Forescout Technologies Inc

11 STATS1 REPORTS

All Statistics

Abuse of Amazon and Google infrastructure is responsible for more than 15% of attacks, up from 11% in 2024.

Forescout Technologies Inc2025 Threat Roundup·Jan 29, 2026
Cloud SecurityAmazonGoogle

71% of exploited vulnerabilities are not in the CISA KEV catalog.

Forescout Technologies Inc2025 Threat Roundup·Jan 29, 2026
VulnerabilitiesKEV

Cyber criminals are responsible for nearly six times more cyber incidents than state-sponsored actors.

Forescout Technologies Inc2025 Threat Roundup·Jan 29, 2026
CybercrimeState-Sponsored Threats

Exploits against IoT devices increase from 16% to 19%, with IP cameras and NVRs the most frequent targets.

Forescout Technologies Inc2025 Threat Roundup·Jan 29, 2026
IoT SecurityIP CamerasNVRs

Exploits targeting network infrastructure devices represent 19% of all observed exploits, making them the second most common attack category.

Forescout Technologies Inc2025 Threat Roundup·Jan 29, 2026
Network DevicesInfrastructure Security

Two of the top 10 most exploited Autonomous Systems from 2024 drop off the top-10 list in 2025, while three new Autonomous Systems had not previously ranked in the top 500.

Forescout Technologies Inc2025 Threat Roundup·Jan 29, 2026
Autonomous Systems

242 vulnerabilities are added to the CISA Known Exploited Vulnerabilities catalog, a 30% year-over-year increase, and 285 vulnerabilities are added to the Vedere Labs KEV, a 213% year-over-year increase.

Forescout Technologies Inc2025 Threat Roundup·Jan 29, 2026
VulnerabilitiesKEV

Discovery activity accounts for 91% of post-exploitation actions, up from 25% in 2023.

Forescout Technologies Inc2025 Threat Roundup·Jan 29, 2026
Post-Exploitation

Attacks using OT protocols surge by 84%, led by Modbus (57%), Ethernet/IP (22%), and BACnet (8%).

Forescout Technologies Inc2025 Threat Roundup·Jan 29, 2026
Operational TechnologyOT Protocols

The top 10 countries account for 61% of malicious traffic, down 22% compared to 2024.

Forescout Technologies Inc2025 Threat Roundup·Jan 29, 2026
Malicious Traffic

Web applications are the most attacked service type at 61%, up from 41% in 2024; remote management protocols account for 15%.

Forescout Technologies Inc2025 Threat Roundup·Jan 29, 2026
Application SecurityRemote ManagementCyber Attacks