Threat Intel - Routers Now Top Cyber Risk Vector Revealed
Basically, routers are now the biggest security risk for companies instead of computers.
Forescout's latest report reveals routers have become the top cyber risk for enterprises, overtaking PCs. This shift poses a significant threat as organizations struggle to secure their network infrastructure. With many devices lacking proper monitoring, the risk of exploitation is rising. Companies must adapt their security strategies to address this evolving landscape.
What Happened
Forescout has released its latest report, Riskiest Connected Devices in 2026, revealing a significant shift in enterprise cyber risk. The analysis indicates that network infrastructure, particularly routers, has surpassed traditional endpoints like PCs as the most vulnerable aspect of organizational environments. This change underscores a growing threat landscape where 75% of the riskiest device types identified were not even on the radar two years ago.
The report highlights that routers now account for about one-third of critical vulnerabilities, with an average of 32 vulnerabilities per device. New device types, such as serial-to-IP converters and medical image printers, have emerged on the high-risk list, indicating a rapid evolution in the types of devices organizations deploy.
Who's Behind It
The shift in risk is attributed to the increasing deployment of specialized, often unmanaged devices across various environments, including IT, OT, IoT, and IoMT. Barry Mainz, CEO at Forescout, warns that many of these devices lack proper security measures, often using default credentials and being poorly monitored. This makes them prime targets for attackers, who can exploit these vulnerabilities to gain access and move laterally within networks, bypassing traditional perimeter defenses.
Tactics & Techniques
The report reveals that attackers are increasingly targeting devices that bridge different environments, such as routers and IP cameras. Daniel dos Santos, VP of Research at Forescout, notes that ransomware actors are leveraging these devices to infiltrate networks. With legacy systems still prevalent in sectors like retail and healthcare, the risk of exploitation is heightened. Outdated firmware on commonly overlooked devices, such as printers and switches, adds another layer of vulnerability.
Defensive Measures
Organizations must now rethink their security strategies to accommodate this evolving threat landscape. Visibility and control across all connected domains are essential for effective threat management. Forescout's findings emphasize the need for containment strategies to limit the impact of potential breaches. As the risk spreads beyond traditional endpoints, it is critical for companies to prioritize monitoring and securing their network infrastructure to safeguard against emerging threats.
IT Security Guru