Blog

OT:ICEFALL: 56 Vulnerabilities Caused by Insecure-by-Design Practices in OT
It has been 10 years since Project Basecamp, a research project conducted by Digital Bond that investigated how critical operational technology (OT) devices and protocols were, to use the term they coined, “insecure by design.” Since then, we have seen hugely impactful real-world OT malware such as Industroyer, TRITON, Industroyer2 and INCONTROLLER abusing insecure-by-design functionality.
Top Blog Posts
Industroyer2 and INCONTROLLER: New Findings and How Forescout Protects Against the Most Recent ICS-Specific Malware
In our new threat briefing report, Forescout’s Vedere Labs presents the most detailed public technical analysis of…
July 14, 2022
Read MoreR4IoT: When Ransomware Meets the Internet of Things
Over the past few years, ransomware has been evolving because of two ongoing trends: Digital transformation driving rapid growth in…
June 1, 2022
Read MoreA Hospital’s Cybersecurity:
10 Steps to Help Ensure Patient Safety and Continuous Operations
Across a health system’s digital terrain, the most vulnerable assets are connected medical devices. If those devices become compromised, the…
May 31, 2022
Read More


Request a demo
Get a personalized tour of our solutions and see how we can help you protect your digital terrain.
Request a DemoTake a test drive
Embark on a 90-minute, hands-on tour of Forescout, covering device visibility, asset management, incident response and network segmentation.
Schedule a Test Drive