiple alerts and threats, targeting several resources.

Join the private beta

See how much time you can save

Fletch gives cybersecurity professionals a prioritized list of critical tasks to start their day. Each task is correlated to and mitigates multiple alerts and threats, targeting several resources.

Join the private beta

See how much time you can save

Fletch gives cybersecurity professionals a prioritized list of critical tasks to start their day. Each task is correlated to and mitigates multiple alerts and threats, targeting several resources.

Join the private beta

See how much time you can save

Fletch gives cybersecurity professionals a prioritized list of critical tasks to start their day. Each task is correlated to and mitigates multiple alerts and threats, targeting several resources.

Join the private beta

See how much time you can save

Fletch gives cybersecurity professionals a prioritized list of critical tasks to start their day. Each task is correlated to and mitigates multiple alerts and threats, targeting several resources.

Join the private beta