VendorsForescout Technologies Inc
Forescout Technologies Inc
Cybersecurity reports and statistics published by Forescout Technologies Inc
8 categories1 reports
Research Reports
Reports and publications from Forescout Technologies Inc
Recent Statistics & Reports
The top 10 countries account for 61% of malicious traffic, down 22% compared to 2024.
2/5/2026•
Malicious Traffic
Abuse of Amazon and Google infrastructure is responsible for more than 15% of attacks, up from 11% in 2024.
2/5/2026•
Cloud SecurityAmazonGoogle
Attacks using OT protocols surge by 84%, led by Modbus (57%), Ethernet/IP (22%), and BACnet (8%).
2/5/2026•
Operational TechnologyOT Protocols
71% of exploited vulnerabilities are not in the CISA KEV catalog.
2/5/2026•
VulnerabilitiesKEV
Cyber criminals are responsible for nearly six times more cyber incidents than state-sponsored actors.
2/5/2026•
CybercrimeState-Sponsored Threats
Web applications are the most attacked service type at 61%, up from 41% in 2024; remote management protocols account for 15%.
2/5/2026•
Application SecurityRemote ManagementCyber Attacks
Exploits against IoT devices increase from 16% to 19%, with IP cameras and NVRs the most frequent targets.
2/5/2026•
IoT SecurityIP CamerasNVRs
Exploits targeting network infrastructure devices represent 19% of all observed exploits, making them the second most common attack category.
2/5/2026•
Network DevicesInfrastructure Security
Two of the top 10 most exploited Autonomous Systems from 2024 drop off the top-10 list in 2025, while three new Autonomous Systems had not previously ranked in the top 500.
2/5/2026•
Autonomous Systems
242 vulnerabilities are added to the CISA Known Exploited Vulnerabilities catalog, a 30% year-over-year increase, and 285 vulnerabilities are added to the Vedere Labs KEV, a 213% year-over-year increase.
2/5/2026•
VulnerabilitiesKEV
Discovery activity accounts for 91% of post-exploitation actions, up from 25% in 2023.
2/5/2026•
Post-Exploitation