Ornamental dots. Two rows of three dots. The top row is a light blue. The bottom row is one light blue dot followed by two orange dots.

Blog

OT:ICEFALL: 56 Vulnerabilities Caused by Insecure-by-Design Practices in OT

It has been 10 years since Project Basecamp, a research project conducted by Digital Bond that investigated how critical operational technology (OT) devices and protocols were, to use the term they coined, “insecure by design.” Since then, we have seen hugely impactful real-world OT malware such as Industroyer, TRITON, Industroyer2 and INCONTROLLER abusing insecure-by-design functionality.

Top Blog Posts

Blog Icon   Blog

Killnet: Analysis of Attacks from a Prominent Pro-Russian Hacktivist Group

In our new threat briefing report, Forescout’s Vedere Labs leverages a list of IP addresses known to be used by…

June 2, 2022

Read More
Blog Icon   Blog

R4IoT: When Ransomware Meets the Internet of Things

Over the past few years, ransomware has been evolving because of two ongoing trends: Digital transformation driving rapid growth in…

June 1, 2022

Read More
Blog Icon   Blog

A Hospital’s Cybersecurity:
10 Steps to Help Ensure Patient Safety and Continuous Operations

Across a health system’s digital terrain, the most vulnerable assets are connected medical devices. If those devices become compromised, the…

May 31, 2022

Read More

Request a demo

Get a personalized tour of our solutions and see how we can help you protect your digital terrain.

Request a Demo

Take a test drive

Embark on a 90-minute, hands-on tour of Forescout, covering device visibility, asset management, incident response and network segmentation.

Schedule a Test Drive