ETFOptimize | High-performance ETF-based Investment Strategies

Quantitative strategies, Wall Street-caliber research, and insightful market analysis since 1998.


ETFOptimize | HOME
Close Window

Forescout’s 2025 Threat Roundup Report Finds 84% More Cyberattacks Using Operational Technology Protocols

Snapshot of the global threat landscape includes surges in abuse of cloud services, rise in globally distributed attacks, and increased threats targeting critical infrastructure

Forescout Technologies Inc., a global leader in cybersecurity, today released its “2025 Threat Roundup” report, an analysis of the global threat landscape and notable trends cyber defenders need to know in 2026. Forescout Research – Vedere Labs reviewed more than 900 million attacks globally between January and December 2025.

Cyberattacks became more globally distributed and increasingly cloud-enabled in 2025. Threat actors focused more on exploiting rapidly shifting infrastructure, OT protocols, vulnerable web apps, and emerging AI platforms while increasingly targeting critical industries including healthcare, manufacturing, government, energy, and financial services.

Download the full report and read the accompanying blog.

“The 2025 Threat Roundup shows how quickly threat actors are adapting to new technology trends – abusing cloud services and fast-cycling Autonomous Systems, and even components in popular AI development stacks like Langflow,” said Barry Mainz, Forescout CEO. “To combat these threats in 2026, organizations must monitor East-West traffic and prioritize threat containment to stop attackers from moving laterally across environments. Deeper visibility, enhanced risk assessment, and proactive controls are non-negotiables for today’s defenders.”

Forescout Research – Vedere Labs “2025 Threat Roundup” Key Findings

Cyberattacks were more globally distributed

  • Attacks originated from 214 different countries and territories, with most threat actors originating from China, Russia, and Iran.
  • Attackers are using IP addresses registered in a wider array of countries. The top 10 countries accounted for 61% of malicious traffic observed, down 22% compared to 2024.
  • The United States was the most targeted country, followed by India and Germany. Compared to 2024, India and Germany swapped places on the list, but remained in the top three most targeted countries.
  • Although the number of cyber criminals and state-sponsored actors were similar, cyber criminals were responsible for nearly six times more cyber incidents than state-sponsored actors.

Attack infrastructure and tactics evolved quickly

  • The abuse of Amazon and Google infrastructure alone were responsible for more than 15% of attacks observed in 2025, up from 11% in 2024.
  • Network infrastructure used for malicious activity, including Autonomous Systems, shifted rapidly, partly due to intense law enforcement disruption. Two of the top 10 most exploited Autonomous Systems from 2024 dropped off the list entirely in 2025, while three new entries had not previously ranked in the top 500.
  • Web applications remained the most attacked service type at 61%, up from 41% in 2024, followed by remote management protocols at 15%.

Exploitation grew across IT, IoT, and OT

  • Attacks using OT protocols surged by 84%, led by Modbus (57%), Ethernet/IP (22%), and BACnet (8%).
  • Exploits against IoT devices increased from 16% to 19%, with IP cameras and NVRs the most frequent targets.
  • Exploits targeting network infrastructure devices remained the second most common attack category, representing 19% of all observed exploits.

Vulnerabilities increased — and exploitation patterns shifted

  • 242 vulnerabilities were added to CISA KEV, a 30% increase YoY, and 285 were added to the Vedere Labs KEV, a 213% increase YoY.
  • Attackers continue to exploit issues not prioritized by major advisories; 71% of exploited vulnerabilities were not in the CISA KEV catalog.
  • Langflow, an open-source, low-code AI development platform, was one of the most exploited new vulnerabilities, showing that as AI adoption accelerates, its underlying tools are becoming attractive targets.

“Threat actors are devoting far more effort to reconnaissance, with discovery activity now accounting for 91% of post-exploitation actions,” said Daniel dos Santos, Vice President of Research at Forescout. “That’s up from just 25% in 2023 – a dramatic increase that shows attackers are spending more time interacting with breached systems to understand what’s inside or to identify other targets within the network. This shift gives defenders a larger window to detect compromise before more damaging actions – such as exfiltration, deletion or encryption – can occur. Holistic visibility, early detection of discovery behaviors, and network segmentation across IT, IoT, and OT environments are critical to prevent lateral movements and stop modern attacks.”

Visit the Forescout Research – Vedere Labs website for more information about the latest threats and vulnerabilities.

About Forescout

For over 25 years, organizations and governments worldwide have trusted Forescout to secure their networks. From pioneering Network Access Control (NAC) to delivering Universal Zero Trust Network Access (UZTNA), Forescout leads the evolution of enterprise network security across IT, OT, IoT, and IoMT environments. The Forescout 4D Platform™ delivers comprehensive asset intelligence, continuous risk assessment, and dynamic control, over all managed and unmanaged assets, enhanced by the proprietary threat intelligence research of Vedere Labs. Leveraging agentic AI workflows with human-in-the-loop actions, Forescout continuously analyzes threats, orchestrates response, and integrates seamlessly with 180+ security and IT products.

The 2025 Threat Roundup shows how quickly threat actors are adapting to new technology trends – abusing cloud services and fast-cycling Autonomous Systems, and even components in popular AI development stacks like Langflow.

Contacts

Recent Quotes

View More
Symbol Price Change (%)
AMZN  210.00
+2.08 (1.00%)
AAPL  264.18
-8.77 (-3.21%)
AMD  200.21
-3.47 (-1.70%)
BAC  49.83
-2.47 (-4.72%)
GOOG  311.43
+4.28 (1.39%)
META  648.18
-8.83 (-1.34%)
MSFT  392.74
-8.98 (-2.24%)
NVDA  177.19
-7.70 (-4.16%)
ORCL  145.40
-4.91 (-3.27%)
TSLA  402.51
-6.07 (-1.49%)
Stock Quote API & Stock News API supplied by www.cloudquote.io
Quotes delayed at least 20 minutes.
By accessing this page, you agree to the Privacy Policy and Terms Of Service.


 

IntelligentValue Home
Close Window

DISCLAIMER

All content herein is issued solely for informational purposes and is not to be construed as an offer to sell or the solicitation of an offer to buy, nor should it be interpreted as a recommendation to buy, hold or sell (short or otherwise) any security.  All opinions, analyses, and information included herein are based on sources believed to be reliable, but no representation or warranty of any kind, expressed or implied, is made including but not limited to any representation or warranty concerning accuracy, completeness, correctness, timeliness or appropriateness. We undertake no obligation to update such opinions, analysis or information. You should independently verify all information contained on this website. Some information is based on analysis of past performance or hypothetical performance results, which have inherent limitations. We make no representation that any particular equity or strategy will or is likely to achieve profits or losses similar to those shown. Shareholders, employees, writers, contractors, and affiliates associated with ETFOptimize.com may have ownership positions in the securities that are mentioned. If you are not sure if ETFs, algorithmic investing, or a particular investment is right for you, you are urged to consult with a Registered Investment Advisor (RIA). Neither this website nor anyone associated with producing its content are Registered Investment Advisors, and no attempt is made herein to substitute for personalized, professional investment advice. Neither ETFOptimize.com, Global Alpha Investments, Inc., nor its employees, service providers, associates, or affiliates are responsible for any investment losses you may incur as a result of using the information provided herein. Remember that past investment returns may not be indicative of future returns.

Copyright © 1998-2017 ETFOptimize.com, a publication of Optimized Investments, Inc. All rights reserved.