Forescout

63 STATS5 REPORTS

All Statistics

24% of devices across organizations are classified as part of the extended IoT, including IoT, OT, and IoMT.

ForescoutAn X-ray of Modern Networks: Understanding and Mitigating IoT Security Risks ·Nov 4, 2025
Device DiversityIoTOTIoMT

11% of devices across organizations are classified as network equipment.

ForescoutAn X-ray of Modern Networks: Understanding and Mitigating IoT Security Risks ·Nov 4, 2025
Device DiversityNetwork Equipment

There are 3,200 unique operating system versions observed across organizations, averaging 876 versions per organization.

ForescoutAn X-ray of Modern Networks: Understanding and Mitigating IoT Security Risks ·Nov 4, 2025
Operating Systems

There are 380 unique device functions observed across organizations, averaging 164 functions per organization.

ForescoutAn X-ray of Modern Networks: Understanding and Mitigating IoT Security Risks ·Nov 4, 2025
Device Diversity

Financial services organizations have 35% of their devices classified as extended IoT.

ForescoutAn X-ray of Modern Networks: Understanding and Mitigating IoT Security Risks ·Nov 4, 2025
Financial ServicesDevice diversityIoT

65% of devices across organizations are classified as non-traditional IT.

ForescoutAn X-ray of Modern Networks: Understanding and Mitigating IoT Security Risks ·Nov 4, 2025
Device Diversity

There are over 1,400 unique vulnerabilities affecting IP cameras in the dataset.

ForescoutAn X-ray of Modern Networks: Understanding and Mitigating IoT Security Risks ·Nov 4, 2025
IP camerasVulnerabilities

Healthcare organizations have 35% of their devices classified as extended IoT.

ForescoutAn X-ray of Modern Networks: Understanding and Mitigating IoT Security Risks ·Nov 4, 2025
HealthcareDevice diversityIoT Devices

40% of IP cameras in the dataset have at least one vulnerability.

ForescoutAn X-ray of Modern Networks: Understanding and Mitigating IoT Security Risks ·Nov 4, 2025
IP camerasVulnerabilities

Ransomware rose 36% year over year.

Forescout2025H1 Threat Review·Aug 4, 2025
ThreatsRansomware

40% of threat actor updates in H1 2025 were attributed to state-sponsored groups.

Forescout2025H1 Threat Review·Aug 4, 2025
ThreatsThreat actorsState sponsored threat actors

Ransomware attacks are averaging 20 incidents per day.

Forescout2025H1 Threat Review·Aug 4, 2025
ThreatsRansomware

62% of breaches in H1 2025 involved data stored on network servers.

Forescout2025H1 Threat Review·Aug 4, 2025
ThreatsBreachNetwork servers

9% of threat actor updates in H1 2025 were attributed to hacktivists.

Forescout2025H1 Threat Review·Aug 4, 2025
ThreatsThreat actorsHacktivists

76% of breaches in H1 2025 stemmed from hacking or IT incidents.

Forescout2025H1 Threat Review·Aug 4, 2025
ThreatsBreach

There were 3,649 documented ransomware attacks in H1 2025.

Forescout2025H1 Threat Review·Aug 4, 2025
ThreatsRansomware

Ransomware attacks grew in frequency to 608 per month, or roughly 20 per day.

Forescout2025H1 Threat Review·Aug 4, 2025
ThreatsRansomware

Zero-day exploits increased 46% in H1 2025.

Forescout2025H1 Threat Review·Aug 4, 2025
ThreatsZero-day exploits

Modbus accounted for 57% of OT protocol traffic in Forescout honeypots in H1 2025.

Forescout2025H1 Threat Review·Aug 4, 2025
ThreatsModbus

The U.S. was the top ransomware target, accounting for 53% of all ransomware incidents, in H1 2025.

Forescout2025H1 Threat Review·Aug 4, 2025
ThreatsRansomwareUS

24% of breaches IN h1 2025 were on email systems.

Forescout2025H1 Threat Review·Aug 4, 2025
ThreatsBreachEmail

47% of newly exploited vulnerabilities were originally published before 2025.

Forescout2025H1 Threat Review·Aug 4, 2025
ThreatsVulnerabilities

Zero-day exploitation increased 46% in H1 2025.

Forescout2025H1 Threat Review·Aug 4, 2025
ThreatsZero-day exploits

Published vulnerabilities rose 15% in H1 2025.

Forescout2025H1 Threat Review·Aug 4, 2025
ThreatsVulnerabilities

45% of published vulnerabilities in H1 2025 were rated high or critical.

Forescout2025H1 Threat Review·Aug 4, 2025
ThreatsVulnerabilities

CVEs added to CISA KEV jumped 80% in H1 2025.

Forescout2025H1 Threat Review·Aug 4, 2025
ThreatsCVEsCISA KEV

The healthcare sector experienced an average of two healthcare breaches per day in the first half of 2025.

Forescout2025H1 Threat Review·Aug 4, 2025
ThreatsHealthcareBreach

51% of threat actor updates in H1 2025 were attributed to cybercriminals, such as ransomware groups.

Forescout2025H1 Threat Review·Aug 4, 2025
ThreatsThreat actors

Nearly 30 million individuals were affected by breaches in H1 2025.

Forescout2025H1 Threat Review·Aug 4, 2025
ThreatsBreach

8% of industrial organizations claim that nation-state actors are their top security concern.

ForescoutGlobal Industrial Cybersecurity Benchmark 2025·Jun 25, 2025
Industrial OTNation stateAPTs

50% of industrial organizations claim that supply chain threats and cybercriminal activity are their top security concern.

ForescoutGlobal Industrial Cybersecurity Benchmark 2025·Jun 25, 2025
Industrial OTSupply chain

64% of industrial organizations classify their OT cybersecurity maturity as foundational.

ForescoutGlobal Industrial Cybersecurity Benchmark 2025·Jun 25, 2025
Industrial OTMaturity

9% of industrial organizations claim that zero-day vulnerabilities are their top security concern.

ForescoutGlobal Industrial Cybersecurity Benchmark 2025·Jun 25, 2025
Industrial OTZero day

57% of industrial organizations deploy more than three tools to monitor IT, OT, and IoT environments.

ForescoutGlobal Industrial Cybersecurity Benchmark 2025·Jun 25, 2025
Industrial OTTools

Only 17% of industrial organizations report mature OT security practices.

ForescoutGlobal Industrial Cybersecurity Benchmark 2025·Jun 25, 2025
Industrial OTMaturity

44% of industrial organizations claim to have strong real-time cyber visibility.

ForescoutGlobal Industrial Cybersecurity Benchmark 2025·Jun 25, 2025
Industrial OTVisibility

Nearly 60% of industrial organizations have low to no confidence in their Operational Technology (OT) and Internet of Things (IoT) threat detection capabilities.

ForescoutGlobal Industrial Cybersecurity Benchmark 2025·Jun 25, 2025
Industrial OTThreat detection

49% of industrial organizations cite vulnerability prioritization as the most laborious task.

ForescoutGlobal Industrial Cybersecurity Benchmark 2025·Jun 25, 2025
Industrial OTVulnerabilities

44% of industrial organizations cite risk mitigation as the most laborious task

ForescoutGlobal Industrial Cybersecurity Benchmark 2025·Jun 25, 2025
Industrial OTRisk mitigation

Over 33% of industrial organizations take more than 90 days to remediate threats.

ForescoutGlobal Industrial Cybersecurity Benchmark 2025·Jun 25, 2025
Industrial OTThreat remediation

63% of industrial organizations take over 30 days to remediate threats.

ForescoutGlobal Industrial Cybersecurity Benchmark 2025·Jun 25, 2025
Industrial OTThreat remediation

19% of industrial organizations identify their cybersecurity maturity as evolving.

ForescoutGlobal Industrial Cybersecurity Benchmark 2025·Jun 25, 2025
Industrial OTMaturity

8% of industrial organizations claim that nation-state actors are their top security concern.

ForescoutGlobal Industrial Cybersecurity Benchmark 2025·Jun 25, 2025
Industrial OTNation stateAPTs

9% of industrial organizations claim that zero-day vulnerabilities are their top security concern.

ForescoutGlobal Industrial Cybersecurity Benchmark 2025·Jun 25, 2025
Industrial OTZero day

Less than 1% of hacktivist attacks impacted organizations in the Americas.

ForescoutThe Rise of State-Sponsored Hacktivism·Apr 29, 2025
HacktivismAmericas

NoName057(16) was the most active hacktivist group, accounting for 90% of attacks analyzed. It is also cited as being behind 90% of state-aligned cyberattacks in 2024.

ForescoutThe Rise of State-Sponsored Hacktivism·Apr 29, 2025
Hacktivism

Geographically, 82% of hacktivist attacks targeted Europe.

ForescoutThe Rise of State-Sponsored Hacktivism·Apr 29, 2025
HacktivismEurope

Four state-aligned hacktivist groups claimed responsibility for 780 attacks in 2024 alone.

ForescoutThe Rise of State-Sponsored Hacktivism·Apr 29, 2025
Hacktivism

The other state-aligned hacktivist groups accounted for the remaining attacks: BlackJack (1%), Handala Group (8%), and the Indian Cyber Force (1%).

ForescoutThe Rise of State-Sponsored Hacktivism·Apr 29, 2025
Hacktivism

18% of hacktivist groups targeted Asia, including the Middle East.

ForescoutThe Rise of State-Sponsored Hacktivism·Apr 29, 2025
HacktivismAsiaMiddle East