Logo

Forescout Technologies unveils alarming cybersecurity trends in 2025H1 threat review

Forescout's latest report sheds light on skyrocketing ransomware attacks, zero-day exploits, and increased targeting of unconventional devices.

  • 5 months ago Posted in

Forescout Technologies has released its H1 2025 Threat Review, detailing over 23,000 vulnerabilities and the activities of 885 threat actors worldwide. Key findings reveal a concerning surge in ransomware, zero-day exploits, and a growing focus on non-traditional equipment.

Ransomware incidents now average 20 per day, with a 46% rise in zero-day exploits. Attackers are increasingly targeting devices like edge systems, IP cameras, and BSD servers to facilitate lateral movement across IT, OT, and IoT environments, heightening the risk to critical infrastructures.

“We’re seeing attackers gain initial access through overlooked IoT devices or infostealers, then use lateral movement to pivot across IT, OT, and IoT environments,” said Sai Molige, Senior Manager of Threat Hunting at Forescout Technologies. “Our ValleyRAT hunt, which uncovered the Chinese threat actor Silver Fox targeting healthcare systems, is a prime example. These attackers exploit blind spots to quietly escalate access.”

Vulnerabilities that were once overlooked are seeing renewed interest, with 47% of newly exploited weaknesses originating before 2025. Approximately 45% of these vulnerabilities are rated high or critical, underscoring the necessity of integrated, proactive security measures.

Specifically, the healthcare sector is experiencing unprecedented breaches, with two incidents occurring daily. In the first half of 2025 alone, nearly 30 million individuals were impacted. 76% of breaches were due to hacking or IT incidents. Vulnerabilities are being exploited in network servers and email systems, with trojanised imaging software delivering malware to patient systems emphasised as a significant threat.

The landscape is further complicated by the blurring lines between hacktivists and state-sponsored actors. In H1 2025, 137 threat actor updates were tracked, with 51% cybercriminals and a notable portion (40%) being state-sponsored, some linked to Iranian affiliated groups targeting critical infrastructure. These operations are no longer isolated or symbolic but integrate coordinated campaigns with tangible effects.

In response, Forescout advocates several risk reduction strategies:

  1. Employing agentless discovery to monitor all connected assets, including IT, OT, IoT, and healthcare systems.
  2. Assessing for vulnerabilities, regularly applying patches, and enforcing robust credentials with multifactor authentication (MFA).
  3. Isolating device types through network segmentation to mitigate lateral movement upon breach.
  4. Encrypting sensitive data both in transit and at rest.
  5. Implementing threat detection tools leveraging data from EDR, IDS, and firewalls.

This comprehensive report underscores the evolving landscape of cybersecurity threats and illustrates an urgent need for dynamic and all-encompassing protection strategies.

Kiteworks highlights European lag in AI security measures, focusing on governance without adequate...
Aqilla's research highlights increasing confidence in AI's role in finance, as manual work...
A growing number of UK CFOs embrace AI's potential, with investments in digital technology...
The UK Government launches a £210 million Cyber Action Plan to enhance public service security and...
Exabeam introduces AI-driven security technologies in hopes of protecting enterprises from the...
Enterprises face challenges post-cyberattack, with operational disruptions lasting days. Absolute...
DoiT integrates SELECT into its platform, aiming to enhance cloud data optimisation and...
CrowdStrike aims to enhance its leadership in identity security with the acquisition of SGNL,...