{"id":82381,"date":"2023-09-25T13:49:43","date_gmt":"2023-09-25T20:49:43","guid":{"rendered":"https:\/\/forescoutstage.wpengine.com\/research-labs\/ot-icefall-copy\/"},"modified":"2024-03-08T09:58:23","modified_gmt":"2024-03-08T17:58:23","slug":"threat-intelligence","status":"publish","type":"page","link":"https:\/\/www.forescout.com\/research-labs\/threat-intelligence\/","title":{"rendered":"Threat Intelligence"},"content":{"rendered":"<h1>Threat Intelligence<\/h1>\n<p>Forescout Research \u2013 Vedere Labs is the specialized threat and intelligence division of Forescout. For over 10 years, our globally recognized team has dived deep into areas often overlooked by mainstream intelligence, particularly in mixed IoT, OT and IoMT environments. Forescout Vedere Labs conducts threat intelligence research that is consumable via reports, dashboards and machine-readable threat feeds that are delivered to key community stakeholders \u2013 and ingested by the Forescout Platform, to help ensure customers have timely, state-of-the-art defenses.<\/p>\n<p>\u00a0<\/p>\n<p>Visit Dashboards<\/p>\n<p>\u00a0<\/p>\n<h2 class=\"c-title\">Forescout Adversary Engagement Environment (AEE)<\/h2>\n<p>Our Adversary Engagement Environment includes real and simulated devices, networks and organizations that are geographically dispersed to attract attackers and generate threat intel. <\/p>\n<ul class=\"c-list--primary c-list--triangle\" style=\"text-align: left;height: auto\">\n<li>Our specialized lab contains dozens of OT\/IoT\/IoMT devices collected over the years. A selection of these devices is deliberately exposed in the AEE, allowing us to interact with and closely monitor threat actors\u2019 activities. <\/li>\n<li>Our in-depth research, combined with our expertise in unmanaged devices, operating systems and components, allows us to track the paths and patterns of threats. <\/li>\n<p>\n<em>We observe their movements, lateral transitions, and the specific assets and vulnerabilities they target, all of which contribute to our original home-brewed threat intelligence. <\/em>\n<\/ul>\n<p><img decoding=\"async\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/10\/FS-2023-Web-Refresh-Research-adversary-engagement-diagram_v01.png\" loading=\"lazy\"><\/p>\n<p><a href=\"https:\/\/forescout.vederelabs.com\/\" title=\"Visit Dashboard\" class=\"c-btn c-btn--primary c-btn--outline has-icon icon-demo icon-position-right element-visibility has-element-animation element-animation-fade-in-and-scale-up\" target=\"_blank\" rel=\"noopener\">Visit Dashboard<br \/>\n<\/a>\n<figure class=\"video-player\">\n<\/figure>\n<h2 class=\"c-title \">Global Cyber Intelligence Dashboard<\/h2>\n<p>Forescout Vedere Labs created the Global Cyber Intelligence Dashboard to communicate its data, research and analysis to the broader cybersecurity community. It leverages 39 billion data points collected from millions of deployed IT, IoT, IoMT and OT devices, as well as robust network data stored in our proprietary data lake. The dashboard is a unique source of information about vulnerabilities and the global state of cyber risk. It also provides a starting point for visitors to explore the timely research performed by Forescout Vedere Labs.<\/p>\n<p><a href=\"https:\/\/forescout.vederelabs.com\/attacks-dashboard\" class=\"u-display-inline-block u-line-height-0\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/09\/attack-locations.png\" class=\"u-size-full\" loading=\"lazy\"><\/a><\/p>\n<h2 class=\"c-title \">Attacks Dashboard<\/h2>\n<p>The Attacks Dashboard features regularly updated data about where most attacks originate, what attack techniques are used most frequently in enterprise and OT environments, what vulnerabilities are most exploited and other relevant information.<\/p>\n<p><a href=\"https:\/\/forescout.vederelabs.com\/attacks-dashboard\" title=\"Visit Dashboard\" class=\"c-btn c-btn--primary-dark has-icon icon-demo icon-position-right has-icon-animation icon-animation-pulse element-visibility has-element-animation element-animation-slide-in-from-left\" target=\"_blank\" rel=\"noopener\">Visit Dashboard<br \/>\n<\/a>\n<p><img decoding=\"async\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/09\/vedere-dashboard.png\" class=\"u-size-full\" loading=\"lazy\"><\/p>\n<h2 class=\"c-title \">Threat Actors Dashboard<\/h2>\n<p>The Threat Actors Dashboard offers daily insights into the most active threat actors, detailing their origins and identifying what countries and industries they target the most.  <\/p>\n<p><a href=\"https:\/\/forescout.vederelabs.com\/threat-actors-dashboard\" title=\"Visit Dashboard\" class=\"c-btn c-btn--primary has-icon icon-demo icon-position-right has-icon-animation icon-animation-pulse\" target=\"_blank\" rel=\"noopener\">Visit Dashboard<br \/>\n<\/a>\n<h3 class=\"c-title-medium u-mt-s\">Threat Feed Service <\/h3>\n<p>The Threat Feed Service allows our key partners and stakeholders to consume the threat intelligence generated by Forescout Vedere Labs in a machine-readable way. The feeds provide a list of daily updated indicators of compromise including bad IPs, bad DNS, bad file hashes and URLS. It also provides a list of known exploited vulnerabilities (VL-KEV) observed via our AEE. <\/p>\n<p><a href=\"https:\/\/forescout.vederelabs.com\/register\" title=\"Sign Up For Feeds\" class=\"c-btn c-btn--primary u-mt-auto\" target=\"_blank\" rel=\"noopener\">Sign Up For Feeds<\/a><\/p>\n<h3 class=\"c-title-medium u-mt-s\">Threat Newsletter <\/h3>\n<p>The Forescout Vedere Labs newsletter offers a comprehensive monthly recap of critical vulnerabilities, malware trends and threat actor activities. It includes firsthand insights from our team, complemented by a roundup of external observations. Stay current with highlights from both tactical intelligence from our threat feeds and strategic intelligence from our reports. <\/p>\n<p><img decoding=\"async\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2021\/06\/research-two-columns2.png\" loading=\"lazy\"><\/p>\n<p><img decoding=\"async\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2021\/06\/research-two-columns.png\" loading=\"lazy\"><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Threat Intelligence Forescout Research \u2013 Vedere Labs is the specialized threat and intelligence division of Forescout. For over 10 years, our globally recognized team has dived deep into areas often overlooked by mainstream intelligence, particularly in mixed IoT, OT and IoMT environments. Forescout Vedere Labs conducts threat intelligence research that is consumable via reports, dashboards [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"parent":70336,"menu_order":60,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"ep_exclude_from_search":false,"footnotes":"","_links_to":"","_links_to_target":""},"coauthors":[407],"class_list":["post-82381","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.8 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Threat Intelligence - Forescout<\/title>\n<meta name=\"description\" content=\"Forescout\u2019s Vedere Labs has discovered a set of 56 vulnerabilities affecting devices from 10 operational technology (OT) vendors caused by insecure-by-design practices in OT. The affected products are known to be prevalent in industries such as oil and gas, chemical, nuclear, power generation and distribution, manufacturing, water treatment and distribution, mining, and building automation. Many of these products are sold as \u201csecure by design\u201d or have been certified with OT security standards.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.forescout.com\/research-labs\/threat-intelligence\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Threat Intelligence - Forescout\" \/>\n<meta property=\"og:description\" content=\"Forescout\u2019s Vedere Labs has discovered a set of 56 vulnerabilities affecting devices from 10 operational technology (OT) vendors caused by insecure-by-design practices in OT. The affected products are known to be prevalent in industries such as oil and gas, chemical, nuclear, power generation and distribution, manufacturing, water treatment and distribution, mining, and building automation. Many of these products are sold as \u201csecure by design\u201d or have been certified with OT security standards.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.forescout.com\/research-labs\/threat-intelligence\/\" \/>\n<meta property=\"og:site_name\" content=\"Forescout\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ForescoutTechnologies\" \/>\n<meta property=\"article:modified_time\" content=\"2024-03-08T17:58:23+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/10\/FS-2023-Web-Refresh-Research-adversary-engagement-diagram_v01.png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@Forescout\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.forescout.com\/research-labs\/threat-intelligence\/\",\"url\":\"https:\/\/www.forescout.com\/research-labs\/threat-intelligence\/\",\"name\":\"Threat Intelligence - Forescout\",\"isPartOf\":{\"@id\":\"https:\/\/www.forescout.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.forescout.com\/research-labs\/threat-intelligence\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.forescout.com\/research-labs\/threat-intelligence\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/10\/FS-2023-Web-Refresh-Research-adversary-engagement-diagram_v01.png\",\"datePublished\":\"2023-09-25T20:49:43+00:00\",\"dateModified\":\"2024-03-08T17:58:23+00:00\",\"description\":\"Forescout\u2019s Vedere Labs has discovered a set of 56 vulnerabilities affecting devices from 10 operational technology (OT) vendors caused by insecure-by-design practices in OT. The affected products are known to be prevalent in industries such as oil and gas, chemical, nuclear, power generation and distribution, manufacturing, water treatment and distribution, mining, and building automation. Many of these products are sold as \u201csecure by design\u201d or have been certified with OT security standards.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.forescout.com\/research-labs\/threat-intelligence\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.forescout.com\/research-labs\/threat-intelligence\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.forescout.com\/research-labs\/threat-intelligence\/#primaryimage\",\"url\":\"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/10\/FS-2023-Web-Refresh-Research-adversary-engagement-diagram_v01.png\",\"contentUrl\":\"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/10\/FS-2023-Web-Refresh-Research-adversary-engagement-diagram_v01.png\",\"width\":1751,\"height\":835},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.forescout.com\/research-labs\/threat-intelligence\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.forescout.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Vedere Labs\",\"item\":\"https:\/\/www.forescout.com\/research-labs\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Threat Intelligence\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.forescout.com\/#website\",\"url\":\"https:\/\/www.forescout.com\/\",\"name\":\"Forescout\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.forescout.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.forescout.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.forescout.com\/#organization\",\"name\":\"Forescout Technologies, Inc.\",\"url\":\"https:\/\/www.forescout.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.forescout.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.forescout.com\/wp-content\/uploads\/2019\/01\/forescout-logo.svg\",\"contentUrl\":\"https:\/\/www.forescout.com\/wp-content\/uploads\/2019\/01\/forescout-logo.svg\",\"width\":1,\"height\":1,\"caption\":\"Forescout Technologies, Inc.\"},\"image\":{\"@id\":\"https:\/\/www.forescout.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/ForescoutTechnologies\",\"https:\/\/x.com\/Forescout\",\"https:\/\/www.instagram.com\/forescouttechnologies\/\",\"https:\/\/www.linkedin.com\/company\/forescout-technologies\",\"https:\/\/www.youtube.com\/user\/forescout1\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Threat Intelligence - Forescout","description":"Forescout\u2019s Vedere Labs has discovered a set of 56 vulnerabilities affecting devices from 10 operational technology (OT) vendors caused by insecure-by-design practices in OT. The affected products are known to be prevalent in industries such as oil and gas, chemical, nuclear, power generation and distribution, manufacturing, water treatment and distribution, mining, and building automation. Many of these products are sold as \u201csecure by design\u201d or have been certified with OT security standards.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.forescout.com\/research-labs\/threat-intelligence\/","og_locale":"en_US","og_type":"article","og_title":"Threat Intelligence - Forescout","og_description":"Forescout\u2019s Vedere Labs has discovered a set of 56 vulnerabilities affecting devices from 10 operational technology (OT) vendors caused by insecure-by-design practices in OT. The affected products are known to be prevalent in industries such as oil and gas, chemical, nuclear, power generation and distribution, manufacturing, water treatment and distribution, mining, and building automation. Many of these products are sold as \u201csecure by design\u201d or have been certified with OT security standards.","og_url":"https:\/\/www.forescout.com\/research-labs\/threat-intelligence\/","og_site_name":"Forescout","article_publisher":"https:\/\/www.facebook.com\/ForescoutTechnologies","article_modified_time":"2024-03-08T17:58:23+00:00","og_image":[{"url":"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/10\/FS-2023-Web-Refresh-Research-adversary-engagement-diagram_v01.png","type":"","width":"","height":""}],"twitter_card":"summary_large_image","twitter_site":"@Forescout","twitter_misc":{"Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.forescout.com\/research-labs\/threat-intelligence\/","url":"https:\/\/www.forescout.com\/research-labs\/threat-intelligence\/","name":"Threat Intelligence - Forescout","isPartOf":{"@id":"https:\/\/www.forescout.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.forescout.com\/research-labs\/threat-intelligence\/#primaryimage"},"image":{"@id":"https:\/\/www.forescout.com\/research-labs\/threat-intelligence\/#primaryimage"},"thumbnailUrl":"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/10\/FS-2023-Web-Refresh-Research-adversary-engagement-diagram_v01.png","datePublished":"2023-09-25T20:49:43+00:00","dateModified":"2024-03-08T17:58:23+00:00","description":"Forescout\u2019s Vedere Labs has discovered a set of 56 vulnerabilities affecting devices from 10 operational technology (OT) vendors caused by insecure-by-design practices in OT. The affected products are known to be prevalent in industries such as oil and gas, chemical, nuclear, power generation and distribution, manufacturing, water treatment and distribution, mining, and building automation. Many of these products are sold as \u201csecure by design\u201d or have been certified with OT security standards.","breadcrumb":{"@id":"https:\/\/www.forescout.com\/research-labs\/threat-intelligence\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.forescout.com\/research-labs\/threat-intelligence\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.forescout.com\/research-labs\/threat-intelligence\/#primaryimage","url":"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/10\/FS-2023-Web-Refresh-Research-adversary-engagement-diagram_v01.png","contentUrl":"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/10\/FS-2023-Web-Refresh-Research-adversary-engagement-diagram_v01.png","width":1751,"height":835},{"@type":"BreadcrumbList","@id":"https:\/\/www.forescout.com\/research-labs\/threat-intelligence\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.forescout.com\/"},{"@type":"ListItem","position":2,"name":"Vedere Labs","item":"https:\/\/www.forescout.com\/research-labs\/"},{"@type":"ListItem","position":3,"name":"Threat Intelligence"}]},{"@type":"WebSite","@id":"https:\/\/www.forescout.com\/#website","url":"https:\/\/www.forescout.com\/","name":"Forescout","description":"","publisher":{"@id":"https:\/\/www.forescout.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.forescout.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.forescout.com\/#organization","name":"Forescout Technologies, Inc.","url":"https:\/\/www.forescout.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.forescout.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.forescout.com\/wp-content\/uploads\/2019\/01\/forescout-logo.svg","contentUrl":"https:\/\/www.forescout.com\/wp-content\/uploads\/2019\/01\/forescout-logo.svg","width":1,"height":1,"caption":"Forescout Technologies, Inc."},"image":{"@id":"https:\/\/www.forescout.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/ForescoutTechnologies","https:\/\/x.com\/Forescout","https:\/\/www.instagram.com\/forescouttechnologies\/","https:\/\/www.linkedin.com\/company\/forescout-technologies","https:\/\/www.youtube.com\/user\/forescout1"]}]}},"featured_media_url":false,"is_file":false,"excerpt_manually_set":false,"_links":{"self":[{"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/pages\/82381","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/comments?post=82381"}],"version-history":[{"count":0,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/pages\/82381\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/pages\/70336"}],"wp:attachment":[{"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/media?parent=82381"}],"wp:term":[{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/coauthors?post=82381"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}