{"id":89421,"date":"2024-08-13T12:11:03","date_gmt":"2024-08-13T19:11:03","guid":{"rendered":"https:\/\/forescoutstage.wpengine.com\/research-labs\/riskiest-devices-copy\/"},"modified":"2024-08-30T15:55:04","modified_gmt":"2024-08-30T22:55:04","slug":"2024h1-threat-review","status":"publish","type":"page","link":"https:\/\/www.forescout.com\/research-labs\/2024h1-threat-review\/","title":{"rendered":"2024H1 Threat Review"},"content":{"rendered":"<h1>2024H1 Threat Review<\/h1>\n<h2>Perils in the Periphery<\/h2>\n<h4>Vulnerabilities, Threat Actors and Ransomware in the Unmanaged Perimeter<\/h4>\n<p>New threat actors have emerged. So have new techniques. Forescout Research \u2013 Vedere Labs widens its lens with a macro look at the most pressing cybersecurity risks of the year so far. From digital extortion to state-sponsored intrusions, we find threat patterns and isolate changes in cyber attack behavior. Most importantly, we can see how and where they are doing it. Right now, it is happening in your unmanaged network perimeter via VPNs and network appliance vulnerabilities.<\/p>\n<p>Which VPN vendors? Who are the threat actors? Which countries and industries are most targeted? See all. Know more.<\/p>\n<p>\u00a0<\/p>\n<p>Get The Report<\/p>\n<p>\u00a0<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2024\/05\/devices.png\" class=\"c-stats__img\" style=\"width:100px;height:auto\" loading=\"lazy\"><\/p>\n<h3 class=\"c-stats__numbers\">\n43%<\/h3>\n<p class=\"c-stats__text\">Vulnerability Growth <\/p>\n<p><img decoding=\"async\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2022\/02\/FS-2022-About-Vedere-Labs-v1-Icon-B-Analyze-3-140x140-1.png\" class=\"c-stats__img\" style=\"width:100px;height:auto\" loading=\"lazy\"><\/p>\n<h3 class=\"c-stats__numbers\">\n15\/Day<\/h3>\n<p class=\"c-stats__text\">Ransomware Attacks<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2024\/05\/increase.png\" class=\"c-stats__img\" style=\"width:100px;height:auto\" loading=\"lazy\"><\/p>\n<h3 class=\"c-stats__numbers\">\n55%<\/h3>\n<p class=\"c-stats__text\">Growth in Active Threat Groups<\/p>\n<figure class=\"video-player\">\n<\/figure>\n<h2 class=\"c-title \">Explore Today\u2019s Most Vulnerable Devices<\/h2>\n<p>Healthcare, manufacturing and critical infrastructure industries, listen up. As we do every year, we share our knowledge from our Riskiest Connected Devices research across critical IT, IoT, OT and IoMT assets. Join this on-demand webinar led by Daniel dos Santos, Head of Security Research, Vedere Labs, who discusses exclusive findings and insights into asset risk. He also shares the most important and up-to-date ways to mitigate these risks in 2024.  <\/p>\n<p><a href=\"\/webinars\/2024-riskiest-devices-ams\/\" title=\"Watch Now\" class=\"c-btn c-btn--white c-btn--outline has-icon icon-camera icon-position-right has-icon-animation icon-animation-fade-in\">Watch Now<\/a><\/p>\n<h2 class=\"c-title\">Countries Most Targeted<\/h2>\n<p>US, Germany, India, Australia, UK, France, Italy, China, Japan, Canada<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2024\/08\/Perils-in-the-Periphery_Heat-Map-Ransomware-Incidents-2024H1.png\" class=\"element-visibility has-element-animation element-animation-fade-in\" loading=\"lazy\"><\/p>\n<h2 class=\"c-title \">\n<h3>Ransomware<\/h3>\n<\/h2>\n<p>Vedere Labs observed 3,085 attacks in 2024H1, an increase from 2,899 during the same period last year which is an increase of 6%. This averages to 441 attacks per month or 15 per day. To better understand the context of today\u2019s digital extortion, read our recent blog \u201cThe Current State of Ransomware Risk.\u201d <\/p>\n<p><a href=\"\/resources\/2024h1-threat-review\/\" title=\"Get Full Report\" class=\"c-btn c-btn--white has-icon icon-arrow-right icon-position-right has-icon-animation icon-animation-fade-in\" target=\"_blank\" rel=\"noopener\">Get Full Report<\/a><\/p>\n<h2 class=\"c-title \">\n<h3>Industries Most Targeted <\/h3>\n<\/h2>\n<p>The top 10 targeted industries remain the same as last year with minor shifts in ranking. For example, healthcare used to be fifth and is now seventh. Government, financial services, technology, telecommunications, and healthcare are the Top 5. Interestingly, financial services dropped 36% from 20231H. <\/p>\n<h2 class=\"c-title \">\n<h3>Threat Actor Categories <\/h3>\n<\/h2>\n<p>Vedere Labs tracks information on 740 threat actors \u2014387 (52%) had updates in 2024H1. The live information about all threat actors is available on our website. These 387 actors are predominantly cybercriminals (50%), including ransomware groups, followed by state-sponsored actors (40%) and hacktivists (10%).  <\/p>\n<p><a href=\"\/blog\/vpn-vulnerabilities-cyber-attacks\/\" title=\"Read the Blog\" class=\"c-btn c-btn--primary c-btn--outline has-icon icon-duotone-triangles-down icon-position-right has-icon-animation icon-animation-fade-in\">Read the Blog<\/a><\/p>\n<p><a href=\"\/resources\/2024h1_threat_review_report\" class=\"u-display-inline-block u-line-height-0\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2024\/04\/perils-in-the-periphery-report_THM.png\" class=\"u-size-full\" loading=\"lazy\"><\/a><\/p>\n<h2 class=\"c-title \">Dive Into the Research <\/h2>\n<p>Stay on top of this year\u2019s trends, so you can know where to focus your cybersecurity and OT defenses. Get all the data and analysis including:<br \/>\n\u00a0\n<ul class=\"c-list--primary c-list--triangle\" style=\"text-align: left\">\n<li>What\u2019s really happening in state-sponsored activity<\/li>\n<li>Threat actor trends by name including new threat actor groups<\/li>\n<li>Why VPNs and network appliances are being targeted at an accelerated rate<\/li>\n<\/ul>\n<p><a href=\"\/resources\/2024h1-threat-review\/\" title=\"Read Report\" class=\"c-btn c-btn--primary c-btn--outline has-icon icon-duotone-triangles-down icon-position-right has-icon-animation icon-animation-fade-in\" target=\"_blank\" rel=\"noopener\">Read Report<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>2024H1 Threat Review Perils in the Periphery Vulnerabilities, Threat Actors and Ransomware in the Unmanaged Perimeter New threat actors have emerged. So have new techniques. Forescout Research \u2013 Vedere Labs widens its lens with a macro look at the most pressing cybersecurity risks of the year so far. From digital extortion to state-sponsored intrusions, we [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":89494,"parent":70336,"menu_order":60,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"ep_exclude_from_search":false,"footnotes":"","_links_to":"","_links_to_target":""},"coauthors":[407],"class_list":["post-89421","page","type-page","status-publish","has-post-thumbnail","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.8 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>2024H1 Threat Review - Forescout Research<\/title>\n<meta name=\"description\" content=\"Forescout\u2019s 2024 Riskiest Connected Devices research report audits cybersecurity risk of IT, OT, IoT, IoMT assets in 10 industry verticals.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.forescout.com\/research-labs\/2024h1-threat-review\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"2024H1 Threat Review - Forescout Research\" \/>\n<meta property=\"og:description\" content=\"Forescout\u2019s 2024 Riskiest Connected Devices research report audits cybersecurity risk of IT, OT, IoT, IoMT assets in 10 industry verticals.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.forescout.com\/research-labs\/2024h1-threat-review\/\" \/>\n<meta property=\"og:site_name\" content=\"Forescout\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ForescoutTechnologies\" \/>\n<meta property=\"article:modified_time\" content=\"2024-08-30T22:55:04+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2024\/08\/FS-2024-VL-Perils-in-the-Periphery-Report-Social-Share-v1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"628\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@Forescout\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"9 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.forescout.com\/research-labs\/2024h1-threat-review\/\",\"url\":\"https:\/\/www.forescout.com\/research-labs\/2024h1-threat-review\/\",\"name\":\"2024H1 Threat Review - Forescout Research\",\"isPartOf\":{\"@id\":\"https:\/\/www.forescout.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.forescout.com\/research-labs\/2024h1-threat-review\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.forescout.com\/research-labs\/2024h1-threat-review\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.forescout.com\/wp-content\/uploads\/2024\/08\/FS-2024-VL-Perils-in-the-Periphery-Report-Social-Share-v1.jpg\",\"datePublished\":\"2024-08-13T19:11:03+00:00\",\"dateModified\":\"2024-08-30T22:55:04+00:00\",\"description\":\"Forescout\u2019s 2024 Riskiest Connected Devices research report audits cybersecurity risk of IT, OT, IoT, IoMT assets in 10 industry verticals.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.forescout.com\/research-labs\/2024h1-threat-review\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.forescout.com\/research-labs\/2024h1-threat-review\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.forescout.com\/research-labs\/2024h1-threat-review\/#primaryimage\",\"url\":\"https:\/\/www.forescout.com\/wp-content\/uploads\/2024\/08\/FS-2024-VL-Perils-in-the-Periphery-Report-Social-Share-v1.jpg\",\"contentUrl\":\"https:\/\/www.forescout.com\/wp-content\/uploads\/2024\/08\/FS-2024-VL-Perils-in-the-Periphery-Report-Social-Share-v1.jpg\",\"width\":1200,\"height\":628},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.forescout.com\/research-labs\/2024h1-threat-review\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.forescout.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Vedere Labs\",\"item\":\"https:\/\/www.forescout.com\/research-labs\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"2024H1 Threat Review\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.forescout.com\/#website\",\"url\":\"https:\/\/www.forescout.com\/\",\"name\":\"Forescout\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.forescout.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.forescout.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.forescout.com\/#organization\",\"name\":\"Forescout Technologies, Inc.\",\"url\":\"https:\/\/www.forescout.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.forescout.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.forescout.com\/wp-content\/uploads\/2019\/01\/forescout-logo.svg\",\"contentUrl\":\"https:\/\/www.forescout.com\/wp-content\/uploads\/2019\/01\/forescout-logo.svg\",\"width\":1,\"height\":1,\"caption\":\"Forescout Technologies, Inc.\"},\"image\":{\"@id\":\"https:\/\/www.forescout.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/ForescoutTechnologies\",\"https:\/\/x.com\/Forescout\",\"https:\/\/www.instagram.com\/forescouttechnologies\/\",\"https:\/\/www.linkedin.com\/company\/forescout-technologies\",\"https:\/\/www.youtube.com\/user\/forescout1\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"2024H1 Threat Review - Forescout Research","description":"Forescout\u2019s 2024 Riskiest Connected Devices research report audits cybersecurity risk of IT, OT, IoT, IoMT assets in 10 industry verticals.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.forescout.com\/research-labs\/2024h1-threat-review\/","og_locale":"en_US","og_type":"article","og_title":"2024H1 Threat Review - Forescout Research","og_description":"Forescout\u2019s 2024 Riskiest Connected Devices research report audits cybersecurity risk of IT, OT, IoT, IoMT assets in 10 industry verticals.","og_url":"https:\/\/www.forescout.com\/research-labs\/2024h1-threat-review\/","og_site_name":"Forescout","article_publisher":"https:\/\/www.facebook.com\/ForescoutTechnologies","article_modified_time":"2024-08-30T22:55:04+00:00","og_image":[{"width":1200,"height":628,"url":"https:\/\/www.forescout.com\/wp-content\/uploads\/2024\/08\/FS-2024-VL-Perils-in-the-Periphery-Report-Social-Share-v1.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_site":"@Forescout","twitter_misc":{"Est. reading time":"9 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.forescout.com\/research-labs\/2024h1-threat-review\/","url":"https:\/\/www.forescout.com\/research-labs\/2024h1-threat-review\/","name":"2024H1 Threat Review - Forescout Research","isPartOf":{"@id":"https:\/\/www.forescout.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.forescout.com\/research-labs\/2024h1-threat-review\/#primaryimage"},"image":{"@id":"https:\/\/www.forescout.com\/research-labs\/2024h1-threat-review\/#primaryimage"},"thumbnailUrl":"https:\/\/www.forescout.com\/wp-content\/uploads\/2024\/08\/FS-2024-VL-Perils-in-the-Periphery-Report-Social-Share-v1.jpg","datePublished":"2024-08-13T19:11:03+00:00","dateModified":"2024-08-30T22:55:04+00:00","description":"Forescout\u2019s 2024 Riskiest Connected Devices research report audits cybersecurity risk of IT, OT, IoT, IoMT assets in 10 industry verticals.","breadcrumb":{"@id":"https:\/\/www.forescout.com\/research-labs\/2024h1-threat-review\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.forescout.com\/research-labs\/2024h1-threat-review\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.forescout.com\/research-labs\/2024h1-threat-review\/#primaryimage","url":"https:\/\/www.forescout.com\/wp-content\/uploads\/2024\/08\/FS-2024-VL-Perils-in-the-Periphery-Report-Social-Share-v1.jpg","contentUrl":"https:\/\/www.forescout.com\/wp-content\/uploads\/2024\/08\/FS-2024-VL-Perils-in-the-Periphery-Report-Social-Share-v1.jpg","width":1200,"height":628},{"@type":"BreadcrumbList","@id":"https:\/\/www.forescout.com\/research-labs\/2024h1-threat-review\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.forescout.com\/"},{"@type":"ListItem","position":2,"name":"Vedere Labs","item":"https:\/\/www.forescout.com\/research-labs\/"},{"@type":"ListItem","position":3,"name":"2024H1 Threat Review"}]},{"@type":"WebSite","@id":"https:\/\/www.forescout.com\/#website","url":"https:\/\/www.forescout.com\/","name":"Forescout","description":"","publisher":{"@id":"https:\/\/www.forescout.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.forescout.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.forescout.com\/#organization","name":"Forescout Technologies, Inc.","url":"https:\/\/www.forescout.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.forescout.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.forescout.com\/wp-content\/uploads\/2019\/01\/forescout-logo.svg","contentUrl":"https:\/\/www.forescout.com\/wp-content\/uploads\/2019\/01\/forescout-logo.svg","width":1,"height":1,"caption":"Forescout Technologies, Inc."},"image":{"@id":"https:\/\/www.forescout.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/ForescoutTechnologies","https:\/\/x.com\/Forescout","https:\/\/www.instagram.com\/forescouttechnologies\/","https:\/\/www.linkedin.com\/company\/forescout-technologies","https:\/\/www.youtube.com\/user\/forescout1"]}]}},"featured_media_url":"https:\/\/www.forescout.com\/wp-content\/uploads\/2024\/08\/FS-2024-VL-Perils-in-the-Periphery-Report-Social-Share-v1.jpg","is_file":false,"excerpt_manually_set":false,"_links":{"self":[{"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/pages\/89421","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/comments?post=89421"}],"version-history":[{"count":1,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/pages\/89421\/revisions"}],"predecessor-version":[{"id":107580,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/pages\/89421\/revisions\/107580"}],"up":[{"embeddable":true,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/pages\/70336"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/media\/89494"}],"wp:attachment":[{"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/media?parent=89421"}],"wp:term":[{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/coauthors?post=89421"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}