{"id":70688,"date":"2022-03-10T08:55:47","date_gmt":"2022-03-10T16:55:47","guid":{"rendered":"https:\/\/forescoutstage.wpengine.com\/research-labs-overview-copy\/"},"modified":"2025-08-01T13:04:11","modified_gmt":"2025-08-01T17:04:11","slug":"threat-briefings","status":"publish","type":"page","link":"https:\/\/www.forescout.com\/threat-briefings\/","title":{"rendered":"Threat Reports Overview"},"content":{"rendered":"<h1>Forescout Research \u2013<br \/>\nThreat Reports<\/h1>\n<h3>What We Are Monitoring<\/h3>\n<p>Forescout\u2019s Vedere Labs threat research team issues threat reports about topical cyber activities, attacks or vulnerabilities that impact the cybersecurity community at large. The reports include a summary of the incidents and main threat actors, followed by a technical analysis of each incident, list of common vulnerabilities and exposures (CVEs) and affected software, indicators of compromise (IOCs) and mitigation recommendations.<\/p>\n<p>Subscribe to Threat Notifications <\/p>\n<p>\u00a0<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2025\/07\/VL-2025H1-Threat-Review-report-cover.webp\" alt=\"2025H1 Threat Review Report Cover\" loading=\"lazy\"><\/p>\n<h3 class=\"c-title-small u-color-primary-900\">2025H1 Threat Review<\/h3>\n<p>Once again, here is a midyear lens with a macro look at the most pressing cybersecurity risks to date. From 3,649 ransomware attacks to state-sponsored intrusions to new trends in lateral movement, here are the new threat patterns and cyber attack behavior you need to know right now.<\/p>\n<ul class=\"o-list-bare o-flow o-flow--small u-m-0\">\n<li><a href=\"https:\/\/www.forescout.com\/research-labs\/2025h1-threat-review\/\" title=\"Overview\" class=\"c-btn c-btn--primary c-btn--link\">Overview<\/a><\/li>\n<li><a href=\"https:\/\/www.forescout.com\/blog\/midyear-threat-report-numbers-grow-in-nearly-all-the-wrong-places\/\" title=\"Blog\" class=\"c-btn c-btn--primary c-btn--link\">Blog<\/a><\/li>\n<li><a href=\"https:\/\/www.forescout.com\/press-releases\/forescout-2025h1-threat-review-highlights-surge-in-zero-day-exploits-nation-backed-hacktivism-and-healthcare-vulnerabilities\/\" title=\"Press Release\" class=\"c-btn c-btn--primary c-btn--link\">Press Release<\/a><\/li>\n<li><a href=\"https:\/\/www.forescout.com\/resources\/2025h1-threat-review\/\" title=\"Report (PDF)\" class=\"c-btn c-btn--primary c-btn--link\">Report (PDF)<\/a><\/li>\n<li><a href=\"https:\/\/www.forescout.com\/resources\/2025h1-threat-review-presentation\/\" title=\"Presentation (PDF)\" class=\"c-btn c-btn--primary c-btn--link\">Presentation (PDF)<\/a><\/li>\n<\/ul>\n<p><img decoding=\"async\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2025\/04\/The-rise-of-state-sponsored-hacktivism_2025-report-thumbnail_Page_01.jpg\" loading=\"lazy\"><\/p>\n<h3 class=\"c-title-small u-color-primary-900\">The Rise of State-Sponsored Hacktivism<\/h3>\n<p><strong>April 29, 2025<\/strong><br \/>\nHacktivism is increasingly intertwined with state interests. In a new threat briefing, we analyze 780 hacktivist attacks by four major groups.\n\n<ul class=\"o-list-bare o-flow o-flow--small u-m-0\">\n<li><a href=\"https:\/\/www.forescout.com\/webinars\/the-rise-of-state-sponsored-hacktivism\/\" title=\"Webinar\" class=\"c-btn c-btn--primary c-btn--link\">Webinar<\/a><\/li>\n<li><a href=\"https:\/\/www.forescout.com\/blog\/the-state-of-state-sponsored-hacktivist-attacks\/\" title=\"Blog\" class=\"c-btn c-btn--primary c-btn--link\">Blog<\/a><\/li>\n<li><a href=\"https:\/\/www.forescout.com\/press-releases\/forescout-announces-rise-in-state-sponsored-hacktivism\/\" title=\"Press Release\" class=\"c-btn c-btn--primary c-btn--link\">Press Release<\/a><\/li>\n<li><a href=\"https:\/\/www.forescout.com\/resources\/the-rise-of-state-sponsored-hacktivism\/\" title=\"Report (PDF)\" class=\"c-btn c-btn--primary c-btn--link\">Report (PDF)<\/a><\/li>\n<\/ul>\n<p><img decoding=\"async\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2025\/03\/Riskiest-2025-Report-Cover-V2.webp\" loading=\"lazy\"><\/p>\n<h3 class=\"c-title-small u-color-primary-900\">The Riskiest Connected Devices of 2025<\/h3>\n<p><strong>April 9, 2025<\/strong><br \/>\nThis year, 12 brand-new asset types make the list. It is the largest year-over-year change in the report\u2019s history. See the results.\n\n<p><a href=\"https:\/\/www.forescout.com\/research-labs\/the-riskiest-devices-of-2025\/\" class=\"c-read-more\"><\/a><\/p>\n<ul class=\"o-list-bare o-flow o-flow--small u-m-0\">\n<li><a href=\"https:\/\/www.forescout.com\/research-labs\/the-riskiest-devices-of-2025\/\" title=\"Overview\" class=\"c-btn c-btn--primary c-btn--link\">Overview<\/a><\/li>\n<li><a href=\"https:\/\/www.forescout.com\/webinars\/riskiest-devices-2025-webinar\/\" title=\"Webinar\" class=\"c-btn c-btn--primary c-btn--link\">Webinar<\/a><\/li>\n<li><a href=\"https:\/\/www.forescout.com\/blog\/the-riskiest-devices-of-2025-12-brand-new-asset-types-arrive\/\" title=\"Blog\" class=\"c-btn c-btn--primary c-btn--link\">Blog<\/a><\/li>\n<li><a href=\"https:\/\/www.forescout.com\/press-releases\/forescout-announces-riskiest-connected-devices-of-2025-iomt-devices-increasingly-vulnerable\/\" title=\"Press Release\" class=\"c-btn c-btn--primary c-btn--link\">Press Release<\/a><\/li>\n<li><a href=\"https:\/\/www.forescout.com\/resources\/riskiest-devices-2025-report\/\" title=\"Report (PDF)\" class=\"c-btn c-btn--primary c-btn--link\" target=\"_blank\">Report (PDF)<\/a><\/li>\n<li><a href=\"https:\/\/www.forescout.com\/resources\/riskiest-devices-2025-presentation\/\" title=\"Presentation (PDF)\" class=\"c-btn c-btn--primary c-btn--link\" target=\"_blank\">Presentation (PDF)<\/a><\/li>\n<\/ul>\n<p><img decoding=\"async\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2025\/01\/2024-Threat-Roundup-Report-Cover-540x700-1.webp\" loading=\"lazy\"><\/p>\n<h3 class=\"c-title-small u-color-primary-900\">2024 Threat Roundup: Top Cybersecurity Trends from Vedere Labs<\/h3>\n<p><strong>January 27, 2025<\/strong><br \/>\nForescout Research shares the top cybersecurity trends in its annual threat report that tracks cyber attacks by country and by vertical.\n\n<p><a href=\"https:\/\/www.forescout.com\/research-labs\/2024-threat-roundup\/\" class=\"c-read-more\"><\/a><\/p>\n<ul class=\"o-list-bare o-flow o-flow--small u-m-0\">\n<li><a href=\"https:\/\/www.forescout.com\/research-labs\/2024-threat-roundup\/\" title=\"Overview\" class=\"c-btn c-btn--primary c-btn--link\">Overview<\/a><\/li>\n<li><a href=\"https:\/\/www.forescout.com\/webinars\/2024-threat-roundup-evolving-attacks-on-critical-infrastructure\/\" title=\"Webinar\" class=\"c-btn c-btn--primary c-btn--link\">Webinar<\/a><\/li>\n<li><a href=\"https:\/\/www.forescout.com\/blog\/our-2024-threat-report-attack-volume-up-114\/\" title=\"Blog\" class=\"c-btn c-btn--primary c-btn--link\">Blog<\/a><\/li>\n<li><a href=\"https:\/\/www.forescout.com\/press-releases\/forescout-announces-2024-threat-roundup-report\/\" title=\"Press Release\" class=\"c-btn c-btn--primary c-btn--link\">Press Release<\/a><\/li>\n<li><a href=\"https:\/\/www.forescout.com\/resources\/2024-global-threat-roundup-report\/\" title=\"Full Report (PDF)\" class=\"c-btn c-btn--primary c-btn--link\" target=\"_blank\">Full Report (PDF)<\/a><\/li>\n<\/ul>\n<p><img decoding=\"async\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2025\/01\/hunters-international-threat-briefing-thumbnail.webp\" loading=\"lazy\"><\/p>\n<h3 class=\"c-title-small u-color-primary-900\">Anatomy of an Attack: Hunters International Ransomware<\/h3>\n<p><strong>January 9, 2025<\/strong><br \/>\nForescout Research analyzes an attack it discovered using Hunters International ransomware. See what was discovered in detail and how to mitigate.\n\n<ul class=\"o-list-bare o-flow o-flow--small u-m-0\">\n<li><a href=\"\/resources\/anatomy-of-an-attack-hunters-international-ransomware\/\" title=\"Threat Briefing (PDF)\" class=\"c-btn c-btn--primary c-btn--link\" target=\"_blank\">Threat Briefing (PDF)<\/a><\/li>\n<li><a href=\"\/blog\/hunters-international-ransomware-what-we-learned-from-an-oracle-ws-attack\/\" title=\"Blog\" class=\"c-btn c-btn--primary c-btn--link\">Blog<\/a><\/li>\n<\/ul>\n<p><img decoding=\"async\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2024\/10\/iomt-report_THM-1.jpg\" loading=\"lazy\"><\/p>\n<h3 class=\"c-title-small u-color-primary-900\">Unveiling the Persistent Risk of Connected Medical Devices<\/h3>\n<p><strong>October 29, 2024<\/strong><br \/>\nRansomware has been wreaking havoc in 2024. If networks at hospitals are shut down, patients suffer. Life-saving surgeries are postponed. Patient monitoring returns to pen and paper. Insurance approvals and billing systems become inoperative.\n\n<ul class=\"o-list-bare o-flow o-flow--small u-m-0\">\n<li><a href=\"\/research-labs\/risk-of-connected-medical-devices\/\" title=\"Overview\" class=\"c-btn c-btn--primary c-btn--link\">Overview<\/a><\/li>\n<li><a href=\"\/webinars\/persistent-risk-of-connected-medical-devices-main\/\" title=\"Webinar\" class=\"c-btn c-btn--primary c-btn--link\">Webinar<\/a><\/li>\n<li><a href=\"\/resources\/iomt-persistent-risk-report\/\" title=\"Research Report (PDF)\" class=\"c-btn c-btn--primary c-btn--link\" target=\"_blank\">Research Report (PDF)<\/a><\/li>\n<li><a href=\"\/blog\/research-isolating-the-persistent-risk-of-iomt-devices\/\" title=\"Blog\" class=\"c-btn c-btn--primary c-btn--link\">Blog<\/a><\/li>\n<li><a href=\"\/press-releases\/forescout-vedere-labs-unveils-riskiest-connected-medical-devices\/\" title=\"Press Release\" class=\"c-btn c-btn--primary c-btn--link\">Press Release<\/a><\/li>\n<\/ul>\n<p><img decoding=\"async\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2024\/08\/Perils-in-the-Periphery_Ransomware-thm-1.jpg\" loading=\"lazy\"><\/p>\n<h3 class=\"c-title-small u-color-primary-900\">2024H1 Threat Review: Perils in the Periphery<\/h3>\n<p><strong>Aug. 29, 2024<\/strong><br \/>\nIn this mid-year report, we find threat patterns and isolate changes in cyber attack behavior. Most importantly, we can see how and where they are doing it. Right now, it is happening in your unmanaged network perimeter via VPNs and network appliance vulnerabilities. Which VPN vendors? Who are the threat actors? Which countries and industries are most targeted? See all. Know more.\n\n<ul class=\"o-list-bare o-flow o-flow--small u-m-0\">\n<li><a href=\"\/research-labs\/2024h1-threat-review\/\" title=\"Overview\" class=\"c-btn c-btn--primary c-btn--link\">Overview<\/a><\/li>\n<li><a href=\"\/resources\/2024h1-threat-review\/\" title=\"Research Report (PDF)\" class=\"c-btn c-btn--primary c-btn--link\" target=\"_blank\">Research Report (PDF)<\/a><\/li>\n<li><a href=\"\/blog\/vpn-vulnerabilities-cyber-attacks\/\" title=\"Blog\" class=\"c-btn c-btn--primary c-btn--link\">Blog<\/a><\/li>\n<li><a href=\"\/press-releases\/2024h1-threat-report\/\" title=\"Press Release\" class=\"c-btn c-btn--primary c-btn--link\">Press Release<\/a><\/li>\n<\/ul>\n<p><img decoding=\"async\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2024\/08\/rough-around-the-edges-THM.jpg\" loading=\"lazy\"><\/p>\n<h3 class=\"c-title-small u-color-primary-900\">Rough Around the Edges: Top Router Firmware Vulnerabilities<\/h3>\n<p><strong>Aug. 6, 2024<\/strong><br \/>\nIn this joint research with Finite State, we explore today\u2019s firmware vulnerabilities from a range of popular cellular routers. We spotlight the hidden risks within outdated open-source software components \u2013 and explore the chaos introduced by vendors with custom patching.\n\n<ul class=\"o-list-bare o-flow o-flow--small u-m-0\">\n<li><a href=\"\/research-labs\/ot-iot-routers-in-the-software-supply-chain\/\" title=\"Overview\" class=\"c-btn c-btn--primary c-btn--link\">Overview<\/a><\/li>\n<li><a href=\"\/research-labs\/ot-iot-routers-in-the-software-supply-chain\/\" title=\"Research Report (PDF)\" class=\"c-btn c-btn--primary c-btn--link\">Research Report (PDF)<\/a><\/li>\n<li><a href=\"\/webinars\/rough-around-the-edges-webinar\/\" title=\"Webinar\" class=\"c-btn c-btn--primary c-btn--link\">Webinar<\/a><\/li>\n<li><a href=\"\/blog\/firmware-vulnerabilities-run-rampant-in-cellular-routers\/\" title=\"Blog\" class=\"c-btn c-btn--primary c-btn--link\">Blog<\/a><\/li>\n<li><a href=\"\/press-releases\/ot-iot-router-firmware-outdated-software-vulnerabilities\/\" title=\"Press Release\" class=\"c-btn c-btn--primary c-btn--link\">Press Release<\/a><\/li>\n<\/ul>\n<p><img decoding=\"async\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2024\/06\/riskiest-devices-THM-1.jpg\" loading=\"lazy\"><\/p>\n<h3 class=\"c-title-small u-color-primary-900\">2024 Riskiest Devices<\/h3>\n<p><strong>Jun. 10, 2024<\/strong><br \/>\nIn 2024, attackers are crossing OT and IT siloes to find entry points across the full spectrum of devices, operating systems and embedded firmware. This year marks our fourth annual Riskiest Connected Devices report detailing the most concerning assets in the enterprise across 10 major vertical industries and by global region.\n\n<ul class=\"o-list-bare o-flow o-flow--small u-m-0\">\n<li><a href=\"\/research-labs\/riskiest-devices\/\" title=\"Overview\" class=\"c-btn c-btn--primary c-btn--link\">Overview<\/a><\/li>\n<li><a href=\"\/blog\/what-are-the-riskiest-connected-devices-right-now\/\" title=\"Blog\" class=\"c-btn c-btn--primary c-btn--link\">Blog<\/a><\/li>\n<li><a href=\"\/resources\/2024-riskiest-connected-devices\/\" title=\"Report (PDF)\" class=\"c-btn c-btn--primary c-btn--link\" target=\"_blank\">Report (PDF)<\/a><\/li>\n<li><a href=\"\/webinars\/2024-riskiest-devices-ams\/\" title=\"Webinar\" class=\"c-btn c-btn--primary c-btn--link\">Webinar<\/a><\/li>\n<\/ul>\n<p><img decoding=\"async\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2024\/04\/Better-safe-than-sorry.png\" loading=\"lazy\"><\/p>\n<h3 class=\"c-title-small u-color-primary-900\">Better Safe Than Sorry &#8211; Proactively identifying at-risk, internet-exposed OT\/ICS<\/h3>\n<p><strong>Apr. 23, 2024<\/strong><br \/>\nA recent wave of attacks by the Iranian-affiliated Cyber Av3ngers hacktivist group targeted Israeli-made Unitronics Programmable Logic Controllers (PLCs) around the world. Our research takes a fresh look at the topic by examining the nuanced evolution of exposed OT\/ICS data from 2017<br \/>\nto 2024.\n\n<ul class=\"o-list-bare o-flow o-flow--small u-m-0\">\n<li><a href=\"\/research-labs\/better-safe-than-sorry\/\" title=\"Overview\" class=\"c-btn c-btn--primary c-btn--link\">Overview<\/a><\/li>\n<li><a href=\"\/blog\/cybersecurity-threat-evolution-of-otics-and-iot-devices\/\" title=\"Blog\" class=\"c-btn c-btn--primary c-btn--link\">Blog<\/a><\/li>\n<li><a href=\"\/resources\/better-safe-than-sorry-proactively-identifying-at-risk-internet-exposed-otics\/\" title=\"Report (PDF)\" class=\"c-btn c-btn--primary c-btn--link\" target=\"_blank\">Report (PDF)<\/a><\/li>\n<li><a href=\"\/webinars\/the-emergence-of-exposed-ics-trends-threats-and-best-practices\/\" title=\"Webinar\" class=\"c-btn c-btn--primary c-btn--link\">Webinar<\/a><\/li>\n<\/ul>\n<p><img decoding=\"async\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2024\/04\/connect-fun-report-thm.jpg\" loading=\"lazy\"><\/p>\n<h3 class=\"c-title-small u-color-primary-900\">Connect:fun Detailing an exploitation campaign targeting FortiClient EMS via CVE-2023-48788<\/h3>\n<p><strong>Apr. 11, 2024<\/strong><\/p>\n<p>In a new threat briefing, Forescout Research \u2013 Vedere Labs details an exploitation campaign targeting organizations running Fortinet\u2019s FortiClient EMS which is vulnerable to CVE-2023-48788. We are designating this campaign Connect:fun because of the use of ScreenConnect and Powerfun as post-exploitation tools \u2013 our first-ever named campaign\u2026<\/p>\n<ul class=\"o-list-bare o-flow o-flow--small u-m-0\">\n<li><a href=\"\/blog\/connectfun-new-exploit-campaign-in-the-wild-targets-media-company\/\" title=\"Read Blog\" class=\"c-btn c-btn--primary c-btn--link\">Read Blog<\/a><\/li>\n<li><a href=\"\/resources\/connectfun-threat-briefing\/\" title=\"Access Report\" class=\"c-btn c-btn--primary c-btn--link\" target=\"_blank\">Access Report<\/a><\/li>\n<\/ul>\n<p><img decoding=\"async\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2024\/01\/FS-2024-VL-Threat-Round-Up-Thumb-v1-440x554-1.png\" loading=\"lazy\"><\/p>\n<h3 class=\"c-title-small u-color-primary-900\">2023 Global Threat Roundup Report: Trends in cyberattacks, exploits, and malware<\/h3>\n<p><strong>Jan. 24, 2024<\/strong><\/p>\n<p>Throughout last year, the ongoing conflicts and the emergence of new ones, alongside the exploitation of critical vulnerabilities and the growing threat of cybercrime, stood out as pivotal events. Forescout Research \u2013 Vedere Labs conducted a thorough analysis of attack-related data and the 2023 threat landscape impacting critical infrastructure. The result is a detailed report providing organizations with tactical insights and strategic recommendations to fortify their defense strategies.<\/p>\n<ul class=\"o-list-bare o-flow o-flow--small u-m-0\">\n<li><a href=\"\/blog\/2023-threat-roundup\/%20\" title=\"Read Blog\" class=\"c-btn c-btn--primary c-btn--link\">Read Blog<\/a><\/li>\n<li><a href=\"\/resources\/research-report_2023-threat-roundup\/%20\" title=\"Access Report\" class=\"c-btn c-btn--primary c-btn--link\" target=\"_blank\">Access Report<\/a><\/li>\n<li><a href=\"\/webinars\/2023-threat-roundup-report\/\" title=\"Watch Webinar\" class=\"c-btn c-btn--primary c-btn--link\">Watch Webinar<\/a><\/li>\n<li><a href=\"\/research-labs\/2023-threat-roundup\/\" title=\"Learn More\" class=\"c-btn c-btn--primary c-btn--link\">Learn More<\/a><\/li>\n<\/ul>\n<p><img decoding=\"async\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2024\/01\/FS-2024-VL-Fog-of-War-Report-Thumb-v1-440x554-1.png\" loading=\"lazy\"><\/p>\n<h3 class=\"c-title-small u-color-primary-900\">Clearing the Fog of War<\/h3>\n<p><strong>Jan. 11, 2024<\/strong><\/p>\n<p>During geopolitical conflict, criminals, state-sponsored actors and other adversaries take advantage of the chaos to drive new vulnerabilities into the cyber-landscape. In two distinct regions, Denmark and Ukraine, the energy sector has fallen victim. Forescout Research \u2013 Vedere Labs conducted an independent analysis of these attacks, delivering new insights and new evidence of the root causes and published its findings in this report, \u201cClearing the Fog of War.\u201d<\/p>\n<ul class=\"o-list-bare o-flow o-flow--small u-m-0\">\n<li><a href=\"\/blog\/analysis-of-energy-sector-cyberattacks-in-denmark-and-ukraine\/\" title=\"Read Blog\" class=\"c-btn c-btn--primary c-btn--link\">Read Blog<\/a><\/li>\n<li><a href=\"\/resources\/clearing-the-fog-of-war\/\" title=\"Access Report\" class=\"c-btn c-btn--primary c-btn--link\" target=\"_blank\">Access Report<\/a><\/li>\n<\/ul>\n<p><img decoding=\"async\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/10\/FS-2023-Dark-Gate-Report-VL-Thumb-v1-440x554-1.png\" loading=\"lazy\"><\/p>\n<h3 class=\"c-title-small u-color-primary-900\">DarkGate Loader Malspam Campaign<\/h3>\n<p><strong>Oct. 4, 2023<\/strong><\/p>\n<p>Forescout Vedere Labs has been tracking a new phishing campaign that is abusing Microsoft Teams functionality to send malicious attachments. This Instant Messaging Spam campaign (often called SPIM) was first observed in late August 2023, when Microsoft Teams phishing messages were seen being sent using compromised external Office 365 accounts to other unconnected organizations.<\/p>\n<ul class=\"o-list-bare o-flow o-flow--small u-m-0\">\n<li><a href=\"\/blog\/darkgate-loader-delivered-via-microsoft-teams-how-it-works-how-to-mitigate-it\/\" title=\"Read Blog\" class=\"c-btn c-btn--primary c-btn--link\">Read Blog<\/a><\/li>\n<li><a href=\"\/resources\/darkgate-loader-malspam-campaign\/\" title=\"Access Report\" class=\"c-btn c-btn--primary c-btn--link\" target=\"_blank\">Access Report<\/a><\/li>\n<\/ul>\n<p><img decoding=\"async\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/09\/FS-2023-Vedere-Labs-H1-Threat-Thumb-v1-440x554-1.png\" loading=\"lazy\"><\/p>\n<h3 class=\"c-title-small u-color-primary-900\">2023H1 Threat Review: Vulnerabilities, Threat Actors and Malware<\/h3>\n<p><strong>Sept. 6, 2023<\/strong><\/p>\n<p>Forescout Vedere Labs looks back at the most relevant cybersecurity events and data during 2023H1 to shed light on the evolving threat landscape and offer mitigation steps. Observations involving building automation devices, network infrastructure and NAS devices confirm increasing threats to unmanaged devices.<\/p>\n<ul class=\"o-list-bare o-flow o-flow--small u-m-0\">\n<li><a href=\"\/blog\/2023h1-threat-review-vulnerabilities-threat-actors-malware\/\" title=\"Read Blog\" class=\"c-btn c-btn--primary c-btn--link\">Read Blog<\/a><\/li>\n<li><a href=\"\/resources\/2023h1-threat-review\/\" title=\"Access Report\" class=\"c-btn c-btn--primary c-btn--link\" target=\"_blank\">Access Report<\/a><\/li>\n<\/ul>\n<p><img decoding=\"async\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/07\/FS-2023-Vedere-Labs-Riskiest-Devices-Thumb-v1-440x554-1.png\" alt=\"Vedere Labs Riskiest Devices\" loading=\"lazy\"><\/p>\n<h3 class=\"c-title-small u-color-primary-900\">The Riskiest Connected Devices in 2023<\/h3>\n<p><strong>Jul. 13, 2023<\/strong><\/p>\n<p>Since 2020, Forescout Research has been tracking the riskiest devices on organizations\u2019 networks. Our reports are entirely based on data coming directly from connected devices. Throughout the years, we have noticed that although many device types are consistently in these lists \u2013 such as IP cameras, VoIP equipment and programmable logic controllers (PLCs) \u2013 due either to their inherent criticality or to the persistent lack of attention from security teams, there are other devices whose current risk level reflect developments in the threat landscape.<\/p>\n<ul class=\"o-list-bare o-flow o-flow--small u-m-0\">\n<li><a href=\"\/blog\/riskiest-connected-devices-it-iot-ot-iomt\/\" title=\"Read Blog\" class=\"c-btn c-btn--primary c-btn--link\">Read Blog<\/a><\/li>\n<li><a href=\"\/resources\/the-riskiest-connected-devices-in-2023\/\" title=\"Access Report\" class=\"c-btn c-btn--primary c-btn--link\" target=\"_blank\">Access Report<\/a><\/li>\n<\/ul>\n<p><img decoding=\"async\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/06\/FS-2023-MOVEit-Report-Thumb-v1-440x554-1.png\" alt=\"MOVEit Report\" loading=\"lazy\"><\/p>\n<h3 class=\"c-title-small u-color-primary-900\"> Mass Exploitation of MOVEit Transfer Critical Vulnerability<\/h3>\n<p><strong>Jun. 13, 2023<\/strong><\/p>\n<p>This report analyzes the mass exploitation of CVE-2023-34362, a critical vulnerability in MOVEit Transfer software, a widely adopted managed file transfer (MFT) solution that enables organizations to securely exchange files with their business partners and customers.<\/p>\n<ul class=\"o-list-bare o-flow o-flow--small u-m-0\">\n<li><a href=\"\/resources\/mass-exploitation-of-moveit-transfer-critical-vulnerability\/\" title=\"Access Report\" class=\"c-btn c-btn--primary c-btn--link\" target=\"_blank\">Access Report<\/a><\/li>\n<li><a href=\"\/blog\/mass-exploitation-of-moveit-transfer-critical-vulnerability\/\" title=\"Read Blog\" class=\"c-btn c-btn--primary c-btn--link\">Read Blog<\/a><\/li>\n<\/ul>\n<p><img decoding=\"async\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/03\/FS-2023-Threat-Roundup-Thumb-v1-440x554-1.png\" alt=\"Threat Roundup\" loading=\"lazy\"><\/p>\n<h3 class=\"c-title-small u-color-primary-900\">2022 Threat Roundup Report: The Emergence of Mixed IT\/IoT Threats<\/h3>\n<p><strong>Mar. 28, 2023<\/strong><\/p>\n<p>In 2022, cyberattacks grew in intensity, sophistication and frequency. The adoption of new connected devices by organizations in 2023 is likely to pose even greater challenges. To help organizations of all sizes prepare, Forescout\u2019s Vedere Labs has analyzed data gathered in 2022 about cyberattacks, exploits and malware and shared insights via our 2022 Threat Roundup.<\/p>\n<ul class=\"o-list-bare o-flow o-flow--small u-m-0\">\n<li><a href=\"\/research-labs\/2022-threat-roundup\/\" title=\"Overview\" class=\"c-btn c-btn--primary c-btn--link\">Overview<\/a><\/li>\n<li><a href=\"\/resources\/2022-threat-roundup-report-the-emergence-of-mixed-itiot-threats\/\" title=\"Access Report\" class=\"c-btn c-btn--primary c-btn--link\" target=\"_blank\">Access Report<\/a><\/li>\n<li><a href=\"\/blog\/2022-threat-roundup-the-emergence-of-mixed-itiot-threats\/\" title=\"Read Blog\" class=\"c-btn c-btn--primary c-btn--link\">Read Blog<\/a><\/li>\n<li><a href=\"\/webinars\/2022-threat-roundup-the-emergence-of-mixed-it-iot-threats\/\" title=\"Watch Webinar\" class=\"c-btn c-btn--primary c-btn--link\">Watch Webinar<\/a><\/li>\n<\/ul>\n<p><img decoding=\"async\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/03\/FS-2023-Threat-Briefing-Thumb-TTP-v1.png\" alt=\"Common Ransomware TTPS\" loading=\"lazy\"><\/p>\n<h3 class=\"c-title-small u-color-primary-900\">Common Ransomware TTPS<\/h3>\n<p><strong>Mar. 22, 2023<\/strong><\/p>\n<p>Forescout\u2019s Vedere Labs analyzes TTPs commonly used in ransomware attacks and gives specific mitigation recommendations, including detection with Forescout XDR. While the TTPs used have remained mostly constant, ransomware has been evolving rapidly since 2020, with the increased use of double extortion, zero-day exploits and targeted attacks on specific organizations vs. casting a wide net.<\/p>\n<ul class=\"o-list-bare o-flow o-flow--small u-m-0\">\n<li><a href=\"\/resources\/common-ransomware-ttps-threat-briefing\/\" title=\"Access Report\" class=\"c-btn c-btn--primary c-btn--link\" target=\"_blank\">Access Report<\/a><\/li>\n<li><a href=\"\/blog\/ttps-how-to-prevent-and-detect-ransomware-attacks\/\" title=\"Read Blog\" class=\"c-btn c-btn--primary c-btn--link\">Read Blog<\/a><\/li>\n<\/ul>\n<p><img decoding=\"async\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/03\/esxi-servers.jpg\" alt=\"VMWare Esxi Servers Threat Report\" loading=\"lazy\"><\/p>\n<h3 class=\"c-title-small u-color-primary-900\">VMware ESXi Servers: A Major Attack Vector for Ransomware<\/h3>\n<p><strong>Mar. 9, 2023<\/strong><\/p>\n<p>Vedere Labs provides details on the recent ransomware campaign targeting VMware ESXi virtualization servers, or hypervisors, and analyzes two payloads used in these attacks: variants of the Royal and Clop ransomware. We also present the TTPs used by attackers in this campaign, discuss mitigation recommendations and list IOCs that can be used for detection or threat hunting.<\/p>\n<ul class=\"o-list-bare o-flow o-flow--small u-m-0\">\n<li><a href=\"\/resources\/threat-briefing-vmware-esxi-servers\/\" title=\"Access Report\" class=\"c-btn c-btn--primary c-btn--link\" target=\"_blank\">Access Report<\/a><\/li>\n<li><a href=\"\/blog\/vmware-esxi-servers-a-major-attack-vector-for-ransomware\/\" title=\"Read Blog\" class=\"c-btn c-btn--primary c-btn--link\">Read Blog<\/a><\/li>\n<\/ul>\n<p><img decoding=\"async\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/01\/FS-2023-Threat-Briefing-Thumb-Royal-Ransom.png\" loading=\"lazy\"><\/p>\n<h3 class=\"c-title-small u-color-primary-900\">Royal Ransomware \u2013 Analysis of One of the Most Active Ransomware Groups in Late 2022 and Early 2023<\/h3>\n<p><strong>Jan. 10, 2023<\/strong><\/p>\n<p>The Royal ransomware threat actor group, initially tracked as DEV-0569, emerged in early 2022 and has been very active in late 2022-early 2023. It uses double extortion to gain access to a victim\u2019s environment, encrypt their data, exfiltrate sensitive data and demand a ransom to decrypt files. This report analyzes the group\u2019s encryptor payload and TTPs and presents threat hunting opportunities for network defenders.<\/p>\n<ul class=\"o-list-bare o-flow o-flow--small u-m-0\">\n<li><a href=\"\/resources\/royal-ransomeware-report\/\" title=\"Access Report\" class=\"c-btn c-btn--primary c-btn--link\" target=\"_blank\">Access Report<\/a><\/li>\n<li><a href=\"\/blog\/royal-ransomware-analysis-of-one-of-the-most-active-ransomware-groups\/\" title=\"Read Blog\" class=\"c-btn c-btn--primary c-btn--link\">Read Blog<\/a><\/li>\n<\/ul>\n<p><img decoding=\"async\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2022\/11\/FS-2022-Threat-Briefing-Thumbnails-Hacktivist.png\" loading=\"lazy\"><\/p>\n<h3 class=\"c-title-small u-color-primary-900\">The Increasing Threat Posed by Hacktivist Attacks: An Analysis of Targeted Organizations, Devices and TTPs<\/h3>\n<p><strong>Dec. 1, 2022<\/strong><\/p>\n<p>Hacktivists expanded their arsenal in 2022 to become much more than a nuisance to critical infrastructure owners \u2013 and reach into unexpected industries thanks to the widespread use of IoT and OT equipment. This report describes examples of active hacktivist groups; presents the device types, specific models and protocols these groups have targeted; discusses their TTPs and provides mitigation recommendations.<\/p>\n<ul class=\"o-list-bare o-flow o-flow--small u-m-0\">\n<li><a href=\"\/resources\/threat-report-the-increasing-threat-posed-by-hacktivist-attacks\/\" title=\"Access Report\" class=\"c-btn c-btn--primary c-btn--link\" target=\"_blank\">Access Report<\/a><\/li>\n<li><a href=\"\/blog\/the-increasing-threat-posed-by-hacktivist-attacks-an-analysis-of-targeted-organizations-devices-and-ttps\/\" title=\"Read Blog\" class=\"c-btn c-btn--primary c-btn--link\">Read Blog<\/a><\/li>\n<\/ul>\n<p><img decoding=\"async\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2022\/10\/FS-2022-Riskiest-Devices-Social-v3-440x554-1.png\" alt=\"Threat Briefing: Riskiest Devices\" loading=\"lazy\"><\/p>\n<h3 class=\"c-title-small u-color-primary-900\">The Riskiest Connected Devices in Enterprise Networks<\/h3>\n<p><strong>Oct. 12, 2022<\/strong><\/p>\n<p>In this report, Vedere Labs identifies the five riskiest connected devices in four categories: IT, IoT, OT and IoMT. We update our findings from 2020 with new entries such as hypervisors and human machine interfaces that represent trends including critical vulnerability and increased OT connectivity.<\/p>\n<ul class=\"o-list-bare o-flow o-flow--small u-m-0\">\n<li><a href=\"\/resources\/the-riskiest-connected-devices-in-enterprise-networks\/\" title=\"Access Report\" class=\"c-btn c-btn--primary c-btn--link\" target=\"_blank\">Access Report<\/a><\/li>\n<li><a href=\"\/resources\/12-riskiest-connected-devices\/\" title=\"Access Infographic\" class=\"c-btn c-btn--primary c-btn--link\" target=\"_blank\">Access Infographic<\/a><\/li>\n<li><a href=\"\/blog\/the-riskiest-connected-devices-in-enterprise-networks\/\" title=\"Read Blog\" class=\"c-btn c-btn--primary c-btn--link\">Read Blog<\/a><\/li>\n<\/ul>\n<p><img decoding=\"async\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2022\/09\/Research_report-Internet-Exposure-of-Medical-Devices-and-Systems.png\" alt=\"Research Report Internet Exposure Of Medical Devices And Systems\" loading=\"lazy\"><\/p>\n<h3 class=\"c-title-small u-color-primary-900\">Internet Exposure of Medical Devices and Systems<\/h3>\n<p><strong>Sept. 26, 2022<\/strong><\/p>\n<p>Vedere Labs found more than 7,000 exposed medical devices and systems on the internet, including PACS, healthcare integration engines, EMRs and medication dispensing systems.<\/p>\n<ul class=\"o-list-bare o-flow o-flow--small u-m-0\">\n<li><a href=\"\/resources\/internet-exposure-of-medical-devices-and-systems\/\" title=\"Access Report\" class=\"c-btn c-btn--primary c-btn--link\" target=\"_blank\">Access Report<\/a><\/li>\n<li><a href=\"\/blog\/fbi-notice-underscores-cyberthreats-posed-by-medical-devices-and-iomt-risk-management-can-help\/\" title=\"Read Blog\" class=\"c-btn c-btn--primary c-btn--link\">Read Blog<\/a><\/li>\n<li><a href=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/08\/DE-medical_devices_report_summary_German.pdf\" title=\"Lesen Sie den Bericht (DE)\" class=\"c-btn c-btn--primary c-btn--link\" target=\"_blank\">Lesen Sie den Bericht (DE)<\/a><\/li>\n<li><a href=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/08\/FR-medical_devices_report_summary_French.pdf\" title=\"Lire le rapport (FR)\" class=\"c-btn c-btn--primary c-btn--link\" target=\"_blank\">Lire le rapport (FR)<\/a><\/li>\n<li><a href=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/08\/ES-medical_devices_report_summary_Spanish.pdf\" title=\"Leer el informe (ES)\" class=\"c-btn c-btn--primary c-btn--link\" target=\"_blank\">Leer el informe (ES)<\/a><\/li>\n<li><a href=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/08\/IT-medical_devices_report_summary_Italian.pdf\" title=\"Leggi il rapporto (IT)\" class=\"c-btn c-btn--primary c-btn--link\" target=\"_blank\">Leggi il rapporto (IT)<\/a><\/li>\n<\/ul>\n<p><img decoding=\"async\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2022\/07\/FS-2022-Threat-Briefing-Thumbnails-Industroyer2.png\" loading=\"lazy\"><\/p>\n<h3 class=\"c-title-small u-color-primary-900\">Industroyer2 and INCONTROLLER (PIPEDREAM): In-depth Technical Analysis of the ICS-specific Malware<\/h3>\n<p><strong>Jul. 13, 2022<\/strong><\/p>\n<p>Industroyer2 leverages OS-specific wipers and a dedicated module to communicate over the IEC-104 industrial protocol. INCONTROLLER is a full toolkit containing modules to send instructions to or retrieve data from ICS devices using industrial network protocols, such as OPC UA, Modbus, CODESYS, Machine Expert Discovery and Omron FINS. Additionally, Industroyer2 has a highly targeted configuration, while INCONTROLLER is much more reusable across different targets.<\/p>\n<ul class=\"o-list-bare o-flow o-flow--small u-m-0\">\n<li><a href=\"\/resources\/industroyer2-and-incontroller-report\/\" title=\"Read Report\" class=\"c-btn c-btn--primary c-btn--link\">Read Report<\/a><\/li>\n<li><a href=\"\/blog\/industroyer2-and-incontroller-protection-from-ics-malware\/\" title=\"Read Blog\" class=\"c-btn c-btn--primary c-btn--link\">Read Blog<\/a><\/li>\n<li><a href=\"\/resources\/industroyer2-et-incontroller-french\" title=\"Lire le rapport (FR)\" class=\"c-btn c-btn--primary c-btn--link\" target=\"_blank\">Lire le rapport (FR)<\/a><\/li>\n<li><a href=\"\/resources\/industroyer2-und-incontroller-german\" title=\"Lesen Sie den Bericht (DE)\" class=\"c-btn c-btn--primary c-btn--link\" target=\"_blank\">Lesen Sie den Bericht (DE)<\/a><\/li>\n<li><a href=\"\/resources\/industroyer2-et-incontroller-spanish\" title=\"Leer el informe (ES)\" class=\"c-btn c-btn--primary c-btn--link\" target=\"_blank\">Leer el informe (ES)<\/a><\/li>\n<li><a href=\"\/resources\/industroyer2-e-incontroller-Italian\" title=\"Leggi il rapporto (IT)\" class=\"c-btn c-btn--primary c-btn--link\" target=\"_blank\">Leggi il rapporto (IT)<\/a><\/li>\n<\/ul>\n<p><img decoding=\"async\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2022\/06\/FS-2022-Threat-Briefing-Thumbnails-Killnet.png\" loading=\"lazy\"><\/p>\n<h3 class=\"c-title-small u-color-primary-900\">Killnet: Analysis of Attacks from a Prominent Pro-Russian Hacktivist Group<\/h3>\n<p><strong>Jun. 2, 2022<\/strong><\/p>\n<p>In this threat report, Forescout\u2019s Vedere Labs analyzes attacks by pro-Russian hacktivist group Killnet and shows how to mitigate risk of DDoS and other attacks. Killnet stands out as one of the most active groups since Russian invaded Ukraine and has gained notoriety for DDoSing the websites of western critical infrastructure operators such as airports, banks, energy providers and governmental agencies.<\/p>\n<ul class=\"o-list-bare o-flow o-flow--small u-m-0\">\n<li><a href=\"\/resources\/analysis-of-killnet-report\/\" title=\"Read Report\" class=\"c-btn c-btn--primary c-btn--link\">Read Report<\/a><\/li>\n<li><a href=\"\/blog\/killnet-analysis-of-attacks-from-a-prominent-pro-russian-hacktivist-group\/\" title=\"Read Blog\" class=\"c-btn c-btn--primary c-btn--link\">Read Blog<\/a><\/li>\n<\/ul>\n<p><img decoding=\"async\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2022\/06\/Ransomware_thm.png\" alt=\"Ransomware\" loading=\"lazy\"><\/p>\n<h3 class=\"c-title-small u-color-primary-900\">R4IoT &#8211; Ransomware Evolution<\/h3>\n<p><strong>Jun. 1, 2022<\/strong><\/p>\n<p>In this report, Vedere Labs demonstrates R4IoT: a proof of concept for <a href=\"\/research-labs\/r4iot\/\">next-generation ransomware<\/a> that exploits IoT devices for initial access, targets IT devices to deploy ransomware and cryptominers, and leverages poor OT security practices to cause physical disruption to business operations.<\/p>\n<ul class=\"o-list-bare o-flow o-flow--small u-m-0\">\n<li><a href=\"\/resources\/r4iot-next-generation-ransomware-report\" title=\"Read Report\" class=\"c-btn c-btn--primary c-btn--link\" target=\"_blank\">Read Report<\/a><\/li>\n<li><a href=\"\/blog\/r4iot-when-ransomware-meets-the-internet-of-things\/\" title=\"Read Blog\" class=\"c-btn c-btn--primary c-btn--link\">Read Blog<\/a><\/li>\n<li><a href=\"\/research-labs\/r4iot\/\" title=\"Watch Video\" class=\"c-btn c-btn--primary c-btn--link\">Watch Video<\/a><\/li>\n<\/ul>\n<p><img decoding=\"async\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2022\/05\/FS-2022-Threat-Briefing-Thumbnails-Emotet15.png\" loading=\"lazy\"><\/p>\n<h3 class=\"c-title-small u-color-primary-900\">Emotet: The Return of the World\u2019s Most Dangerous Malware<\/h3>\n<p><strong>May. 12, 2022<\/strong><\/p>\n<p>According to CISA, Emotet is among the most costly and destructive malware used against the private and public sectors, and Europol calls it the world\u2019s most dangerous malware. This report shows the result of a dynamic analysis of an Emotet Epoch4 loader sample and presents a list of IoCs extracted from that sample, with recommended mitigations.<\/p>\n<ul class=\"o-list-bare o-flow o-flow--small u-m-0\">\n<li><a href=\"\/resources\/emotet-threat-briefing\/\" title=\"Read Report\" class=\"c-btn c-btn--primary c-btn--link\">Read Report<\/a><\/li>\n<li><a href=\"\/blog\/emotet-the-return-of-the-worlds-most-dangerous-malware\/\" title=\"Read Blog\" class=\"c-btn c-btn--primary c-btn--link\">Read Blog<\/a><\/li>\n<\/ul>\n<p><img decoding=\"async\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2022\/04\/FS-2022-Threat-Briefing-Thumbnails-Black-Cat-ALPHV.png\" loading=\"lazy\"><\/p>\n<h3 class=\"c-title-small u-color-primary-900\">Analysis of an ALPHV Incident<\/h3>\n<p><strong>Apr. 22, 2022<\/strong><\/p>\n<p>This report analyzes the files and tools used by an affiliate of the ALPHV ransomware group (aka BlackCat) during an attack that involved penetrating a SonicWall firewall and encrypting a VMware ESXi environment. New findings break down the malware\u2019s sophisticated behavior and present ways to avoid damage.<\/p>\n<ul class=\"o-list-bare o-flow o-flow--small u-m-0\">\n<li><a href=\"\/resources\/analysis-of-an-alphv-incident\" title=\"Access Report\" class=\"c-btn c-btn--primary c-btn--link\" target=\"_blank\">Access Report<\/a><\/li>\n<\/ul>\n<p><img decoding=\"async\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2022\/04\/FS-2022-Threat-Briefing-Thumbnails-Night-Sky.png\" loading=\"lazy\"><\/p>\n<h3 class=\"c-title-small u-color-primary-900\"><a name=\"night-sky-ransomeware\"><\/a>Night Sky Ransomware<\/h3>\n<p><strong>Apr. 12, 2022<\/strong><\/p>\n<p>The Night Sky ransomware was first reported by MalwareHunterTeam on January 1, 2022. Victims were asked to contact the attackers on contact[.]nightsky[.]cyou to pay for the ransom. If the victims refused to pay, attackers threatened to expose their data on a leak site. This is known as a double extortion ransomware. Night Sky provides an interesting view into the relationships among several ransomware families.<\/p>\n<ul class=\"o-list-bare o-flow o-flow--small u-m-0\">\n<li><a href=\"\/resources\/night-sky-ransomeware-threat-brief\/\" title=\"Access Report\" class=\"c-btn c-btn--primary c-btn--link\" target=\"_blank\">Access Report<\/a><\/li>\n<\/ul>\n<p><img decoding=\"async\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2022\/04\/Lapsus_ThreatBriefing.png\" loading=\"lazy\"><\/p>\n<h3 class=\"c-title-small u-color-primary-900\">LAPSUS$<\/h3>\n<p><strong>Mar. 30, 2022<\/strong><\/p>\n<p>LAPSUS$ is a hacking group that has been active since 2021 and has breached several high-profile organizations, starting with major Brazilian government agencies and companies, then moving on to global businesses such as Microsoft, Nvidia and Okta. This loose collective of hackers is notable for using social engineering techniques and focusing on data exfiltration and public extortion rather than data encryption. This briefing reports on the group\u2019s victims, methods and indicators of compromise, and provides mitigation recommendations.<\/p>\n<ul class=\"o-list-bare o-flow o-flow--small u-m-0\">\n<li><a href=\"\/resources\/lapsu-the-rise-fall-and-return-of-a-hacking-group\/\" title=\"Access Report\" class=\"c-btn c-btn--primary c-btn--link\" target=\"_blank\">Access Report<\/a><\/li>\n<\/ul>\n<p><img decoding=\"async\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2022\/04\/Contileaks_ThreatBriefing.png\" loading=\"lazy\"><\/p>\n<h3 class=\"c-title-small u-color-primary-900\">Analysis of Conti Leaks<\/h3>\n<p><strong>Mar. 11, 2022<\/strong><\/p>\n<p>This report is the result of an analysis of the chats, tutorials and tools used by the Conti ransomware groups and leaked via the Twitter handle \u201cContiLeaks\u201d since the end of February 2022. The report presents intelligence about the group\u2019s organization, attack techniques and victims which can help network defenders to detect and mitigate attacks from Conti and other similar ransomware groups. It does not rely on automatic translation of leaked chats\u2026<\/p>\n<ul class=\"o-list-bare o-flow o-flow--small u-m-0\">\n<li><a href=\"\/resources\/analysis-of-conti-leaks\/\" title=\"Access Report\" class=\"c-btn c-btn--primary c-btn--link\" target=\"_blank\">Access Report<\/a><\/li>\n<\/ul>\n<p><img decoding=\"async\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2022\/04\/Russia-Ukraine-conflict_ThreatBriefing.png\" loading=\"lazy\"><\/p>\n<h3 class=\"c-title-small u-color-primary-900\">Monitoring Cyber Activities Connected to The Russian-Ukrainian Conflict<\/h3>\n<p><strong>Mar. 3, 2022<\/strong><\/p>\n<p>Vedere Labs, Forescout\u2019s threat intelligence and research team, is closely monitoring the evolution of cyber activities connected to the Russian-Ukrainian conflict. We continue to gather information regarding active threats; tactics, techniques and procedures (TTPs); Indicators of Compromise (IoCs); and mitigations.<\/p>\n<ul class=\"o-list-bare o-flow o-flow--small u-m-0\">\n<li><a href=\"\/resources\/monitoring-cyber-activities-connected-to-the-russian-ukrainian-conflict\/\" title=\"Access Report\" class=\"c-btn c-btn--primary c-btn--link\" target=\"_blank\">Access Report<\/a><\/li>\n<\/ul>\n<p><img decoding=\"async\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2022\/12\/Cysiv-Threat-Report-Top-Defense-Evasion-Techniques-072022_fs-1.png\" loading=\"lazy\"><\/p>\n<h3 class=\"c-title-small u-color-primary-900\">Top Defense Evasion Techniques<\/h3>\n<p><strong>Jul. 25, 2022<\/strong><\/p>\n<p>An analysis of the top 10 observed defense evasion techniques used by adversaries in malware campaigns and recommendations for detection and mitigation.<\/p>\n<ul class=\"o-list-bare o-flow o-flow--small u-m-0\">\n<li><a href=\"\/resources\/top-defense-evasion-techniques-used-by-malware\/\" title=\"Access Report\" class=\"c-btn c-btn--primary c-btn--link\" target=\"_blank\">Access Report<\/a><\/li>\n<\/ul>\n<p><img decoding=\"async\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2022\/12\/Cysiv-Threat-Report-The-Trickbot-Banking-Trojan-040521_fs-1.png\" loading=\"lazy\"><\/p>\n<h3 class=\"c-title-small u-color-primary-900\">TrickBot Banking Trojan <\/h3>\n<p><strong>Apr. 8, 2021<\/strong><\/p>\n<p>An analysis of TrickBot, a dangerous, customizable banking trojan distributed via spear phishing \u2013artifacts and behaviors, techniques, monitoring and mitigation.<\/p>\n<ul class=\"o-list-bare o-flow o-flow--small u-m-0\">\n<li><a href=\"\/resources\/trickbot-banking-trojan\/\" title=\"Access Report\" class=\"c-btn c-btn--primary c-btn--link\" target=\"_blank\">Access Report<\/a><\/li>\n<\/ul>\n<p><img decoding=\"async\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2021\/07\/Screen-Shot-2021-07-28-at-8.35.22-AM.png\" alt=\"The Underlying Risks Found in Healthcare Devices\" loading=\"lazy\"><\/p>\n<h3 class=\"c-title-small u-color-primary-900\">The Underlying Risks Found in Healthcare Devices<\/h3>\n<p><strong>May 2021<\/strong><\/p>\n<p>Vedere Labs analyzed Device Cloud data from healthcare organizations to determine how TCP\/IP stack vulnerabilities affect them. The report details 20 significant findings and provides four critical recommendations to mitigate risks to your organization.<\/p>\n<ul class=\"o-list-bare o-flow o-flow--small u-m-0\">\n<li><a href=\"\/the-underlying-risks-found-in-healthcare-devices\/\" title=\"Access Report\" class=\"c-btn c-btn--primary c-btn--link\" target=\"_blank\">Access Report<\/a><\/li>\n<\/ul>\n<p><img decoding=\"async\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2022\/12\/Cysiv-Threat-Report-The-Formbook-Infostealer-022221-1_fs-1.png\" loading=\"lazy\"><\/p>\n<h3 class=\"c-title-small u-color-primary-900\">Formbook Infostealer<\/h3>\n<p><strong>Feb. 23, 2021<\/strong><\/p>\n<p>An analysis of Formbook infostealer malware \u2013 main execution stages and techniques, key artifacts and behaviors, attachment types and exploited vulnerabilities.<\/p>\n<ul class=\"o-list-bare o-flow o-flow--small u-m-0\">\n<li><a href=\"\/resources\/formbook-infostealer\/\" title=\"Access Report\" class=\"c-btn c-btn--primary c-btn--link\" target=\"_blank\">Access Report<\/a><\/li>\n<\/ul>\n<p><img decoding=\"async\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2022\/12\/Cysiv-Threat-Report-Thanos-Ransomware-071720_fs-1.png\" loading=\"lazy\"><\/p>\n<h3 class=\"c-title-small u-color-primary-900\">Thanos Ransomware<\/h3>\n<p><strong>Jul. 17, 2020<\/strong><\/p>\n<p>An analysis of the Thanos RaaS, which users can customize to suit their needs. It can evade detection, encrypt and exfiltrate data, and spread over a LAN.<\/p>\n<ul class=\"o-list-bare o-flow o-flow--small u-m-0\">\n<li><a href=\"\/resources\/thanos-ransomware\/\" title=\"Access Report\" class=\"c-btn c-btn--primary c-btn--link\" target=\"_blank\">Access Report<\/a><\/li>\n<\/ul>\n<p><img decoding=\"async\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2022\/12\/Cysiv-Threat-Report-TeamTNT-Cryptojacking-Worm-101920_fs-1.png\" loading=\"lazy\"><\/p>\n<h3 class=\"c-title-small u-color-primary-900\">TeamTNT<\/h3>\n<p><strong>Oct. 19, 2020<\/strong><\/p>\n<p>An analysis of TeamTNT, the 1st cryptojacking worm to steal AWS credentials, including its main attack phases, artifacts, techniques and goals.<\/p>\n<ul class=\"o-list-bare o-flow o-flow--small u-m-0\">\n<li><a href=\"\/resources\/teamtnt-the-first-cryptojacking-worm-to-steal-aws-credentials\/\" title=\"Access Report\" class=\"c-btn c-btn--primary c-btn--link\" target=\"_blank\">Access Report<\/a><\/li>\n<\/ul>\n<p><img decoding=\"async\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2022\/12\/Cysiv-Threat-Report-TA505-APT-Resurgence-090120_fs-1.png\" loading=\"lazy\"><\/p>\n<h3 class=\"c-title-small u-color-primary-900\">TA505 APT<\/h3>\n<p><strong>Sept. 1, 2020<\/strong><\/p>\n<p>An analysis of TA505 APT, known for largescale, worldwide spam campaigns that distribute malware; including its attack vectors, techniques and characteristics.<\/p>\n<ul class=\"o-list-bare o-flow o-flow--small u-m-0\">\n<li><a href=\"\/resources\/ta505-apt-resurgence\/\" title=\"Access Report\" class=\"c-btn c-btn--primary c-btn--link\" target=\"_blank\">Access Report<\/a><\/li>\n<\/ul>\n<p><img decoding=\"async\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2022\/12\/Cysiv-Threat-Report-SunCrypt-Ransomware-092320_fs-1.png\" loading=\"lazy\"><\/p>\n<h3 class=\"c-title-small u-color-primary-900\">SunCrypt Ransomware<\/h3>\n<p><strong>Sept. 23, 2020<\/strong><\/p>\n<p>An analysis of a fileless variant of SunCrypt ransomware that uses the PowerShell process to extract and run a SunCrypt payload, making it hard to detect.<\/p>\n<ul class=\"o-list-bare o-flow o-flow--small u-m-0\">\n<li><a href=\"\/resources\/suncrypt-ransomware\/\" title=\"Access Report\" class=\"c-btn c-btn--primary c-btn--link\" target=\"_blank\">Access Report<\/a><\/li>\n<\/ul>\n<p><img decoding=\"async\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2022\/12\/Cysiv-Threat-Report-StrongPity-Spyware-080720_fs-1.png\" loading=\"lazy\"><\/p>\n<h3 class=\"c-title-small u-color-primary-900\">StrongPity Spyware <\/h3>\n<p><strong>Aug. 7, 2020<\/strong><\/p>\n<p>An analysis of the StrongPity spyware distributed by the Promethium advanced persistence threat (APT) through spear phishing and watering hole attacks.<\/p>\n<ul class=\"o-list-bare o-flow o-flow--small u-m-0\">\n<li><a href=\"\/resources\/strongpity-spyware\/\" title=\"Access Report\" class=\"c-btn c-btn--primary c-btn--link\" target=\"_blank\">Access Report<\/a><\/li>\n<\/ul>\n<p><img decoding=\"async\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2022\/12\/Cysiv-Threat-Report-PonyFinal-Ransomware-061520_fs-1.png\" loading=\"lazy\"><\/p>\n<h3 class=\"c-title-small u-color-primary-900\">PonyFinal Ransomware <\/h3>\n<p><strong>Jun. 15, 2020<\/strong><\/p>\n<p>An analysis of the techniques used by PonyFinal, a Java-based ransomware that targets large organizations.<\/p>\n<ul class=\"o-list-bare o-flow o-flow--small u-m-0\">\n<li><a href=\"\/resources\/ponyfinal-ransomware\/\" title=\"Access Report\" class=\"c-btn c-btn--primary c-btn--link\" target=\"_blank\">Access Report<\/a><\/li>\n<\/ul>\n<p><img decoding=\"async\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2022\/12\/Cysiv-Threat-Report-Maze-Ransomware-070720_fs-1.png\" loading=\"lazy\"><\/p>\n<h3 class=\"c-title-small u-color-primary-900\">Maze Ransomware <\/h3>\n<p><strong>Jul. 7, 2020<\/strong><\/p>\n<p>An analysis of the Maze group and multiple variants of its ransomware, which targets Windows systems of large companies and publishes victims\u2019 sensitive data.<\/p>\n<ul class=\"o-list-bare o-flow o-flow--small u-m-0\">\n<li><a href=\"\/resources\/maze-ransomware\/\" title=\"Access Report\" class=\"c-btn c-btn--primary c-btn--link\" target=\"_blank\">Access Report<\/a><\/li>\n<\/ul>\n<p><img decoding=\"async\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2022\/12\/Cysiv-Threat-Report-Kinsing-Cloud-Cryptojacker-042227_fs-1.png\" loading=\"lazy\"><\/p>\n<h3 class=\"c-title-small u-color-primary-900\">Kinsing Cloud Cryptojacker<\/h3>\n<p><strong>Apr. 27, 2021<\/strong><\/p>\n<p>An analysis of the Kinsing cloud cryptojacker, a hard-to-detect Linux-based malware, along with best practices for prevention, detection and mitigation.<\/p>\n<ul class=\"o-list-bare o-flow o-flow--small u-m-0\">\n<li><a href=\"\/resources\/kinsing-cloud-cryptojacker\/\" title=\"Access Report\" class=\"c-btn c-btn--primary c-btn--link\" target=\"_blank\">Access Report<\/a><\/li>\n<\/ul>\n<p><img decoding=\"async\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2022\/12\/Cysiv-Threat-Report-Egregor-Ransomware-01292_fs-1.png\" loading=\"lazy\"><\/p>\n<h3 class=\"c-title-small u-color-primary-900\">Egregor Ransomware <\/h3>\n<p><strong>Jan. 29, 2021<\/strong><\/p>\n<p>An analysis of the Egregor RaaS group and the techniques it uses to gain access, avoid detection and exfiltrate data to extort large companies.<\/p>\n<ul class=\"o-list-bare o-flow o-flow--small u-m-0\">\n<li><a href=\"\/resources\/egregor-ransomware\/\" title=\"ACCESS THE BRIEF\" class=\"c-btn c-btn--primary c-btn--link\" target=\"_blank\">ACCESS THE BRIEF<\/a><\/li>\n<\/ul>\n<p><img decoding=\"async\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2022\/12\/Cysiv-Threat-Report-CVE-2020-5902-BIG-IP-July-2020_fs-1.png\" loading=\"lazy\"><\/p>\n<h3 class=\"c-title-small u-color-primary-900\">BIG-IP<\/h3>\n<p><strong>Jul. 2, 2020<\/strong><\/p>\n<p>How to detect and mitigate CVE-2020-5902, a BIG-IP remote code execution (RCE) vulnerability that has a CVSSv2 score of 10.0 \u2013 CRITICAL.<\/p>\n<ul class=\"o-list-bare o-flow o-flow--small u-m-0\">\n<li><a href=\"\/resources\/cve-2020-5902-big-ip-rce-vulnerability\/\" title=\"ACCESS THE BRIEF\" class=\"c-btn c-btn--primary c-btn--link\" target=\"_blank\">ACCESS THE BRIEF<\/a><\/li>\n<\/ul>\n<p><img decoding=\"async\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2022\/12\/Cysiv-Threat-Report_Linux-Ransomware_final_fs-1-1.png\" loading=\"lazy\"><\/p>\n<h3 class=\"c-title-small u-color-primary-900\">Linux Ransomware <\/h3>\n<p><strong>Mar. 2022<\/strong><\/p>\n<p>An analysis of prominent Linux ransomware variants, which rely on vulnerability exploitation for infection, with a detailed look at REvil RaaS.<\/p>\n<ul class=\"o-list-bare o-flow o-flow--small u-m-0\">\n<li><a href=\"\/resources\/rise-in-linux-ransomware\/\" title=\"ACCESS THE BRIEF\" class=\"c-btn c-btn--primary c-btn--link\" target=\"_blank\">ACCESS THE BRIEF<\/a><\/li>\n<\/ul>\n<p><img decoding=\"async\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2022\/12\/Cysiv-Threat-Report-AgentTesla-RAT-020421-2_fs-1.png\" loading=\"lazy\"><\/p>\n<h3 class=\"c-title-small u-color-primary-900\">Agent Tesla RAT <\/h3>\n<p><strong>Feb. 8, 2021<\/strong><\/p>\n<p>An analysis of the Agent Tesla remote access trojan (RAT), a popular keylogger and information stealer, with recom AgentTesla RAT mendations for detection and mitigation.<\/p>\n<ul class=\"o-list-bare o-flow o-flow--small u-m-0\">\n<li><a href=\"\/resources\/agent-tesla-rat\/\" title=\"ACCESS THE BRIEF\" class=\"c-btn c-btn--primary c-btn--link\" target=\"_blank\">ACCESS THE BRIEF<\/a><\/li>\n<\/ul>\n<p><img decoding=\"async\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2021\/06\/enterprise-things-report.jpg\" alt=\"Enterprise Things Report\" loading=\"lazy\"><\/p>\n<h3 class=\"c-title-small u-color-primary-900\">Enterprise of Things Security Report: The State of IoT Security in 2020<\/h3>\n<p><strong>Jun. 25, 2021<\/strong><\/p>\n<p>Vedere Labs identifies the top 10 riskiest devices and helps security teams determine the most effective next steps to secure them.<\/p>\n<ul class=\"o-list-bare o-flow o-flow--small u-m-0\">\n<li><a href=\"\/the-enterprise-of-things-security-report-state-of-iot-security-in-2020\/\" title=\"Access Report\" class=\"c-btn c-btn--primary c-btn--link\" target=\"_blank\">Access Report<\/a><\/li>\n<\/ul>\n<p><img decoding=\"async\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2022\/12\/Cysiv-Threat-Report-APT36-Crimson-RAT-120720_fs-1.png\" loading=\"lazy\"><\/p>\n<h3 class=\"c-title-small u-color-primary-900\">The APT36 Crimson Remote Access Trojan (RAT)<\/h3>\n<p><strong>Dec. 9, 2020<\/strong><\/p>\n<p>An analysis of multiple variants of APT36\u2019s Crimson remote access trojan (RAT), which exfiltrates files and system data and transfers it to its C2 server.<\/p>\n<ul class=\"o-list-bare o-flow o-flow--small u-m-0\">\n<li><a href=\"\/resources\/the-apt36-crimson-remote-access-trojan-rat\/\" title=\"ACCESS THE BRIEF\" class=\"c-btn c-btn--primary c-btn--link\" target=\"_blank\">ACCESS THE BRIEF<\/a><\/li>\n<\/ul>\n<p><img decoding=\"async\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2021\/08\/Screen-Shot-2021-08-03-at-8.36.47-AM.png\" loading=\"lazy\"><\/p>\n<h3 class=\"c-title-small u-color-primary-900\">From Events to TTPs: Maturing OT Incident Response with MITRE ATT&amp;CK for ICS<\/h3>\n<p><strong>May 2020<\/strong><\/p>\n<p>The growing threat landscape for operational technology (OT) networks, exemplified by a number of recent ransomware attacks, has prompted critical infrastructure organizations to better prepare themselves for impactful cyber incidents. To do this, stakeholders responsible for critical infrastructure and services are maturing their security operations centers (SOCs) and increasing their use of cyber threat intelligence (CTI). Many now consider adversarial Tactics, Techniques and Procedures (TTPs) to be their most valuable CTI tool.<\/p>\n<ul class=\"o-list-bare o-flow o-flow--small u-m-0\">\n<li><a href=\"https:\/\/www.forescout.com\/resources\/from-events-to-ttps-maturing-ot-incident-response-with-mitre-attack-for-ics\/\" title=\"Access Report\" class=\"c-btn c-btn--primary c-btn--link\" target=\"_blank\">Access Report<\/a><\/li>\n<\/ul>\n<p><img decoding=\"async\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2021\/08\/Screen-Shot-2021-08-03-at-8.00.30-AM.png\" alt=\"Putting Healthcare Security Under the Microscope\" loading=\"lazy\"><\/p>\n<h3 class=\"c-title-small u-color-primary-900\">Putting Healthcare Security Under the Microscope<\/h3>\n<p><strong>May 28 2019<\/strong><\/p>\n<p>The Internet of Medical Things (IoMT) continues to offer exciting possibilities for healthcare organizations to improve patient care. However, this digital transformation and increase in connectivity is also introducing new privacy and security risks. The device landscape is growing exponentially, adding to the complexity of networks<br \/>\nand making it difficult to manage and improve their security posture.\n\n<ul class=\"o-list-bare o-flow o-flow--small u-m-0\">\n<li><a href=\"\/resources\/forescout-healthcare-report\/\" title=\"Access Report\" class=\"c-btn c-btn--primary c-btn--link\" target=\"_blank\">Access Report<\/a><\/li>\n<\/ul>\n<p><img decoding=\"async\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2022\/12\/Cysiv-Threat-Profile-Credential-Harvesting-Attacks-050120_fs-1.png\" loading=\"lazy\"><\/p>\n<h3 class=\"c-title-small u-color-primary-900\">Credential Harvesting Attacks <\/h3>\n<p><strong>May 1, 2020<\/strong><\/p>\n<p>An analysis of the techniques used to craft spear phishing attacks to steal user credentials, and the most effective ways to detect and prevent them.<\/p>\n<ul class=\"o-list-bare o-flow o-flow--small u-m-0\">\n<li><a href=\"\/resources\/threat-profile-credential-harvesting-attacks-using-spear-phishing\/\" title=\"ACCESS REPORT\" class=\"c-btn c-btn--primary c-btn--link\" target=\"_blank\">ACCESS REPORT<\/a><\/li>\n<\/ul>\n<p><img decoding=\"async\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2021\/08\/Screen-Shot-2021-08-03-at-8.33.54-AM.png\" alt=\"Banking on IoT Security Leveraging Device Data to Manage Risk in Financial Services\" loading=\"lazy\"><\/p>\n<h3 class=\"c-title-small u-color-primary-900\">Banking on Security: Leveraging Device Data to Manage Risk in Financial Services<\/h3>\n<p><strong>April 2020<\/strong><\/p>\n<p>Forescout\u2019s Research team analyzed device deployments from some of the world\u2019s leading financial institutions and identified disturbing findings that indicate a lack of maturity in key areas such as device visibility and network segmentation. The research suggests that many banking and retail devices are within proximity of non-traditional (IoT and OT) devices, exposing networks to elevated opportunities for attackers to move laterally between critical infrastructure and the data center.<\/p>\n<ul class=\"o-list-bare o-flow o-flow--small u-m-0\">\n<li><a href=\"https:\/\/www.forescout.com\/cybersecurity-research-guide-for-securing-iot-in-financial-services\/\" title=\"Access Report\" class=\"c-btn c-btn--primary c-btn--link\" target=\"_blank\">Access Report<\/a><\/li>\n<\/ul>\n<p><img decoding=\"async\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2022\/12\/Cysiv-Threat-Report-APT10-071219_fs-1.png\" loading=\"lazy\"><\/p>\n<h3 class=\"c-title-small u-color-primary-900\">APT 10<\/h3>\n<p><strong>Jul. 1, 2019<\/strong><\/p>\n<p>An analysis of Chinese cyber espionage group APT10 including the utilities, malware, and tools and TTPs it uses to steal trade secrets and intellectual property.<\/p>\n<ul class=\"o-list-bare o-flow o-flow--small u-m-0\">\n<li><a href=\"\/resources\/apt10\/\" title=\"ACCESS REPORT\" class=\"c-btn c-btn--primary c-btn--link\" target=\"_blank\">ACCESS REPORT<\/a><\/li>\n<\/ul>\n<p><img decoding=\"async\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2021\/06\/ornament-dots.svg\" loading=\"lazy\"><img decoding=\"async\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2021\/06\/support-options-icon.png\" loading=\"lazy\"><\/p>\n<h3 class=\"c-title-medium u-mt-s\">Log4j<\/h3>\n<p>Forescout can help detect vulnerable instances of Log4j in your environment, patch or update software, identify ongoing exploits, and segment devices from the network. Review additional resources and articles on how best to protect your environment from vulnerabilities around Log4j.<\/p>\n<p><a href=\"\/research-labs\/log4shell\/\" title=\"Learn More\" class=\"c-btn c-btn--primary u-mt-auto\">Learn More<\/a><\/p>\n<h3 class=\"c-title-medium u-mt-s\">SolarWinds<\/h3>\n<p>Given the widespread nature of the SolarWinds breach, Vedere Labs has proactively conducted a thorough security review to validate the integrity of our product binaries and security of our software delivery chain. <\/p>\n<p><a href=\"https:\/\/www.forescout.com\/research-labs\/solarwinds\/\" title=\"Learn More\" class=\"c-btn c-btn--primary u-mt-auto\">Learn More<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Forescout Research \u2013 Threat Reports What We Are Monitoring Forescout\u2019s Vedere Labs threat research team issues threat reports about topical cyber activities, attacks or vulnerabilities that impact the cybersecurity community at large. The reports include a summary of the incidents and main threat actors, followed by a technical analysis of each incident, list of common [&hellip;]<\/p>\n","protected":false},"author":145,"featured_media":88261,"parent":0,"menu_order":94,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"ep_exclude_from_search":false,"footnotes":"","_links_to":"","_links_to_target":""},"coauthors":[662],"class_list":["post-70688","page","type-page","status-publish","has-post-thumbnail","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.8 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Threat Reports Overview - Forescout<\/title>\n<meta name=\"description\" content=\"Forescout\u2019s Vedere Labs threat research team issues threat reports about topical cyber activities, attacks or vulnerabilities that impact the cybersecurity community at large. The reports include a summary of the incidents and main threat actors, followed by a technical analysis of each incident, list of common vulnerabilities and exposures (CVEs) and affected software, indicators of compromise (IOCs) and mitigation recommendations.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.forescout.com\/threat-briefings\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Threat Reports Overview - Forescout\" \/>\n<meta property=\"og:description\" content=\"Forescout\u2019s Vedere Labs threat research team issues threat reports about topical cyber activities, attacks or vulnerabilities that impact the cybersecurity community at large. The reports include a summary of the incidents and main threat actors, followed by a technical analysis of each incident, list of common vulnerabilities and exposures (CVEs) and affected software, indicators of compromise (IOCs) and mitigation recommendations.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.forescout.com\/threat-briefings\/\" \/>\n<meta property=\"og:site_name\" content=\"Forescout\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ForescoutTechnologies\" \/>\n<meta property=\"article:modified_time\" content=\"2025-08-01T17:04:11+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2024\/05\/FS-2024-VL-Riskiest-Connected-Devices-Report-Share-v2.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"419\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@Forescout\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"52 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.forescout.com\/threat-briefings\/\",\"url\":\"https:\/\/www.forescout.com\/threat-briefings\/\",\"name\":\"Threat Reports Overview - Forescout\",\"isPartOf\":{\"@id\":\"https:\/\/www.forescout.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.forescout.com\/threat-briefings\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.forescout.com\/threat-briefings\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.forescout.com\/wp-content\/uploads\/2024\/05\/FS-2024-VL-Riskiest-Connected-Devices-Report-Share-v2.jpg\",\"datePublished\":\"2022-03-10T16:55:47+00:00\",\"dateModified\":\"2025-08-01T17:04:11+00:00\",\"description\":\"Forescout\u2019s Vedere Labs threat research team issues threat reports about topical cyber activities, attacks or vulnerabilities that impact the cybersecurity community at large. The reports include a summary of the incidents and main threat actors, followed by a technical analysis of each incident, list of common vulnerabilities and exposures (CVEs) and affected software, indicators of compromise (IOCs) and mitigation recommendations.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.forescout.com\/threat-briefings\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.forescout.com\/threat-briefings\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.forescout.com\/threat-briefings\/#primaryimage\",\"url\":\"https:\/\/www.forescout.com\/wp-content\/uploads\/2024\/05\/FS-2024-VL-Riskiest-Connected-Devices-Report-Share-v2.jpg\",\"contentUrl\":\"https:\/\/www.forescout.com\/wp-content\/uploads\/2024\/05\/FS-2024-VL-Riskiest-Connected-Devices-Report-Share-v2.jpg\",\"width\":800,\"height\":419},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.forescout.com\/threat-briefings\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.forescout.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Threat Reports Overview\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.forescout.com\/#website\",\"url\":\"https:\/\/www.forescout.com\/\",\"name\":\"Forescout\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.forescout.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.forescout.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.forescout.com\/#organization\",\"name\":\"Forescout Technologies, Inc.\",\"url\":\"https:\/\/www.forescout.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.forescout.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.forescout.com\/wp-content\/uploads\/2019\/01\/forescout-logo.svg\",\"contentUrl\":\"https:\/\/www.forescout.com\/wp-content\/uploads\/2019\/01\/forescout-logo.svg\",\"width\":1,\"height\":1,\"caption\":\"Forescout Technologies, Inc.\"},\"image\":{\"@id\":\"https:\/\/www.forescout.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/ForescoutTechnologies\",\"https:\/\/x.com\/Forescout\",\"https:\/\/www.instagram.com\/forescouttechnologies\/\",\"https:\/\/www.linkedin.com\/company\/forescout-technologies\",\"https:\/\/www.youtube.com\/user\/forescout1\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Threat Reports Overview - Forescout","description":"Forescout\u2019s Vedere Labs threat research team issues threat reports about topical cyber activities, attacks or vulnerabilities that impact the cybersecurity community at large. The reports include a summary of the incidents and main threat actors, followed by a technical analysis of each incident, list of common vulnerabilities and exposures (CVEs) and affected software, indicators of compromise (IOCs) and mitigation recommendations.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.forescout.com\/threat-briefings\/","og_locale":"en_US","og_type":"article","og_title":"Threat Reports Overview - Forescout","og_description":"Forescout\u2019s Vedere Labs threat research team issues threat reports about topical cyber activities, attacks or vulnerabilities that impact the cybersecurity community at large. The reports include a summary of the incidents and main threat actors, followed by a technical analysis of each incident, list of common vulnerabilities and exposures (CVEs) and affected software, indicators of compromise (IOCs) and mitigation recommendations.","og_url":"https:\/\/www.forescout.com\/threat-briefings\/","og_site_name":"Forescout","article_publisher":"https:\/\/www.facebook.com\/ForescoutTechnologies","article_modified_time":"2025-08-01T17:04:11+00:00","og_image":[{"width":800,"height":419,"url":"https:\/\/www.forescout.com\/wp-content\/uploads\/2024\/05\/FS-2024-VL-Riskiest-Connected-Devices-Report-Share-v2.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_site":"@Forescout","twitter_misc":{"Est. reading time":"52 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.forescout.com\/threat-briefings\/","url":"https:\/\/www.forescout.com\/threat-briefings\/","name":"Threat Reports Overview - Forescout","isPartOf":{"@id":"https:\/\/www.forescout.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.forescout.com\/threat-briefings\/#primaryimage"},"image":{"@id":"https:\/\/www.forescout.com\/threat-briefings\/#primaryimage"},"thumbnailUrl":"https:\/\/www.forescout.com\/wp-content\/uploads\/2024\/05\/FS-2024-VL-Riskiest-Connected-Devices-Report-Share-v2.jpg","datePublished":"2022-03-10T16:55:47+00:00","dateModified":"2025-08-01T17:04:11+00:00","description":"Forescout\u2019s Vedere Labs threat research team issues threat reports about topical cyber activities, attacks or vulnerabilities that impact the cybersecurity community at large. The reports include a summary of the incidents and main threat actors, followed by a technical analysis of each incident, list of common vulnerabilities and exposures (CVEs) and affected software, indicators of compromise (IOCs) and mitigation recommendations.","breadcrumb":{"@id":"https:\/\/www.forescout.com\/threat-briefings\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.forescout.com\/threat-briefings\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.forescout.com\/threat-briefings\/#primaryimage","url":"https:\/\/www.forescout.com\/wp-content\/uploads\/2024\/05\/FS-2024-VL-Riskiest-Connected-Devices-Report-Share-v2.jpg","contentUrl":"https:\/\/www.forescout.com\/wp-content\/uploads\/2024\/05\/FS-2024-VL-Riskiest-Connected-Devices-Report-Share-v2.jpg","width":800,"height":419},{"@type":"BreadcrumbList","@id":"https:\/\/www.forescout.com\/threat-briefings\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.forescout.com\/"},{"@type":"ListItem","position":2,"name":"Threat Reports Overview"}]},{"@type":"WebSite","@id":"https:\/\/www.forescout.com\/#website","url":"https:\/\/www.forescout.com\/","name":"Forescout","description":"","publisher":{"@id":"https:\/\/www.forescout.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.forescout.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.forescout.com\/#organization","name":"Forescout Technologies, Inc.","url":"https:\/\/www.forescout.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.forescout.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.forescout.com\/wp-content\/uploads\/2019\/01\/forescout-logo.svg","contentUrl":"https:\/\/www.forescout.com\/wp-content\/uploads\/2019\/01\/forescout-logo.svg","width":1,"height":1,"caption":"Forescout Technologies, Inc."},"image":{"@id":"https:\/\/www.forescout.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/ForescoutTechnologies","https:\/\/x.com\/Forescout","https:\/\/www.instagram.com\/forescouttechnologies\/","https:\/\/www.linkedin.com\/company\/forescout-technologies","https:\/\/www.youtube.com\/user\/forescout1"]}]}},"featured_media_url":"https:\/\/www.forescout.com\/wp-content\/uploads\/2024\/05\/FS-2024-VL-Riskiest-Connected-Devices-Report-Share-v2.jpg","is_file":false,"excerpt_manually_set":false,"_links":{"self":[{"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/pages\/70688","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/users\/145"}],"replies":[{"embeddable":true,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/comments?post=70688"}],"version-history":[{"count":4,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/pages\/70688\/revisions"}],"predecessor-version":[{"id":107674,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/pages\/70688\/revisions\/107674"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/media\/88261"}],"wp:attachment":[{"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/media?parent=70688"}],"wp:term":[{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/coauthors?post=70688"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}