{"id":84791,"date":"2024-01-22T08:31:06","date_gmt":"2024-01-22T16:31:06","guid":{"rendered":"https:\/\/forescoutstage.wpengine.com\/research-labs\/sierra21-copy\/"},"modified":"2024-04-11T06:00:29","modified_gmt":"2024-04-11T13:00:29","slug":"2023-threat-roundup","status":"publish","type":"page","link":"https:\/\/www.forescout.com\/research-labs\/2023-threat-roundup\/","title":{"rendered":"2023 Threat Roundup"},"content":{"rendered":"<h1>2023 Threat Roundup<\/h1>\n<p>\u00a0<\/p>\n<p>The continuation of ongoing conflicts and the expansion of new ones, the emergence of critical vulnerabilities being mass exploited and the ever-increasing threat of cybercrime were some of the key events of 2023.<\/p>\n<p>Forescout Vedere Labs analyzed attack-related data and the 2023 threat landscape to share with organizations tactical insights and strategic recommendations for improved defense.<\/p>\n<p>\u00a0<\/p>\n<p>Watch Webinar<br \/>\nRead Report\n\n<p>\u00a0<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2022\/06\/FS-2022-OT-ICEFALL-LP-Web-Icons-v1-Vulnerabilities.png\" class=\"c-stats__img\" loading=\"lazy\"><\/p>\n<h3 class=\"c-stats__numbers\">\n420M<\/h3>\n<p class=\"c-stats__text\">Attacks, Jan. \u2013 Dec. 2023<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2024\/01\/attacks.png\" class=\"c-stats__img\" loading=\"lazy\"><\/p>\n<h3 class=\"c-stats__numbers\">\n13<\/h3>\n<p class=\"c-stats__text\">Attacks per Second<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2024\/01\/infected-laptop.png\" class=\"c-stats__img\" loading=\"lazy\"><\/p>\n<h3 class=\"c-stats__numbers\">\n300M<\/h3>\n<p class=\"c-stats__text\">Exploits<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2024\/01\/attack-002.png\" class=\"c-stats__img\" loading=\"lazy\"><\/p>\n<h3 class=\"c-stats__numbers\">\n50000<\/h3>\n<p class=\"c-stats__text\">Unique Malware Samples<\/p>\n<figure class=\"video-player\">\n<\/figure>\n<h2 class=\"c-title \">On-demand Webinar: 2023 Trends in Cyberattacks, Exploits, and Malware<\/h2>\n<p>Join Forescout\u2019s Research team for a deep dive into the cybersecurity landscape. From navigating conflicts to exploiting vulnerabilities and countering cybercrime, we\u2019ll dissect pivotal events that will define the year ahead.<\/p>\n<p><a href=\"\/webinars\/2023-threat-roundup-report\/\" title=\"Watch Now\" class=\"c-btn c-btn--white has-icon icon-camera icon-position-right has-icon-animation icon-animation-fade-in\">Watch Now<br \/>\n<\/a>\n<h3>Top 10 Countries Originating Attacks<\/h3>\n<h2 class=\"c-title \">The Rise of China-Based Attacks<\/h2>\n<ul>\n<li>Attacks originated from 212 countries. <\/li>\n<li>10 countries accounted for 77% of all malicious traffic, with a spike in attacks from China.<\/li>\n<\/ul>\n<p><a href=\"\/blog\/2023-threat-roundup\/\" title=\"Read the Blog\" class=\"c-btn c-btn--primary c-btn--outline has-icon icon-arrow-right icon-position-right has-icon-animation icon-animation-fade-in\">Read the Blog<br \/>\n<\/a>\n<h3>Autonomous System Types Originating Attacks<\/h3>\n<h2 class=\"c-title \">More Compromised Devices<\/h2>\n<ul>\n<li><strong>48%<\/strong> of attacks came from IPs managed by ISPs, <strong>32%<\/strong> from organizations in business, government and other sectors, and 10% from hosting or cloud providers. <\/li>\n<li>This reflects an increase in the use of compromised devices to launch attacks, whether directly or via \u201cresidential proxies\u201d.<\/li>\n<\/ul>\n<h3>Top Attacked Service Types<\/h3>\n<h2 class=\"c-title \">Attacked Services \u2013 Focusing on the Web and IoT<\/h2>\n<ul>\n<li>Web applications were the most attacked service type followed by remote management protocols. <\/li>\n<li>Remote management services were often targeted with specific usernames linked to IoT devices, whereas web applications were often targeted with vulnerability exploits.<\/li>\n<\/ul>\n<p><a href=\"\/resources\/research-report_2023-threat-roundup\/\" title=\"Download the Report\" class=\"c-btn c-btn--white c-btn--outline has-icon icon-duotone-triangles-down icon-position-right has-icon-animation icon-animation-fade-in\" target=\"_blank\" rel=\"noopener\">Download the Report<br \/>\n<\/a>\n<h3>Distribution of Exploited Vulnerabilities by Software Type<\/h3>\n<h2 class=\"c-title \">Exploits \u2013 There\u2019s Much Beyond KEV<\/h2>\n<ul>\n<li>Exploits against software libraries decreased partly because of Log4j exploits losing popularity. <\/li>\n<li>Exploits against network infrastructure and IoT devices increased. The most targeted IoT devices were IP cameras, building automation and network attached storage. <\/li>\n<li>Only <strong>35%<\/strong> of exploited vulnerabilities appeared in CISA KEV.<\/li>\n<\/ul>\n<h2 class=\"c-title\">Threats Unleashed Across 163 Countries<\/h2>\n<p style=\"text-align: center\">Threat actors have cast a digital net far and wide, impacting 163 countries. The United States stands as the primary target, bearing the brunt with 168 malicious actors setting their sights on the nation. Other countries include the United Kingdom (88), Germany (77), India (72), and Japan (66).<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2024\/01\/FSCT_VedereLabs-Y23ThreatRoundup_Infographics_SizeDoesNotMatter_002.png\" loading=\"lazy\"><\/p>\n<h3>Attacks by OT Protocol (top 5)<\/h3>\n<h2 class=\"c-title \">OT Attacks<\/h2>\n<ul>\n<li>Five OT protocols were constantly targeted: Modbus, Ethernet\/IP, Step7, DNP3 and IEC10X. <\/li>\n<li>The remaining 2% are divided into many other protocols, of which the majority is BACnet. <\/li>\n<li>Most attacks target protocols used in industrial automation and the power sector. Building automation protocols are less often scanned, but exploits against building automation are more common.<\/li>\n<\/ul>\n<p><a href=\"\/resources\/research-report_2023-threat-roundup\/\" title=\"Download the Report\" class=\"c-btn c-btn--primary-dark c-btn--outline has-icon icon-duotone-triangles-down icon-position-right has-icon-animation icon-animation-fade-in\" target=\"_blank\" rel=\"noopener\">Download the Report<br \/>\n<\/a>\n<h3>Distribution of Top 10 Commands Executed<\/h3>\n<h2 class=\"c-title \">Persistent Threats<\/h2>\n<ul>\n<li>Post-exploitation actions focused on persistence (50%, up from 3% in 2022), discovery and execution.<\/li>\n<li>Most observed commands were for generic Linux systems, but there were also commands executed specifically for network operating systems that run on popular routers.<\/li>\n<\/ul>\n<h3>Distribution of Malware Types<\/h3>\n<h2 class=\"c-title \">Malware<\/h2>\n<ul>\n<li>RATs and infostealers are the most popular type of malware. Botnets and other downloaders come in third and fourth, followed by crypto miners and then a variety of other malware. <\/li>\n<li>The most popular malware families were the Agent Tesla RAT, then variants of the Mirai botnet and the Redline infostealer. <\/li>\n<li>Cobalt Strike remained the most popular command and control (C2) server, followed by Metasploit and the emerging Sliver C2. <\/li>\n<\/ul>\n<p><a href=\"\/resources\/research-report_2023-threat-roundup\/\" title=\"Download the Report\" class=\"c-btn c-btn--primary-dark c-btn--outline has-icon icon-duotone-triangles-down icon-position-right has-icon-animation icon-animation-fade-in\" target=\"_blank\" rel=\"noopener\">Download the Report<br \/>\n<\/a>\n<h3>Top 10 Targeted Industries<\/h3>\n<h2 class=\"c-title \">Threat Actors<\/h2>\n<ul>\n<li>Threat actors targeted 163 countries. The United States was the most targeted, followed by the UK, Germany, India and Japan. <\/li>\n<li>Most threat actors were in China, Russia and Iran. Together, these three countries accounted for almost half the actors<\/li>\n<li>Government, Financial Services and Media and Entertainment were the most targeted industries.<\/li>\n<\/ul>\n<p><img decoding=\"async\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2024\/01\/2023_global-threat-thm.png\" class=\"u-size-full\" loading=\"lazy\"><\/p>\n<h2 class=\"c-title \">Dive into the research <\/h2>\n<p>In this comprehensive report, Forescout Research \u2013 Vedere Labs meticulously analyzed data pertaining to attacks, exploits, and malware observed throughout 2023. At a strategic level, we strongly advocate that organizations concentrate on enhancing cybersecurity through three fundamental pillars:<\/p>\n<ul class=\"c-list--primary c-list--triangle\" style=\"text-align: left\">\n<li> Begin by conducting a thorough assessment of every asset connected to the network, scrutinizing its security postures, known vulnerabilities, credentials, and open ports. <\/li>\n<li>Avoid exposing unmanaged devices directly to the internet. Opt for network segmentation to isolate IT, IoT, and OT devices, restricting network connections to specifically designated management and engineering workstations. <\/li>\n<li>Utilize an IoT\/OT-aware, Deep Packet Inspection (DPI)-capable monitoring solution to detect and alert on malicious indicators and behaviors.<\/li>\n<\/ul>\n<p><a href=\"\/resources\/research-report_2023-threat-roundup\/\" title=\"Read the Report\" class=\"c-btn c-btn--white c-btn--outline has-icon icon-duotone-triangles-down icon-position-right has-icon-animation icon-animation-fade-in\" target=\"_blank\" rel=\"noopener\">Read the Report<br \/>\n<\/a>\n<h2 class=\"c-title\">Strategic Recommendations: How Forescout can Help<\/h2>\n<ul class=\"c-list--primary c-list--triangle\" style=\"text-align: left\">\n<li><strong>Risk and exposure management. <\/strong>Identify, quantify and prioritize cybersecurity risk. Start by <a href=\"\/solutions\/asset-inventory\/\">discovering and assessing every connected asset<\/a> to gain real-time awareness of your attack surface.<\/li>\n<li><strong>Network security. <\/strong>Continuously monitor all connected assets to <a href=\"\/solutions\/network-access-control\/\">govern network access<\/a>, using real-time traffic visibility to <a href=\"\/products\/eyesegment\/\">manage segmentation<\/a> and dynamic control policies to mitigate and remediate risk.<\/li>\n<li><strong>Threat detection and response. <\/strong><a href=\"\/products\/threat-detection-and-response-xdr\/\">Detect, investigate and respond<\/a> to true threats and incidents using threat detection and response capabilities to collect telemetry and logs, correlate attack signals, generate high-fidelity detections and enable automated responses.<\/li>\n<\/ul>\n<p><a href=\"https:\/\/www.forescout.com\/demo\/\" title=\"schedule a demo\" class=\"c-btn c-btn--white c-btn--outline has-icon icon-demo icon-position-right has-icon-animation icon-animation-pulse\">schedule a demo<br \/>\n<\/a>\n","protected":false},"excerpt":{"rendered":"<p>2023 Threat Roundup \u00a0 The continuation of ongoing conflicts and the expansion of new ones, the emergence of critical vulnerabilities being mass exploited and the ever-increasing threat of cybercrime were some of the key events of 2023. Forescout Vedere Labs analyzed attack-related data and the 2023 threat landscape to share with organizations tactical insights and [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"parent":70336,"menu_order":60,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"ep_exclude_from_search":false,"footnotes":"","_links_to":"","_links_to_target":""},"coauthors":[407],"class_list":["post-84791","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.8 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>2023 Threat Roundup - Forescout<\/title>\n<meta name=\"description\" content=\"Read about the continuation of ongoing conflicts and the expansion of new ones the emergence of critical vulnerabilities being mass exploited and the ever-increasing threat of cybercrime were some of the key events of 2023.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.forescout.com\/research-labs\/2023-threat-roundup\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"2023 Threat Roundup - Forescout\" \/>\n<meta property=\"og:description\" content=\"Read about the continuation of ongoing conflicts and the expansion of new ones the emergence of critical vulnerabilities being mass exploited and the ever-increasing threat of cybercrime were some of the key events of 2023.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.forescout.com\/research-labs\/2023-threat-roundup\/\" \/>\n<meta property=\"og:site_name\" content=\"Forescout\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ForescoutTechnologies\" \/>\n<meta property=\"article:modified_time\" content=\"2024-04-11T13:00:29+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2022\/06\/FS-2022-OT-ICEFALL-LP-Web-Icons-v1-Vulnerabilities.png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@Forescout\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"13 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.forescout.com\/research-labs\/2023-threat-roundup\/\",\"url\":\"https:\/\/www.forescout.com\/research-labs\/2023-threat-roundup\/\",\"name\":\"2023 Threat Roundup - Forescout\",\"isPartOf\":{\"@id\":\"https:\/\/www.forescout.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.forescout.com\/research-labs\/2023-threat-roundup\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.forescout.com\/research-labs\/2023-threat-roundup\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.forescout.com\/wp-content\/uploads\/2022\/06\/FS-2022-OT-ICEFALL-LP-Web-Icons-v1-Vulnerabilities.png\",\"datePublished\":\"2024-01-22T16:31:06+00:00\",\"dateModified\":\"2024-04-11T13:00:29+00:00\",\"description\":\"Read about the continuation of ongoing conflicts and the expansion of new ones the emergence of critical vulnerabilities being mass exploited and the ever-increasing threat of cybercrime were some of the key events of 2023.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.forescout.com\/research-labs\/2023-threat-roundup\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.forescout.com\/research-labs\/2023-threat-roundup\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.forescout.com\/research-labs\/2023-threat-roundup\/#primaryimage\",\"url\":\"https:\/\/www.forescout.com\/wp-content\/uploads\/2022\/06\/FS-2022-OT-ICEFALL-LP-Web-Icons-v1-Vulnerabilities.png\",\"contentUrl\":\"https:\/\/www.forescout.com\/wp-content\/uploads\/2022\/06\/FS-2022-OT-ICEFALL-LP-Web-Icons-v1-Vulnerabilities.png\",\"width\":100,\"height\":100},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.forescout.com\/research-labs\/2023-threat-roundup\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.forescout.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Vedere Labs\",\"item\":\"https:\/\/www.forescout.com\/research-labs\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"2023 Threat Roundup\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.forescout.com\/#website\",\"url\":\"https:\/\/www.forescout.com\/\",\"name\":\"Forescout\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.forescout.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.forescout.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.forescout.com\/#organization\",\"name\":\"Forescout Technologies, Inc.\",\"url\":\"https:\/\/www.forescout.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.forescout.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.forescout.com\/wp-content\/uploads\/2019\/01\/forescout-logo.svg\",\"contentUrl\":\"https:\/\/www.forescout.com\/wp-content\/uploads\/2019\/01\/forescout-logo.svg\",\"width\":1,\"height\":1,\"caption\":\"Forescout Technologies, Inc.\"},\"image\":{\"@id\":\"https:\/\/www.forescout.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/ForescoutTechnologies\",\"https:\/\/x.com\/Forescout\",\"https:\/\/www.instagram.com\/forescouttechnologies\/\",\"https:\/\/www.linkedin.com\/company\/forescout-technologies\",\"https:\/\/www.youtube.com\/user\/forescout1\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"2023 Threat Roundup - Forescout","description":"Read about the continuation of ongoing conflicts and the expansion of new ones the emergence of critical vulnerabilities being mass exploited and the ever-increasing threat of cybercrime were some of the key events of 2023.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.forescout.com\/research-labs\/2023-threat-roundup\/","og_locale":"en_US","og_type":"article","og_title":"2023 Threat Roundup - Forescout","og_description":"Read about the continuation of ongoing conflicts and the expansion of new ones the emergence of critical vulnerabilities being mass exploited and the ever-increasing threat of cybercrime were some of the key events of 2023.","og_url":"https:\/\/www.forescout.com\/research-labs\/2023-threat-roundup\/","og_site_name":"Forescout","article_publisher":"https:\/\/www.facebook.com\/ForescoutTechnologies","article_modified_time":"2024-04-11T13:00:29+00:00","og_image":[{"url":"https:\/\/www.forescout.com\/wp-content\/uploads\/2022\/06\/FS-2022-OT-ICEFALL-LP-Web-Icons-v1-Vulnerabilities.png","type":"","width":"","height":""}],"twitter_card":"summary_large_image","twitter_site":"@Forescout","twitter_misc":{"Est. reading time":"13 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.forescout.com\/research-labs\/2023-threat-roundup\/","url":"https:\/\/www.forescout.com\/research-labs\/2023-threat-roundup\/","name":"2023 Threat Roundup - Forescout","isPartOf":{"@id":"https:\/\/www.forescout.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.forescout.com\/research-labs\/2023-threat-roundup\/#primaryimage"},"image":{"@id":"https:\/\/www.forescout.com\/research-labs\/2023-threat-roundup\/#primaryimage"},"thumbnailUrl":"https:\/\/www.forescout.com\/wp-content\/uploads\/2022\/06\/FS-2022-OT-ICEFALL-LP-Web-Icons-v1-Vulnerabilities.png","datePublished":"2024-01-22T16:31:06+00:00","dateModified":"2024-04-11T13:00:29+00:00","description":"Read about the continuation of ongoing conflicts and the expansion of new ones the emergence of critical vulnerabilities being mass exploited and the ever-increasing threat of cybercrime were some of the key events of 2023.","breadcrumb":{"@id":"https:\/\/www.forescout.com\/research-labs\/2023-threat-roundup\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.forescout.com\/research-labs\/2023-threat-roundup\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.forescout.com\/research-labs\/2023-threat-roundup\/#primaryimage","url":"https:\/\/www.forescout.com\/wp-content\/uploads\/2022\/06\/FS-2022-OT-ICEFALL-LP-Web-Icons-v1-Vulnerabilities.png","contentUrl":"https:\/\/www.forescout.com\/wp-content\/uploads\/2022\/06\/FS-2022-OT-ICEFALL-LP-Web-Icons-v1-Vulnerabilities.png","width":100,"height":100},{"@type":"BreadcrumbList","@id":"https:\/\/www.forescout.com\/research-labs\/2023-threat-roundup\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.forescout.com\/"},{"@type":"ListItem","position":2,"name":"Vedere Labs","item":"https:\/\/www.forescout.com\/research-labs\/"},{"@type":"ListItem","position":3,"name":"2023 Threat Roundup"}]},{"@type":"WebSite","@id":"https:\/\/www.forescout.com\/#website","url":"https:\/\/www.forescout.com\/","name":"Forescout","description":"","publisher":{"@id":"https:\/\/www.forescout.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.forescout.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.forescout.com\/#organization","name":"Forescout Technologies, Inc.","url":"https:\/\/www.forescout.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.forescout.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.forescout.com\/wp-content\/uploads\/2019\/01\/forescout-logo.svg","contentUrl":"https:\/\/www.forescout.com\/wp-content\/uploads\/2019\/01\/forescout-logo.svg","width":1,"height":1,"caption":"Forescout Technologies, Inc."},"image":{"@id":"https:\/\/www.forescout.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/ForescoutTechnologies","https:\/\/x.com\/Forescout","https:\/\/www.instagram.com\/forescouttechnologies\/","https:\/\/www.linkedin.com\/company\/forescout-technologies","https:\/\/www.youtube.com\/user\/forescout1"]}]}},"featured_media_url":false,"is_file":false,"excerpt_manually_set":false,"_links":{"self":[{"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/pages\/84791","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/comments?post=84791"}],"version-history":[{"count":0,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/pages\/84791\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/pages\/70336"}],"wp:attachment":[{"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/media?parent=84791"}],"wp:term":[{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/coauthors?post=84791"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}