Product

Jake Trujillo
Apr 4, 2025
Cybersecurity threats evolve rapidly, and staying informed is crucial for keeping your organization safe. Each month, we analyze the most targeted technologies to help you focus your defenses where they’re needed most. Here are the 20 technologies that were most targeted by cyber threats over the past 30 days, along with top advice to mitigate threats for each.

Threat Overview: Exploits in the OS are commonly used to distribute malware and ransomware.
Top Advice: Apply patches regularly and use endpoint detection and response (EDR) tools.
Threats over the last 30 days: 96
Top threats affecting Microsoft Windows
Threat Overview: Targeted by APT groups and used in ransomware campaigns.
Top Advice: Harden system configurations and monitor for unauthorized access.
Threats over the last 30 days: 26
Top threats affecting Linux Distribution
Threat Overview: Phishing, malware, and zero-day vulnerabilities affect macOS and iOS.
Top Advice: Use Apple’s built-in security tools and restrict app installations to trusted sources.
Threats over the last 30 days: 17
Top threats affecting Apple Ecosystem
Threat Overview: Malicious apps and OS vulnerabilities are common vectors.
Top Advice: Only install apps from Google Play and keep the device updated.
Threats over the last 30 days: 16
Top threats affecting Google Android
5. WordPress Related Technologies and Plugins
Threat Overview: Vulnerable plugins and themes are primary attack vectors.
Top Advice: Keep all plugins and core components updated and use security plugins.
Threats over the last 30 days: 14
Top threats affecting WordPress Related Technologies and Plugins
Threat Overview: Attackers exploit virtual infrastructure vulnerabilities.
Top Advice: Regularly patch and segment virtual networks.
Threats over the last 30 days: 12
Top threats affecting VMware Technologies
Threat Overview: Macro-based malware is widely used in phishing attacks.
Top Advice: Disable macros from untrusted sources and use email filtering.
Threats over the last 30 days: 11
Top threats affecting Microsoft Office
Threat Overview: Targets include browser exploits and phishing.
Top Advice: Enable automatic updates and use browser-based security extensions.
Threats over the last 30 days: 11
Top threats affecting Google Chrome
Threat Overview: Vulnerabilities in FortiGate and other Fortinet tools.
Top Advice: Apply firmware updates promptly and audit firewall rules.
Threats over the last 30 days: 9
Top threats affecting Fortinet Technologies
Threat Overview: Targeted for network infiltration and remote code execution.
Top Advice: Regularly update firmware and secure remote management interfaces.
Threats over the last 30 days: 7
Top threats affecting Cisco Technologies
Threat Overview: Supply chain attacks on libraries and frameworks.
Top Advice: Use trusted repositories and audit third-party packages.
Threats over the last 30 days: 7
Top threats affecting JavaScript Ecosystem\
Threat Overview: Endpoint and service vulnerabilities exploited for access.
Top Advice: Patch management and strong access controls are key.
Threats over the last 30 days: 6
Top threats affecting Ivanti Products
Threat Overview: Attacks focus on bypassing network protections.
Top Advice: Keep PAN-OS updated and audit policies regularly.
Threats over the last 30 days: 5
Top threats affecting Palo Alto Networks
Threat Overview: High-value enterprise solutions attract targeted attacks.
Top Advice: Implement layered defenses and conduct regular risk assessments.
Threats over the last 30 days: 4
Top threats affecting IBM Technologies
15. Microsoft Web Technologies
Threat Overview: ASP.NET and related tools are frequent phishing and injection targets.
Top Advice: Use web application firewalls and secure coding practices.
Threats over the last 30 days: 4
Top threats affecting Microsoft Web Technologies
Threat Overview: Firefox and Thunderbird face exploit-based attacks.
Top Advice: Enable security features and apply updates automatically.
Threats over the last 30 days: 4
Top threats affecting Mozilla Products
Threat Overview: Servers and storage systems vulnerable to firmware attacks.
Top Advice: Use HPE-provided tools to maintain firmware integrity.
Threats over the last 30 days: 4
Top threats affecting HPE Products
Threat Overview: Misconfigurations and exposed APIs are primary risks.
Top Advice: Use role-based access control (RBAC) and audit logs.
Threats over the last 30 days: 3
Top threats affecting Kubernetes Technologies
Threat Overview: Backup tools are prime targets for ransomware attacks.
Top Advice: Isolate backups and secure Veeam interfaces with MFA.
Threats over the last 30 days: 3
Top threats affecting Veeam Products
Threat Overview: Network gear vulnerabilities and misconfigurations.
Top Advice: Regularly apply patches and audit device configurations.
Threats over the last 30 days: 3
Top threats affecting Juniper Networks
To stay informed about the threats targeting the technologies you care about, prioritized in real time within the context of the entire threat landscape, create your free Fletch account today.
To stay informed about the threats targeting the technologies you care about and get prioritized advice contextualized to your data, sign up for the Fletch Private Beta today.
Source: Fletch internal data March 5th to April 4th