-

Forescout’s 2025 Threat Roundup Report Finds 84% More Cyberattacks Using Operational Technology Protocols

Snapshot of the global threat landscape includes surges in abuse of cloud services, rise in globally distributed attacks, and increased threats targeting critical infrastructure

SAN JOSE, Calif.--(BUSINESS WIRE)--Forescout Technologies Inc., a global leader in cybersecurity, today released its “2025 Threat Roundup” report, an analysis of the global threat landscape and notable trends cyber defenders need to know in 2026. Forescout Research – Vedere Labs reviewed more than 900 million attacks globally between January and December 2025.

The 2025 Threat Roundup shows how quickly threat actors are adapting to new technology trends – abusing cloud services and fast-cycling Autonomous Systems, and even components in popular AI development stacks like Langflow.

Share

Cyberattacks became more globally distributed and increasingly cloud-enabled in 2025. Threat actors focused more on exploiting rapidly shifting infrastructure, OT protocols, vulnerable web apps, and emerging AI platforms while increasingly targeting critical industries including healthcare, manufacturing, government, energy, and financial services.

Download the full report and read the accompanying blog.

“The 2025 Threat Roundup shows how quickly threat actors are adapting to new technology trends – abusing cloud services and fast-cycling Autonomous Systems, and even components in popular AI development stacks like Langflow,” said Barry Mainz, Forescout CEO. “To combat these threats in 2026, organizations must monitor East-West traffic and prioritize threat containment to stop attackers from moving laterally across environments. Deeper visibility, enhanced risk assessment, and proactive controls are non-negotiables for today’s defenders.”

Forescout Research – Vedere Labs “2025 Threat Roundup” Key Findings

Cyberattacks were more globally distributed

  • Attacks originated from 214 different countries and territories, with most threat actors originating from China, Russia, and Iran.
  • Attackers are using IP addresses registered in a wider array of countries. The top 10 countries accounted for 61% of malicious traffic observed, down 22% compared to 2024.
  • The United States was the most targeted country, followed by India and Germany. Compared to 2024, India and Germany swapped places on the list, but remained in the top three most targeted countries.
  • Although the number of cyber criminals and state-sponsored actors were similar, cyber criminals were responsible for nearly six times more cyber incidents than state-sponsored actors.

Attack infrastructure and tactics evolved quickly

  • The abuse of Amazon and Google infrastructure alone were responsible for more than 15% of attacks observed in 2025, up from 11% in 2024.
  • Network infrastructure used for malicious activity, including Autonomous Systems, shifted rapidly, partly due to intense law enforcement disruption. Two of the top 10 most exploited Autonomous Systems from 2024 dropped off the list entirely in 2025, while three new entries had not previously ranked in the top 500.
  • Web applications remained the most attacked service type at 61%, up from 41% in 2024, followed by remote management protocols at 15%.

Exploitation grew across IT, IoT, and OT

  • Attacks using OT protocols surged by 84%, led by Modbus (57%), Ethernet/IP (22%), and BACnet (8%).
  • Exploits against IoT devices increased from 16% to 19%, with IP cameras and NVRs the most frequent targets.
  • Exploits targeting network infrastructure devices remained the second most common attack category, representing 19% of all observed exploits.

Vulnerabilities increased — and exploitation patterns shifted

  • 242 vulnerabilities were added to CISA KEV, a 30% increase YoY, and 285 were added to the Vedere Labs KEV, a 213% increase YoY.
  • Attackers continue to exploit issues not prioritized by major advisories; 71% of exploited vulnerabilities were not in the CISA KEV catalog.
  • Langflow, an open-source, low-code AI development platform, was one of the most exploited new vulnerabilities, showing that as AI adoption accelerates, its underlying tools are becoming attractive targets.

“Threat actors are devoting far more effort to reconnaissance, with discovery activity now accounting for 91% of post-exploitation actions,” said Daniel dos Santos, Vice President of Research at Forescout. “That’s up from just 25% in 2023 – a dramatic increase that shows attackers are spending more time interacting with breached systems to understand what’s inside or to identify other targets within the network. This shift gives defenders a larger window to detect compromise before more damaging actions – such as exfiltration, deletion or encryption – can occur. Holistic visibility, early detection of discovery behaviors, and network segmentation across IT, IoT, and OT environments are critical to prevent lateral movements and stop modern attacks.”

Visit the Forescout Research – Vedere Labs website for more information about the latest threats and vulnerabilities.

About Forescout

For over 25 years, organizations and governments worldwide have trusted Forescout to secure their networks. From pioneering Network Access Control (NAC) to delivering Universal Zero Trust Network Access (UZTNA), Forescout leads the evolution of enterprise network security across IT, OT, IoT, and IoMT environments. The Forescout 4D Platform™ delivers comprehensive asset intelligence, continuous risk assessment, and dynamic control, over all managed and unmanaged assets, enhanced by the proprietary threat intelligence research of Vedere Labs. Leveraging agentic AI workflows with human-in-the-loop actions, Forescout continuously analyzes threats, orchestrates response, and integrates seamlessly with 180+ security and IT products.

Contacts

Media Contacts:
RH Strategic for Forescout
forescoutpr@rhstrategic.com
Forescout Communications
press@forescout.com

Forescout Technologies Inc.


Release Versions

Contacts

Media Contacts:
RH Strategic for Forescout
forescoutpr@rhstrategic.com
Forescout Communications
press@forescout.com

Social Media Profiles
More News From Forescout Technologies Inc.

Forescout Named Keysight Network Visibility Tech Partner of the Year

SAN JOSE, Calif.--(BUSINESS WIRE)--Forescout Technologies, a global leader in cybersecurity, today announced it has been named Keysight Technologies, Inc.’s (NYSE: KEYS) Network Visibility Tech Partner of the Year. Keysight’s Network Visibility business unit honored Forescout with this inaugural award, recognizing the strength of a partnership that delivers enhanced visibility, reduces cyber risk, and streamlines operations across IT, OT, IoT, and IoMT environments. This recognition reflects Fo...

Forescout Named a 2025 NVTC Cyber50 Award Honoree

SAN JOSE, Calif.--(BUSINESS WIRE)--The Northern Virginia Technology Council (NVTC) has named Forescout Technologies, a global leader in cybersecurity, an honoree in the 2025 NVTC Cyber50 Awards. The award recognizes the visionary leaders, trailblazing companies, and government contractors driving cybersecurity excellence, innovation, and impact across the National Capital Region and beyond. Forescout earned this recognition for its pioneering work in advancing national cybersecurity resilience...

Forescout Announces eyeSentry, a Complete Cloud-Native Exposure Management Solution Powered by Decades of Proven Intelligence

SAN JOSE, Calif.--(BUSINESS WIRE)--Forescout® Technologies, a global leader in cybersecurity, today announced the launch of eyeSentry, a cloud-native exposure management solution that redefines how enterprises uncover and mitigate hidden risks across IT, IoT, and IoMT environments. To learn more about eyeSentry, please attend the webinar, “Forescout eyeSentry: Continuous Threat and Exposure Management for the Modern Enterprise,” on December 4th at 8 a.m. PT (session 1) and 4 p.m. PT (session 2)...
Back to Newsroom