Skip to main content
VendorsForescout Technologies Inc

Forescout Technologies Inc

Cybersecurity reports and statistics published by Forescout Technologies Inc

8 categories1 reports

Research Reports

Reports and publications from Forescout Technologies Inc

Recent Statistics & Reports

The top 10 countries account for 61% of malicious traffic, down 22% compared to 2024.

2/5/2026
Malicious Traffic

Abuse of Amazon and Google infrastructure is responsible for more than 15% of attacks, up from 11% in 2024.

2/5/2026
Cloud SecurityAmazonGoogle

Attacks using OT protocols surge by 84%, led by Modbus (57%), Ethernet/IP (22%), and BACnet (8%).

2/5/2026
Operational TechnologyOT Protocols

71% of exploited vulnerabilities are not in the CISA KEV catalog.

2/5/2026
VulnerabilitiesKEV

Cyber criminals are responsible for nearly six times more cyber incidents than state-sponsored actors.

2/5/2026
CybercrimeState-Sponsored Threats

Web applications are the most attacked service type at 61%, up from 41% in 2024; remote management protocols account for 15%.

2/5/2026
Application SecurityRemote ManagementCyber Attacks

Exploits against IoT devices increase from 16% to 19%, with IP cameras and NVRs the most frequent targets.

2/5/2026
IoT SecurityIP CamerasNVRs

Exploits targeting network infrastructure devices represent 19% of all observed exploits, making them the second most common attack category.

2/5/2026
Network DevicesInfrastructure Security

Two of the top 10 most exploited Autonomous Systems from 2024 drop off the top-10 list in 2025, while three new Autonomous Systems had not previously ranked in the top 500.

2/5/2026
Autonomous Systems

242 vulnerabilities are added to the CISA Known Exploited Vulnerabilities catalog, a 30% year-over-year increase, and 285 vulnerabilities are added to the Vedere Labs KEV, a 213% year-over-year increase.

2/5/2026
VulnerabilitiesKEV

Discovery activity accounts for 91% of post-exploitation actions, up from 25% in 2023.

2/5/2026
Post-Exploitation