{"id":104118,"date":"2025-01-22T07:11:18","date_gmt":"2025-01-22T15:11:18","guid":{"rendered":"https:\/\/forescoutstage.wpengine.com\/research-labs\/2023-threat-roundup-copy\/"},"modified":"2025-02-21T04:25:12","modified_gmt":"2025-02-21T12:25:12","slug":"2024-threat-roundup","status":"publish","type":"page","link":"https:\/\/www.forescout.com\/research-labs\/2024-threat-roundup\/","title":{"rendered":"2024 Threat Roundup"},"content":{"rendered":"<p>2024 Threat Roundup<\/p>\n<h1>Top Cybersecurity Trends from Vedere Labs<\/h1>\n<p>We track cybersecurity trend lines across cyber attacks, exploits, malware and threat actors every year, so you can know where to focus and act.<\/p>\n<p>Threats to critical infrastructure, government and specific vertical industries using OT technology are increasing. See where.<\/p>\n<p>Watch WebinarRead Report<\/p>\n<p>\u00a0<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2022\/06\/FS-2022-OT-ICEFALL-LP-Web-Icons-v1-Vulnerabilities.png\" class=\"c-stats__img\" loading=\"lazy\"><\/p>\n<h3 class=\"c-stats__numbers\">\n900M<\/h3>\n<p class=\"c-stats__text\">Attacks in 2024<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2024\/01\/attacks.png\" class=\"c-stats__img\" loading=\"lazy\"><\/p>\n<h3 class=\"c-stats__numbers\">\n33% \u2191<\/h3>\n<p class=\"c-stats__text\">Threat Actors YoY<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2024\/01\/infected-laptop.png\" class=\"c-stats__img\" loading=\"lazy\"><\/p>\n<h3 class=\"c-stats__numbers\">\n114% \u2191<\/h3>\n<p class=\"c-stats__text\">Attacks &#8217;23 to &#8217;24<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2024\/01\/attack-002.png\" class=\"c-stats__img\" loading=\"lazy\"><\/p>\n<h3 class=\"c-stats__numbers\">\n668% \u2191<\/h3>\n<p class=\"c-stats__text\">Critical Infrastructure Incidents &#8217;22 to &#8217;24<\/p>\n<figure class=\"video-player\">\n<\/figure>\n<h2 class=\"c-title \">Webinar: The Most Defining Cybersecurity Trends of\u00a02024<\/h2>\n<p>Join leaders from Vedere Labs for a deep dive into the essential cybersecurity trends from the last year. From shifting attack origins to an increase in threat actors, we dissect pivotal events that define today.<\/p>\n<p><a href=\"\/webinars\/2024-threat-roundup-evolving-attacks-on-critical-infrastructure\/\" title=\"Watch Now\" class=\"c-btn c-btn--white has-icon icon-camera icon-position-right has-icon-animation icon-animation-fade-in\">Watch Now<\/a><\/p>\n<h3 style=\"text-align: center;color: #27323c\">Top 10 Countries Originating Cybersecurity Attacks<\/h3>\n<h2 class=\"c-title \">Russia Tops Attack Origin, China 2x Threat Actors<\/h2>\n<ul>\n<li>Attacks originate from 213 countries<\/li>\n<li>10 countries account for 78% of malicious traffic<\/li>\n<\/ul>\n<p><a href=\"https:\/\/www.forescout.com\/blog\/our-2024-threat-report-attack-volume-up-114\/\" title=\"Read the Blog\" class=\"c-btn c-btn--dblue c-btn--outline has-icon icon-arrow-right icon-position-right has-icon-animation icon-animation-fade-in\">Read the Blog<\/a><\/p>\n<h3 style=\"text-align: center;color: #27323c\">Distribution of Exploited Vulnerabilities by Software Type<\/h3>\n<h2 class=\"c-title \">Top 3 Attacked Service\u00a0Types<\/h2>\n<ol>\n<li>Web applications \u2014 most often via exploited vulnerabilities<\/li>\n<li>Remote management protocols <\/li>\n<li>Remote management services\n<ul>\n<li>Specific usernames linked to databases<\/li>\n<li>Cloud and DevOps infrastructure <\/li>\n<\/ul>\n<\/li>\n<\/ol>\n<h2>Top 10 Targeted Industries<\/h2>\n<h3 style=\"color: #27323c;text-align: center\">Threat Actor Increase in Verticals<\/h3>\n<h2 class=\"c-title \">Top 3 Increase (YoY)<\/h2>\n<ol>\n<li>Energy: <strong>93%<\/strong><\/li>\n<li>Manufacturing: <strong>71%<\/strong><\/li>\n<li>Healthcare: <strong>55%<\/strong><\/li>\n<\/ol>\n<h2 style=\"color: #009dea;text-align: center\">Threats Unleashed Across 176 Countries<\/h2>\n<p style=\"text-align: center\">Threat actors have targeted 176 countries which is 13 more than in 2023.<br \/>\nOnce again, the U.S. is the most targeted country on the planet by 264 actors. Germany ranks second at 144; India is third\u00a0at\u00a0141.\n\n<p><img decoding=\"async\" loading=\"lazy\" class=\"aligncenter size-large wp-image-104166\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2025\/01\/heat-map-countries-targeted-by-threat-actors-1-1024x606.webp\" alt=\"\" width=\"1024\" height=\"606\" srcset=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2025\/01\/heat-map-countries-targeted-by-threat-actors-1-1024x606.webp 1024w, https:\/\/www.forescout.com\/wp-content\/uploads\/2025\/01\/heat-map-countries-targeted-by-threat-actors-1-300x178.webp 300w, https:\/\/www.forescout.com\/wp-content\/uploads\/2025\/01\/heat-map-countries-targeted-by-threat-actors-1-768x455.webp 768w, https:\/\/www.forescout.com\/wp-content\/uploads\/2025\/01\/heat-map-countries-targeted-by-threat-actors-1-1536x909.webp 1536w, https:\/\/www.forescout.com\/wp-content\/uploads\/2025\/01\/heat-map-countries-targeted-by-threat-actors-1.webp 1600w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/p>\n<p style=\"text-align: center\"><em>Heat map: countries most targeted by threat actors<\/em><\/p>\n<h3 style=\"text-align: center\">Top 5 Attacks by OT Protocol<\/h3>\n<h2 class=\"c-title \">OT Attacks<\/h2>\n<ul>\n<li>Five OT protocols are consistently targeted: Modbus, Ethernet\/IP,  Step7, DNP3, BACnet<\/li>\n<li>Three building automation protocols are consistently targeted: BACnet, Fox, KNX<\/li>\n<\/ul>\n<h3 style=\"text-align: center\">Distribution of Malware Types<\/h3>\n<h2 class=\"c-title \">Malware<\/h2>\n<ul>\n<li>5 of the most popular malware families are new: Lumma, Gafgyt, Healer, Credential Flusher, and Remcos. Lumma is the most popular new entry.<\/li>\n<li>4 of the most popular C2 of 2024 are new: Viper, DarkGate, Quasar, DcRAT. Although Cobalt Strike remains by far the most popular C2.<\/li>\n<\/ul>\n<p><a href=\"https:\/\/www.forescout.com\/resources\/2024-global-threat-roundup-report\/\" target=\"_blank\"><\/p>\n<p><img decoding=\"async\" loading=\"lazy\" class=\"aligncenter size-large wp-image-104124\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2025\/01\/2024-threat-roundup-Report-3d-thumbnail-848x1024.webp\" alt=\"\" width=\"848\" height=\"1024\" srcset=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2025\/01\/2024-threat-roundup-Report-3d-thumbnail-848x1024.webp 848w, https:\/\/www.forescout.com\/wp-content\/uploads\/2025\/01\/2024-threat-roundup-Report-3d-thumbnail-248x300.webp 248w, https:\/\/www.forescout.com\/wp-content\/uploads\/2025\/01\/2024-threat-roundup-Report-3d-thumbnail-768x927.webp 768w, https:\/\/www.forescout.com\/wp-content\/uploads\/2025\/01\/2024-threat-roundup-Report-3d-thumbnail.webp 892w\" sizes=\"auto, (max-width: 848px) 100vw, 848px\" \/><\/p>\n<p><\/a><\/p>\n<h2>Go Deep Into the Research<\/h2>\n<p>In this comprehensive trends report, Forescout Research \u2013 Vedere Labs meticulously analyzes attacks, exploits, and malware observed throughout the entirety of 2024. It also includes information on vulnerabilities and exploits that are not on the CISA-KEV list but are being exploited today.<\/p>\n<p class=\"u-display-flex u-flex-wrap u-gap\"><a href=\"https:\/\/www.forescout.com\/resources\/2024-global-threat-roundup-report\/\" title=\"Get Report\" class=\"c-btn c-btn--yellow u-flex-auto u-flex-initial@sm u-justify-center u-justify-start@sm has-icon icon-arrow-right icon-position-right has-icon-animation icon-animation-fade-in\" target=\"_blank\">Get Report<\/a><\/p>\n<h2 class=\"c-title\">Strategic Recommendations:How Forescout can\u00a0Help<\/h2>\n<ul class=\"c-list--primary c-list--triangle\" style=\"text-align: left\">\n<li><strong>Risk and exposure management. <\/strong>Identify, quantify and prioritize cybersecurity risk. Start by <a href=\"\/solutions\/asset-inventory\/\">discovering and assessing every connected asset<\/a> to gain real-time awareness of your attack surface.<\/li>\n<li><strong>Network security. <\/strong>Continuously monitor all connected assets to <a href=\"\/solutions\/network-access-control\/\">govern network access<\/a>, using real-time traffic visibility to <a href=\"\/products\/eyesegment\/\">manage segmentation<\/a> and dynamic control policies to mitigate and remediate risk.<\/li>\n<li><strong>Threat detection and response. <\/strong><a href=\"\/products\/threat-detection-and-response-xdr\/\">Detect, investigate and respond<\/a> to true threats and incidents using threat detection and response capabilities to collect telemetry and logs, correlate attack signals, generate high-fidelity detections and enable automated responses.<\/li>\n<\/ul>\n<p><a href=\"https:\/\/www.forescout.com\/demo\/\" title=\"schedule a demo\" class=\"c-btn c-btn--white c-btn--outline has-icon icon-demo icon-position-right has-icon-animation icon-animation-pulse\">schedule a demo<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>2024 Threat Roundup Top Cybersecurity Trends from Vedere Labs We track cybersecurity trend lines across cyber attacks, exploits, malware and threat actors every year, so you can know where to focus and act. Threats to critical infrastructure, government and specific vertical industries using OT technology are increasing. See where. Watch WebinarRead Report \u00a0 900M Attacks [&hellip;]<\/p>\n","protected":false},"author":165,"featured_media":104242,"parent":70336,"menu_order":60,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"ep_exclude_from_search":false,"footnotes":"","_links_to":"","_links_to_target":""},"coauthors":[712],"class_list":["post-104118","page","type-page","status-publish","has-post-thumbnail","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.8 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>2024 Threat Roundup - Forescout<\/title>\n<meta name=\"description\" content=\"Forescout Research shares the top cybersecurity trends in its annual threat report that tracks cyber attacks by country and by vertical.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.forescout.com\/research-labs\/2024-threat-roundup\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"2024 Threat Roundup - Forescout\" \/>\n<meta property=\"og:description\" content=\"Forescout Research shares the top cybersecurity trends in its annual threat report that tracks cyber attacks by country and by vertical.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.forescout.com\/research-labs\/2024-threat-roundup\/\" \/>\n<meta property=\"og:site_name\" content=\"Forescout\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ForescoutTechnologies\" \/>\n<meta property=\"article:modified_time\" content=\"2025-02-21T12:25:12+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2025\/01\/VL-2024-Threat-Roundup-Report-Nav-v1-1200x628-1.webp\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"628\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/webp\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@Forescout\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"10 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.forescout.com\/research-labs\/2024-threat-roundup\/\",\"url\":\"https:\/\/www.forescout.com\/research-labs\/2024-threat-roundup\/\",\"name\":\"2024 Threat Roundup - Forescout\",\"isPartOf\":{\"@id\":\"https:\/\/www.forescout.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.forescout.com\/research-labs\/2024-threat-roundup\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.forescout.com\/research-labs\/2024-threat-roundup\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.forescout.com\/wp-content\/uploads\/2025\/01\/VL-2024-Threat-Roundup-Report-Nav-v1-1200x628-1.webp\",\"datePublished\":\"2025-01-22T15:11:18+00:00\",\"dateModified\":\"2025-02-21T12:25:12+00:00\",\"description\":\"Forescout Research shares the top cybersecurity trends in its annual threat report that tracks cyber attacks by country and by vertical.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.forescout.com\/research-labs\/2024-threat-roundup\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.forescout.com\/research-labs\/2024-threat-roundup\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.forescout.com\/research-labs\/2024-threat-roundup\/#primaryimage\",\"url\":\"https:\/\/www.forescout.com\/wp-content\/uploads\/2025\/01\/VL-2024-Threat-Roundup-Report-Nav-v1-1200x628-1.webp\",\"contentUrl\":\"https:\/\/www.forescout.com\/wp-content\/uploads\/2025\/01\/VL-2024-Threat-Roundup-Report-Nav-v1-1200x628-1.webp\",\"width\":1200,\"height\":628},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.forescout.com\/research-labs\/2024-threat-roundup\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.forescout.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Vedere Labs\",\"item\":\"https:\/\/www.forescout.com\/research-labs\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"2024 Threat Roundup\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.forescout.com\/#website\",\"url\":\"https:\/\/www.forescout.com\/\",\"name\":\"Forescout\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.forescout.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.forescout.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.forescout.com\/#organization\",\"name\":\"Forescout Technologies, Inc.\",\"url\":\"https:\/\/www.forescout.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.forescout.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.forescout.com\/wp-content\/uploads\/2019\/01\/forescout-logo.svg\",\"contentUrl\":\"https:\/\/www.forescout.com\/wp-content\/uploads\/2019\/01\/forescout-logo.svg\",\"width\":1,\"height\":1,\"caption\":\"Forescout Technologies, Inc.\"},\"image\":{\"@id\":\"https:\/\/www.forescout.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/ForescoutTechnologies\",\"https:\/\/x.com\/Forescout\",\"https:\/\/www.instagram.com\/forescouttechnologies\/\",\"https:\/\/www.linkedin.com\/company\/forescout-technologies\",\"https:\/\/www.youtube.com\/user\/forescout1\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"2024 Threat Roundup - Forescout","description":"Forescout Research shares the top cybersecurity trends in its annual threat report that tracks cyber attacks by country and by vertical.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.forescout.com\/research-labs\/2024-threat-roundup\/","og_locale":"en_US","og_type":"article","og_title":"2024 Threat Roundup - Forescout","og_description":"Forescout Research shares the top cybersecurity trends in its annual threat report that tracks cyber attacks by country and by vertical.","og_url":"https:\/\/www.forescout.com\/research-labs\/2024-threat-roundup\/","og_site_name":"Forescout","article_publisher":"https:\/\/www.facebook.com\/ForescoutTechnologies","article_modified_time":"2025-02-21T12:25:12+00:00","og_image":[{"width":1200,"height":628,"url":"https:\/\/www.forescout.com\/wp-content\/uploads\/2025\/01\/VL-2024-Threat-Roundup-Report-Nav-v1-1200x628-1.webp","type":"image\/webp"}],"twitter_card":"summary_large_image","twitter_site":"@Forescout","twitter_misc":{"Est. reading time":"10 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.forescout.com\/research-labs\/2024-threat-roundup\/","url":"https:\/\/www.forescout.com\/research-labs\/2024-threat-roundup\/","name":"2024 Threat Roundup - Forescout","isPartOf":{"@id":"https:\/\/www.forescout.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.forescout.com\/research-labs\/2024-threat-roundup\/#primaryimage"},"image":{"@id":"https:\/\/www.forescout.com\/research-labs\/2024-threat-roundup\/#primaryimage"},"thumbnailUrl":"https:\/\/www.forescout.com\/wp-content\/uploads\/2025\/01\/VL-2024-Threat-Roundup-Report-Nav-v1-1200x628-1.webp","datePublished":"2025-01-22T15:11:18+00:00","dateModified":"2025-02-21T12:25:12+00:00","description":"Forescout Research shares the top cybersecurity trends in its annual threat report that tracks cyber attacks by country and by vertical.","breadcrumb":{"@id":"https:\/\/www.forescout.com\/research-labs\/2024-threat-roundup\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.forescout.com\/research-labs\/2024-threat-roundup\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.forescout.com\/research-labs\/2024-threat-roundup\/#primaryimage","url":"https:\/\/www.forescout.com\/wp-content\/uploads\/2025\/01\/VL-2024-Threat-Roundup-Report-Nav-v1-1200x628-1.webp","contentUrl":"https:\/\/www.forescout.com\/wp-content\/uploads\/2025\/01\/VL-2024-Threat-Roundup-Report-Nav-v1-1200x628-1.webp","width":1200,"height":628},{"@type":"BreadcrumbList","@id":"https:\/\/www.forescout.com\/research-labs\/2024-threat-roundup\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.forescout.com\/"},{"@type":"ListItem","position":2,"name":"Vedere Labs","item":"https:\/\/www.forescout.com\/research-labs\/"},{"@type":"ListItem","position":3,"name":"2024 Threat Roundup"}]},{"@type":"WebSite","@id":"https:\/\/www.forescout.com\/#website","url":"https:\/\/www.forescout.com\/","name":"Forescout","description":"","publisher":{"@id":"https:\/\/www.forescout.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.forescout.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.forescout.com\/#organization","name":"Forescout Technologies, Inc.","url":"https:\/\/www.forescout.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.forescout.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.forescout.com\/wp-content\/uploads\/2019\/01\/forescout-logo.svg","contentUrl":"https:\/\/www.forescout.com\/wp-content\/uploads\/2019\/01\/forescout-logo.svg","width":1,"height":1,"caption":"Forescout Technologies, Inc."},"image":{"@id":"https:\/\/www.forescout.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/ForescoutTechnologies","https:\/\/x.com\/Forescout","https:\/\/www.instagram.com\/forescouttechnologies\/","https:\/\/www.linkedin.com\/company\/forescout-technologies","https:\/\/www.youtube.com\/user\/forescout1"]}]}},"featured_media_url":"https:\/\/www.forescout.com\/wp-content\/uploads\/2025\/01\/VL-2024-Threat-Roundup-Report-Nav-v1-1200x628-1.webp","is_file":false,"excerpt_manually_set":false,"_links":{"self":[{"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/pages\/104118","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/users\/165"}],"replies":[{"embeddable":true,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/comments?post=104118"}],"version-history":[{"count":0,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/pages\/104118\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/pages\/70336"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/media\/104242"}],"wp:attachment":[{"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/media?parent=104118"}],"wp:term":[{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/coauthors?post=104118"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}