{"id":70336,"date":"2022-02-09T12:38:52","date_gmt":"2022-02-09T20:38:52","guid":{"rendered":"https:\/\/forescoutstage.wpengine.com\/research-labs-copy\/"},"modified":"2025-06-26T14:22:09","modified_gmt":"2025-06-26T18:22:09","slug":"research-labs","status":"publish","type":"page","link":"https:\/\/www.forescout.com\/research-labs\/","title":{"rendered":"Vedere Labs"},"content":{"rendered":"<h1>Forescout Research \u2013<br \/>\nVedere Labs<\/h1>\n<p>\u201cVedere\u201d is the Italian word meaning \u201cto see,\u201d which epitomizes the mission of Forescout Vedere Labs, the cybersecurity research arm of Forescout. Our team of global experts focuses on increasing visibility of cybersecurity threats and vulnerabilities for all connected asset types and providing mitigation steps organizations can use to protect themselves.<\/p>\n<p>Our research is fed into the Forescout Platform and shared with the cybersecurity community, including CISA and other cybersecurity agencies, CERTs, ISACs, open-source projects, device manufacturers, universities and other researchers.<\/p>\n<p>Sign Up for Research Newsletter<\/p>\n<p>\u00a0<\/p>\n<h2 class=\"c-title\">What We Do<\/h2>\n<p><a href=\"\/research-labs-overview\/\"><img decoding=\"async\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/09\/bug.svg\" style=\"width:35%\" alt=\"Vulnerability Research\" loading=\"lazy\"><\/a><\/p>\n<h3 style=\"height: 40px\">Vulnerability Research<\/h3>\n<ul class=\"c-list--primary c-list--triangle\" style=\"text-align: left;height: 140px\">\n<li>Focus on vulnerabilities against managed and unmanaged devices (IT\/IoT\/IoMT\/OT)<\/li>\n<li>200+ vulnerabilities discovered in last 5 years<\/li>\n<li>100+ known exploited vulnerabilities on unmanaged devices<\/li>\n<\/ul>\n<p><a href=\"\/research-labs-overview\/\" title=\"Explore\" class=\"c-btn c-btn--dblue c-btn--outline has-icon icon-compass icon-position-right has-icon-animation icon-animation-fade-in\">Explore<\/a><\/p>\n<p><a href=\"\/threat-briefings\/\"><img decoding=\"async\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/09\/alert.svg\" style=\"width:35%\" alt=\"Threat Reports\" loading=\"lazy\"><\/a><\/p>\n<h3 style=\"height: 40px\">Threat Reports<\/h3>\n<ul class=\"c-list--primary c-list--triangle\" style=\"text-align: left;height: 140px\">\n<li>Manual and automatic analysis of malware samples collected via customer telemetry and other sources<\/li>\n<\/ul>\n<p><a href=\"\/threat-briefings\/\" title=\"Explore\" class=\"c-btn c-btn--dblue c-btn--outline has-icon icon-compass icon-position-right has-icon-animation icon-animation-fade-in\">Explore<\/a><\/p>\n<p><a href=\"\/research-labs\/threat-intelligence\/\"><img decoding=\"async\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/09\/Threat-Intel.svg\" style=\"width:35%\" alt=\"Cyber Threat Intelligence\" loading=\"lazy\"><\/a><\/p>\n<h3 style=\"height: 40px\">Threat Intelligence &amp; Detection<\/h3>\n<ul class=\"c-list--primary c-list--triangle\" style=\"text-align: left;height: 140px\">\n<li>Daily context-rich, machine-consumable <a href=\"https:\/\/forescout.vederelabs.com\/register\" target=\"new\">threat feeds<\/a><\/li>\n<li>Detection rules to keep our Threat Detection &amp; Response solution on top of emerging\u00a0threats<\/li>\n<li><a href=\"https:\/\/forescout.vederelabs.com\/\" target=\"new\">Live dashboards<\/a><\/li>\n<\/ul>\n<p><a href=\"\/research-labs\/threat-intelligence\/\" title=\"explore\" class=\"c-btn c-btn--dblue c-btn--outline has-icon icon-compass icon-position-right has-icon-animation icon-animation-fade-in\">explore<\/a><\/p>\n<figure class=\"video-player\">\n<\/figure>\n<h2 class=\"c-title \">How We Do It<\/h2>\n<p>Forescout Vedere Labs studies what attackers are working towards by observing actual attacks in our sandboxes, on the Darknet and in our Adversary Engagement Environment. We analyze significant attacks and generate vulnerability and threat intelligence that is consumed by the <a href=\"\/products\/\">Forescout Platform<\/a>. We also create corresponding detection rules that are added to <a href=\"\/products\/threat-detection-and-response-xdr\/\">Forescout Threat Detection &amp; Response<\/a> to help ensure customers can protect their IT, OT, IoT and IoMT environments.  <\/p>\n<h2 class=\"c-title\">Firsthand Observations in Our Research Laboratory<\/h2>\n<p>Located in Eindhoven, Netherlands, our research laboratory is where we observe firsthand the vulnerabilities being exploited and attacks in progress. The information we collect is analyzed to generate threat intelligence, calculate <a href=\"\/products\/rem\/\"><b>multifactor risk scores<\/b><\/a> and create <a href=\"\/products\/threat-detection-and-response-xdr\/\"><b>detection rules<\/b><\/a>.<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/09\/Vedere-Research-Diagram_v01_02.svg\" alt=\"Research Diagram\" loading=\"lazy\"><\/p>\n<h2 style=\"text-align: center;color: #009dea\">How Vedere Labs Uses Artificial Intelligence<\/h2>\n<p>\u00a0<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2024\/12\/vedere-labs-AI-example-1.webp\" loading=\"lazy\"><\/p>\n<p style=\"font-size: 105%\">VL threat intelligence is integrated on generative AI products, such as Microsoft Copilot for Security, allowing security analysts to query OT and IoT-specific threat intelligence directly from Forescout Research.<\/p>\n<p style=\"font-size: 105%\">We also have integrated generative AI within our TDR solution, which summarizes proprietary intelligence that can be gathered about IP addresses and other indicators of compromises observed during an incident.<\/p>\n<h2 style=\"color: #009dea\">VL KEV: Our Proprietary List of Vulnerabilities<\/h2>\n<p style=\"font-size: 105%\">Our KEV list is compiled from real attacks we observe within our OT and IoT-specific honeypots, customer data and third-party intelligence. The list is complementary to industry-standard sources, such as CISA KEV. It is updated in tandem with other threat intelligence for Forescout eyeInspect and REM solutions. This type of intelligence allows users to prioritize vulnerability management actions based on what is currently being exploited by threat\u00a0actors.<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2024\/12\/vedere-kev.jpg\" loading=\"lazy\"><\/p>\n<h2 style=\"text-align: center;color: #009dea\">Partnerships and Threat Intelligence Sharing Groups<\/h2>\n<p style=\"text-align: center\">Vedere Labs is a proud member and contributor to threat intelligence sharing groups, including CERTs, cyber threat alliances and ISACs \u2014 where new intelligence and best practices are shared. Member organizations include industry, academia and governments where we share machine-readable intelligence and human-readable reports.<\/p>\n<h5>European Energy\u00a0ISAC<\/h5>\n<p>Forescout is a founding member and actively participates in the threat intelligence task force.<\/p>\n<h5>ETHOS<\/h5>\n<p>Forescout is a founding member and part of the board of directors in this industry partnership dedicated to OT-centric, open-source sharing of anonymous early-warning threat information.<\/p>\n<h5>OT-ISAC<\/h5>\n<p>Forescout is a partner that shares reports, answers questions about emerging threats and presents at conferences and threat briefing meetings.<\/p>\n<h5>CISA JCDC and AIS<\/h5>\n<p>Forescout shares indicators of compromise and reports distributed to other members of the JCDC and IAS initiatives.<\/p>\n<h5>ACSC CTIS<\/h5>\n<p>Forescout shares indicators of compromise and reports distributed to other members of the CTIS initiative.<\/p>\n<h2 class=\"c-title\">Data. Lots of Data.<\/h2>\n<p>The threat intelligence data we analyze comes from millions of connected devices that we monitor that give us billions of data points about device configuration and network behavior. It also comes from attacks we observe and dissect and other sources that we monitor.<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/07\/Classification-blue-round-icon.svg\" style=\"width:30%\" loading=\"lazy\"><\/p>\n<h4>Devices<\/h4>\n<ul class=\"c-list--primary c-list--triangle\" style=\"text-align: left;height: auto\">\n<li>19 million monitored devices<\/li>\n<li>39 billion unique data points<\/li>\n<li>1,500 global sites<\/li>\n<li>6,500+ unique vendors<\/li>\n<li>2,300+ unique OS versions<\/li>\n<\/ul>\n<p><img decoding=\"async\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/09\/threat-blue-round-icon2.svg\" style=\"width:30%\" loading=\"lazy\"><\/p>\n<h4>Threats<\/h4>\n<ul class=\"c-list--primary c-list--triangle\" style=\"text-align: left;height: auto\">\n<li>750+ threat actors<\/li>\n<li>100+ ransomware group leak sites<\/li>\n<li>20+ C2 types monitored on the Internet<\/li>\n<li>Third-party intel<\/li>\n<\/ul>\n<h2 class=\"c-title\">Forescout Research &#8211; Vedere Labs Featured\u00a0In&#8230;<\/h2>\n<p><img decoding=\"async\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/09\/cnn_business-logo.png\" style=\"width:90%\" loading=\"lazy\"><\/p>\n<h5 style=\"text-align: center\">Researchers uncover software flaws leaving medical devices vulnerable to hackers<\/h5>\n<p style=\"text-align: center\">Researchers say they have found more than a dozen vulnerabilities in software used in medical devices and machinery used in other industries that, if exploited by a hacker, could cause critical equipment such as patient monitors to crash\u2026<\/p>\n<p><a href=\"https:\/\/edition.cnn.com\/2021\/11\/09\/tech\/medical-devices-vulnerable-to-hackers\/index.html%20%20\" title=\"Read More\" class=\"c-read-more u-mt-auto cta-link\" target=\"_blank\">Read More<\/a><\/p>\n<p><img decoding=\"async\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/09\/wired-magazine-logo.png\" style=\"width:90%\" loading=\"lazy\"><\/p>\n<h5 style=\"text-align: center\">Critical Bugs Expose Hundreds of Thousands of Medical Devices and ATMs<\/h5>\n<p style=\"text-align: center\">\u201cYou can imagine the type of impact an attacker could have when they can either exfiltrate data from medical equipment or other sensitive devices, potentially tamper with lab results, make critical devices unavailable, or take them over entirely\u2026\u201d<\/p>\n<p><a href=\"https:\/\/www.wired.com\/story\/access7-iot-vulnerabilities-medical-devices-atms\/\" title=\"Read More\" class=\"c-read-more u-mt-auto cta-link\" target=\"_blank\">Read More<\/a><\/p>\n<p><img decoding=\"async\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/09\/washington-post-logo.png\" style=\"width:90%\" loading=\"lazy\"><\/p>\n<h5 style=\"text-align: center\">Government cyber workers increasingly concerned hackers will strike during shutdown<\/h5>\n<p style=\"text-align: center\">The government\u2019s cybersecurity professionals are increasingly concerned that hackers will take advantage of the partial shutdown to tamper with sensitive government data or steal citizens\u2019 information \u2014 and that the bare-bones staff won\u2019t be able to fend them off\u2026<\/p>\n<p><a href=\"https:\/\/www.washingtonpost.com\/news\/powerpost\/paloma\/the-cybersecurity-202\/2019\/01\/16\/the-cybersecurity-202-government-cyber-workers-increasingly-concerned-hackers-will-strike-during-shutdown\/5c3e2e431b326b66fc5a1c5b\/\" title=\"Learn More\" class=\"c-read-more u-mt-auto cta-link\" target=\"_blank\">Learn More<\/a><\/p>\n<p><img decoding=\"async\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/09\/politico-logo.png\" style=\"width:90%\" loading=\"lazy\"><\/p>\n<h5 style=\"text-align: center\">OT:ICEFALL FINALE<\/h5>\n<p style=\"text-align: center\">Forescout Vedere Labs is wrapping up its yearlong project looking at design vulnerabilities in operational technology with a closing report today that blames many of the issues they\u2019ve encountered on vendors of the technology not implementing designs that would build security into the systems\u2026<\/p>\n<p><a href=\"https:\/\/www.politico.com\/newsletters\/weekly-cybersecurity\/2023\/06\/20\/411-on-the-702-00102617\" title=\"Read More\" class=\"c-read-more u-mt-auto cta-link\" target=\"_blank\">Read More<\/a><\/p>\n<p><img decoding=\"async\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2024\/10\/DrayBreak-Webinar-Feature.jpg\" class=\"u-size-full\" loading=\"lazy\"><\/p>\n<h2 class=\"c-title \">Dray:Break<\/h2>\n<p>In 2024, routers are a primary target for cybercriminals and state-sponsored attackers \u2013 and are the riskiest device category on networks. We investigated one hardware vendor, DrayTek, with a history of security flaws to help it address its issues and prevent new attacks \u2014 especially when ransomware and denial of service attacks are so high today.<\/p>\n<p><a href=\"https:\/\/www.forescout.com\/research-labs\/draytek-dray-break\/\" title=\"Learn More\" class=\"c-btn c-btn--primary-dark has-icon icon-arrow-right icon-position-right has-icon-animation icon-animation-fade-in\">Learn More<\/a><\/p>\n<h2 class=\"c-title\">Meet Our Leaders<\/h2>\n<p><img decoding=\"async\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/09\/Daniel-dos-santos.png\" style=\"width:40%\" loading=\"lazy\"><\/p>\n<h3 style=\"text-align: center\">Daniel dos Santos<\/h3>\n<p style=\"text-align: center\">Daniel dos Santos is the Head of Research at Forescout Vedere Labs, where he leads a team of researchers that identifies new vulnerabilities and monitors active threats. He holds a PhD in computer science, has published over 35 peer-reviewed papers, has found or disclosed hundreds of CVEs \u2014 and is a frequent speaker at security conferences.<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/09\/Rik-Furgeson.png\" style=\"width:40%\" loading=\"lazy\"><\/p>\n<h3 style=\"text-align: center\">Rik Ferguson<\/h3>\n<p style=\"text-align: center\">Rik Ferguson is the Vice President of Security Intelligence at Forescout. He is also a founding Special Advisor to Europol\u2019s European Cyber Crime Centre (EC3), a multi-award-winning producer and writer, a Fellow of the Royal Society of the Arts and board advisor to startups. With 30 years of professional experience, Rik is a world-renowned speaker, and in April 2011 he was inducted into the Infosecurity Hall of Fame.<\/p>\n<h3 class=\"c-title\" style=\"text-align: center\">Vedere Labs Blog<\/h3>\n","protected":false},"excerpt":{"rendered":"<p>Forescout Research \u2013 Vedere Labs \u201cVedere\u201d is the Italian word meaning \u201cto see,\u201d which epitomizes the mission of Forescout Vedere Labs, the cybersecurity research arm of Forescout. Our team of global experts focuses on increasing visibility of cybersecurity threats and vulnerabilities for all connected asset types and providing mitigation steps organizations can use to protect [&hellip;]<\/p>\n","protected":false},"author":165,"featured_media":70473,"parent":0,"menu_order":98,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"ep_exclude_from_search":false,"footnotes":"","_links_to":"","_links_to_target":""},"coauthors":[712],"class_list":["post-70336","page","type-page","status-publish","has-post-thumbnail","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.8 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Forescout Research - Vedere Labs<\/title>\n<meta name=\"description\" content=\"Vedere Research Labs is the cybersecurity research arm of Forescout Technologies. This team of global experts focuses on threat and vulnerability research that is shared with the broader cybersecurity community, including cybersecurity agencies and other researchers, software organizations, and device manufacturers.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.forescout.com\/research-labs\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Forescout Research - Vedere Labs\" \/>\n<meta property=\"og:description\" content=\"Vedere Research Labs is the cybersecurity research arm of Forescout Technologies. This team of global experts focuses on threat and vulnerability research that is shared with the broader cybersecurity community, including cybersecurity agencies and other researchers, software organizations, and device manufacturers.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.forescout.com\/research-labs\/\" \/>\n<meta property=\"og:site_name\" content=\"Forescout\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ForescoutTechnologies\" \/>\n<meta property=\"article:modified_time\" content=\"2025-06-26T18:22:09+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2022\/02\/vedere-labs-press.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"382\" \/>\n\t<meta property=\"og:image:height\" content=\"274\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@Forescout\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"17 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.forescout.com\/research-labs\/\",\"url\":\"https:\/\/www.forescout.com\/research-labs\/\",\"name\":\"Forescout Research - Vedere Labs\",\"isPartOf\":{\"@id\":\"https:\/\/www.forescout.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.forescout.com\/research-labs\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.forescout.com\/research-labs\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.forescout.com\/wp-content\/uploads\/2022\/02\/vedere-labs-press.jpg\",\"datePublished\":\"2022-02-09T20:38:52+00:00\",\"dateModified\":\"2025-06-26T18:22:09+00:00\",\"description\":\"Vedere Research Labs is the cybersecurity research arm of Forescout Technologies. This team of global experts focuses on threat and vulnerability research that is shared with the broader cybersecurity community, including cybersecurity agencies and other researchers, software organizations, and device manufacturers.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.forescout.com\/research-labs\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.forescout.com\/research-labs\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.forescout.com\/research-labs\/#primaryimage\",\"url\":\"https:\/\/www.forescout.com\/wp-content\/uploads\/2022\/02\/vedere-labs-press.jpg\",\"contentUrl\":\"https:\/\/www.forescout.com\/wp-content\/uploads\/2022\/02\/vedere-labs-press.jpg\",\"width\":382,\"height\":274},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.forescout.com\/research-labs\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.forescout.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Vedere Labs\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.forescout.com\/#website\",\"url\":\"https:\/\/www.forescout.com\/\",\"name\":\"Forescout\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.forescout.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.forescout.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.forescout.com\/#organization\",\"name\":\"Forescout Technologies, Inc.\",\"url\":\"https:\/\/www.forescout.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.forescout.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.forescout.com\/wp-content\/uploads\/2019\/01\/forescout-logo.svg\",\"contentUrl\":\"https:\/\/www.forescout.com\/wp-content\/uploads\/2019\/01\/forescout-logo.svg\",\"width\":1,\"height\":1,\"caption\":\"Forescout Technologies, Inc.\"},\"image\":{\"@id\":\"https:\/\/www.forescout.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/ForescoutTechnologies\",\"https:\/\/x.com\/Forescout\",\"https:\/\/www.instagram.com\/forescouttechnologies\/\",\"https:\/\/www.linkedin.com\/company\/forescout-technologies\",\"https:\/\/www.youtube.com\/user\/forescout1\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Forescout Research - Vedere Labs","description":"Vedere Research Labs is the cybersecurity research arm of Forescout Technologies. This team of global experts focuses on threat and vulnerability research that is shared with the broader cybersecurity community, including cybersecurity agencies and other researchers, software organizations, and device manufacturers.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.forescout.com\/research-labs\/","og_locale":"en_US","og_type":"article","og_title":"Forescout Research - Vedere Labs","og_description":"Vedere Research Labs is the cybersecurity research arm of Forescout Technologies. This team of global experts focuses on threat and vulnerability research that is shared with the broader cybersecurity community, including cybersecurity agencies and other researchers, software organizations, and device manufacturers.","og_url":"https:\/\/www.forescout.com\/research-labs\/","og_site_name":"Forescout","article_publisher":"https:\/\/www.facebook.com\/ForescoutTechnologies","article_modified_time":"2025-06-26T18:22:09+00:00","og_image":[{"width":382,"height":274,"url":"https:\/\/www.forescout.com\/wp-content\/uploads\/2022\/02\/vedere-labs-press.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_site":"@Forescout","twitter_misc":{"Est. reading time":"17 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.forescout.com\/research-labs\/","url":"https:\/\/www.forescout.com\/research-labs\/","name":"Forescout Research - Vedere Labs","isPartOf":{"@id":"https:\/\/www.forescout.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.forescout.com\/research-labs\/#primaryimage"},"image":{"@id":"https:\/\/www.forescout.com\/research-labs\/#primaryimage"},"thumbnailUrl":"https:\/\/www.forescout.com\/wp-content\/uploads\/2022\/02\/vedere-labs-press.jpg","datePublished":"2022-02-09T20:38:52+00:00","dateModified":"2025-06-26T18:22:09+00:00","description":"Vedere Research Labs is the cybersecurity research arm of Forescout Technologies. This team of global experts focuses on threat and vulnerability research that is shared with the broader cybersecurity community, including cybersecurity agencies and other researchers, software organizations, and device manufacturers.","breadcrumb":{"@id":"https:\/\/www.forescout.com\/research-labs\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.forescout.com\/research-labs\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.forescout.com\/research-labs\/#primaryimage","url":"https:\/\/www.forescout.com\/wp-content\/uploads\/2022\/02\/vedere-labs-press.jpg","contentUrl":"https:\/\/www.forescout.com\/wp-content\/uploads\/2022\/02\/vedere-labs-press.jpg","width":382,"height":274},{"@type":"BreadcrumbList","@id":"https:\/\/www.forescout.com\/research-labs\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.forescout.com\/"},{"@type":"ListItem","position":2,"name":"Vedere Labs"}]},{"@type":"WebSite","@id":"https:\/\/www.forescout.com\/#website","url":"https:\/\/www.forescout.com\/","name":"Forescout","description":"","publisher":{"@id":"https:\/\/www.forescout.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.forescout.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.forescout.com\/#organization","name":"Forescout Technologies, Inc.","url":"https:\/\/www.forescout.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.forescout.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.forescout.com\/wp-content\/uploads\/2019\/01\/forescout-logo.svg","contentUrl":"https:\/\/www.forescout.com\/wp-content\/uploads\/2019\/01\/forescout-logo.svg","width":1,"height":1,"caption":"Forescout Technologies, Inc."},"image":{"@id":"https:\/\/www.forescout.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/ForescoutTechnologies","https:\/\/x.com\/Forescout","https:\/\/www.instagram.com\/forescouttechnologies\/","https:\/\/www.linkedin.com\/company\/forescout-technologies","https:\/\/www.youtube.com\/user\/forescout1"]}]}},"featured_media_url":"https:\/\/www.forescout.com\/wp-content\/uploads\/2022\/02\/vedere-labs-press.jpg","is_file":false,"excerpt_manually_set":false,"_links":{"self":[{"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/pages\/70336","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/users\/165"}],"replies":[{"embeddable":true,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/comments?post=70336"}],"version-history":[{"count":0,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/pages\/70336\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/media\/70473"}],"wp:attachment":[{"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/media?parent=70336"}],"wp:term":[{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/coauthors?post=70336"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}