Friday, October 31, 2025
Email Us
Info Security Watch
No Result
View All Result
Info Security Watch
No Result
View All Result
Home News

Forescout’s 2024 H1 Threat Review reveals surge in cyber threats

Administrator by Administrator
September 7, 2024
in News, Cybersecurity, Threat Hunting
392 8
0
Forescout’s 2024 H1 Threat Review reveals surge in cyber threats
550
SHARES
2.5k
VIEWS
Share on FacebookShare on Twitter

Forescout Technologies has released its 2024 H1 Threat Review, providing a detailed analysis of vulnerabilities, threat actors, and ransomware attacks in the first half of 2024. The report highlights a significant rise in reported vulnerabilities and an increase in ransomware activities compared to the same period in 2023.

Findings of the 2024 H1 Threat Review

The Forescout Research Vedere Labs report reveals a 43% increase in published vulnerabilities, reaching 23,668 reported cases in H1 2024. This is an average of 111 new Common Vulnerabilities and Exposures (CVEs) per day. Notably, 20% of the exploited vulnerabilities targeted virtual private networks (VPNs) and other network infrastructure, underscoring the need for heightened security in these areas.

Barry Mainz, CEO of Forescout, emphasized the need for proactive security measures, stating:

“Attackers are looking for any weak point to breach IT, IoT, and OT devices. Organisations that don’t know what they have connected to their networks or if it’s secured are being caught flat-footed.”

Ransomware on the Rise

The report also shows a 6% increase in ransomware attacks, with 3,085 incidents reported in H1 2024, compared to 2,899 in H1 2023. The United States remains the primary target, experiencing half of all ransomware attacks. Key victims include government entities, financial services, and technology companies, while the number of active ransomware groups increased by 55%.

Rise in State-Sponsored Cyber Activities

State-sponsored actors, such as Predatory Sparrow and Karma Power, have been masquerading as hacktivists, carrying out substantial cyberattacks under the guise of hacktivism. These activities may be intended to boost visibility of hacking campaigns while concealing cyberwarfare motives.

Focus on Network Infrastructure Vulnerabilities

In H1 2024, 15 new CVEs listed in the CISA known exploited vulnerabilities (KEV) catalogue targeted network infrastructure and security appliances from major vendors like Ivanti, Cisco, and Palo Alto Networks. These accounted for nearly 20% of new vulnerabilities in the CISA KEV list.

Recommendations for Strengthening Cybersecurity

Elisa Constante, VP of Research at Forescout Research Vedere Labs, emphasized the need for improved visibility and proactive controls, especially for unmanaged perimeter devices. Constante recommended key steps for organizations, including:

  • Extending device visibility
  • Assessing risks
  • Disabling unused services
  • Patching vulnerabilities
  • Enforcing strong credentials and MFA
  • Avoiding direct internet exposure
  • Network segmentation

These measures aim to reduce breach risks and strengthen overall security posture.

Tags: RansomwareVulnerabilities2024 Threat ReviewCyber AttacksCVEsForescoutVPN SecurityNetwork InfrastructureCyberwarfareCybersecurity
Advertisement Banner
No Result
View All Result

Trending

Internet Security, Zero Trust, Multi-Factor Authentication, Real-Time Threat Intelligence, AI in Cybersecurity, Market Report
Zero-Day

Internet Security Strategic Business Report 2023-2030

September 11, 2024
BreachSeek, AI Penetration Testing, Cybersecurity, LangChain, LangGraph, LLMs, Vulnerability Testing, KFUPM
Artificial Intelligence

BreachSeek: AI-Based Automated Multi-Platform Penetration Testing Tool

September 10, 2024
Endpoint Privilege Management, PAM, CISOs, Cybersecurity, ThreatLocker, Administrative Privileges, Insider Threats
News

Navigating Endpoint Privilege Management

September 11, 2024
Hussein Syed, RWJBarnabas Health, CISO, Cybersecurity, Healthcare Security, Becker’s Hospital Review Healthcare Cybersecurity, Industry Recognition, Leadership
News

Hussein Syed, RWJ Barnabas Health CISO, Honored as One of 54 CISOs To Know Nationwide

September 10, 2024
Cybersecurity, Government Cybersecurity, AI, Zero Trust, Cyber Hygiene, Global Cybercrime, Cybersecurity Strategy Categories: Cybersecurity News, Government Cybersecurity, Global Threats
Government

Governments Urged to Get Back to Basics to Stay Ahead of Cybersecurity Threats

September 10, 2024
Terrorist Organizations Exploit Financial Systems for Funding
Global Security

Terrorist Organizations Exploit Financial Systems for Funding

September 8, 2024
Info Security Watch

We bring you the best Premium WordPress Themes that perfect for news, magazine, personal blog, etc. Check our landing page for details.

Follow Us

Recent News

Cyware Achieves FedRAMP Ready Status to Enhance Cybersecurity

Cyware Achieves FedRAMP Ready Status to Enhance Cybersecurity

November 14, 2024
Computer Security Market Advancements Highlighted by Key Drivers and Innovations: Strategic Insights and Forecasts to 2031

Computer Security Market Key Drivers, Innovations, and Forecasts to 2031

September 18, 2024
New York, United States of America
Friday, October 31, 2025
Partly cloudy
14 ° c
14 c 8 c
Sat
14 c 8 c
Sun
  • About
  • Terms of Service
  • Affiliate Disclosure
  • Disclaimer
  • Contact Us

© 2024 Info Security Watch. All Rights Reserved

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In
No Result
View All Result
  • Information Security
  • Cybersecurity
    • Intrusion Detection & Prevention Systems (IDPS)
    • Data Loss Prevention (DLP)
    • Threat Hunting
    • Secure Remote Access
    • Data Centre Security
    • Cybersecurity Architecture Design
    • Behavioral Analytics
    • Mobile Security
    • Wireless Network Security
    • Privileged Access Management (PAM)
  • OSINT (Open Source Intelligence)
    • OSINT Techniques
    • Sentiment Analysis
    • Image & Video Analysis
    • OSINT for Financial Crime
    • Automated Threat Intelligence Platforms
    • Human Intelligence (HUMINT) Integration
    • Cybercrime Investigation
    • Geolocation Intelligence
    • Metadata Analysis
    • OSINT in Crisis Response
    • Counterterrorism OSINT
  • Digital Forensics
    • Database Forensics
    • Malware Forensics
    • Video Forensics
    • Audio Forensics
    • Anti-Forensics Techniques
    • Forensic Report Writing
    • Cross-Border Digital Investigations
    • Cryptocurrency Forensics
    • Digital Evidence Preservation
    • Legal and Regulatory Forensics
  • Cybersecurity Compliance & Risk Management
    • Compliance
    • Cyber Risk Quantification
  • Financial Analysis
    • Financial Crimes
    • Financial Systems
    • Financial Security
    • Offshore Accounts
    • Shell Companies
    • Terrorist Financing
    • Money Laundering
    • Fraud Detection
  • Business
  • Blockchain
    • Cryptocurrency
  • Investigations
    • Corporate Investigation
    • Investigation Tools
    • Investigative Journalism
  • Data Privacy
    • Data Protection,
  • Intelligence Gathering
    • Data Gathering
  • Dark Web
  • Global Security
    • Cyber Defense
  • Threat Intelligence
    • Cyber Risk Quantification
    • Social Media
    • Report
    • Supply Chain Security
    • Threat Detection
  • Defense
    • Offshore
  • Privacy Policy
  • Framework
    • Government
    • Illicit Funds
    • IoT Security
  • Networking
  • Public Records
  • Ransomware
    • Ransomware Attacks
  • Vulnerabilities
  • Tools
  • Enterprise
  • Artificial Intelligence
  • Quantum Computing
  • Zero-Day
  • Disclaimer
  • Affiliate Disclosure
  • Terms of Service
  • Contact Us

© 2024 Info Security Watch. All Rights Reserved