Threat IntelHIGH

Threat Intel - Routers Now Top Cyber Risk Vector Revealed

ISIT Security Guru
Forescoutnetwork infrastructureroutersvulnerabilitiescyber risk
🎯

Basically, routers are now the biggest security risk for companies instead of computers.

Quick Summary

Forescout's latest report reveals routers have become the top cyber risk for enterprises, overtaking PCs. This shift poses a significant threat as organizations struggle to secure their network infrastructure. With many devices lacking proper monitoring, the risk of exploitation is rising. Companies must adapt their security strategies to address this evolving landscape.

What Happened

Forescout has released its latest report, Riskiest Connected Devices in 2026, revealing a significant shift in enterprise cyber risk. The analysis indicates that network infrastructure, particularly routers, has surpassed traditional endpoints like PCs as the most vulnerable aspect of organizational environments. This change underscores a growing threat landscape where 75% of the riskiest device types identified were not even on the radar two years ago.

The report highlights that routers now account for about one-third of critical vulnerabilities, with an average of 32 vulnerabilities per device. New device types, such as serial-to-IP converters and medical image printers, have emerged on the high-risk list, indicating a rapid evolution in the types of devices organizations deploy.

Who's Behind It

The shift in risk is attributed to the increasing deployment of specialized, often unmanaged devices across various environments, including IT, OT, IoT, and IoMT. Barry Mainz, CEO at Forescout, warns that many of these devices lack proper security measures, often using default credentials and being poorly monitored. This makes them prime targets for attackers, who can exploit these vulnerabilities to gain access and move laterally within networks, bypassing traditional perimeter defenses.

Tactics & Techniques

The report reveals that attackers are increasingly targeting devices that bridge different environments, such as routers and IP cameras. Daniel dos Santos, VP of Research at Forescout, notes that ransomware actors are leveraging these devices to infiltrate networks. With legacy systems still prevalent in sectors like retail and healthcare, the risk of exploitation is heightened. Outdated firmware on commonly overlooked devices, such as printers and switches, adds another layer of vulnerability.

Defensive Measures

Organizations must now rethink their security strategies to accommodate this evolving threat landscape. Visibility and control across all connected domains are essential for effective threat management. Forescout's findings emphasize the need for containment strategies to limit the impact of potential breaches. As the risk spreads beyond traditional endpoints, it is critical for companies to prioritize monitoring and securing their network infrastructure to safeguard against emerging threats.

🔒 Pro insight: The rapid emergence of unmanaged devices necessitates a shift in security focus towards network infrastructure to mitigate lateral movement risks.

Original article from

IT Security Guru · Guru Writer

Read Full Article

Related Pings

HIGHThreat Intel

Tycoon2FA - Phishing Service Resumes Activity After Takedown

Tycoon2FA, a notorious phishing platform, has resumed its operations after a recent takedown. This resurgence threatens users as it bypasses MFA using advanced techniques. Organizations must remain vigilant to protect their data from this evolving threat.

Infosecurity Magazine·
HIGHThreat Intel

Threat Intel - Libyan Oil Refinery Targeted by AsyncRAT Attack

A coordinated espionage campaign has struck a Libyan oil refinery and telecom organization. Using AsyncRAT, attackers have raised serious concerns about the security of Libya's critical infrastructure. With the energy sector's significance rising, this incident highlights the need for enhanced cybersecurity measures.

Cyber Security News·
HIGHThreat Intel

Threat Intel - Faster Attacks and Recovery Denial Ransomware

Mandiant's latest report reveals a shift in ransomware tactics and faster cyberattacks. Organizations must adapt to these evolving threats to protect their recovery systems. The implications are significant, as attackers increasingly target critical infrastructure.

CSO Online·
HIGHThreat Intel

Phishing Campaign - Attackers Target Multiple Sectors

A phishing campaign is targeting critical sectors like healthcare and education with fake copyright notices. This poses a serious risk of data breaches. Organizations must act quickly to safeguard sensitive information.

Dark Reading·
HIGHThreat Intel

High-Tech Sector - Overtakes Finance as Cyber Attack Target

In a surprising turn, the high-tech sector has become the top target for cyber-attacks in 2025, surpassing finance. This shift raises concerns for tech companies and their data security. Mandiant's report highlights the need for enhanced cybersecurity measures across industries.

Infosecurity Magazine·
HIGHThreat Intel

Iranian Hackers - Using Telegram for Data Theft Operations

Iranian hackers are using Telegram to target dissidents and journalists. The FBI warns of their deceptive tactics and the potential for significant data theft. Awareness and vigilance are crucial to counter these threats.

TechCrunch Security·