RE: https://infosec.exchange/@patrickcmiller/116507038237958116

The researchers at #Forescout are super smart on the OT world. You should listen to what they think. IT's scary how bad the ICS world is

📰 Network Gear Surpasses Endpoints as Top Cyber Risk, Forescout Warns

🔄 Risk shift: Network gear like routers & switches are now the #1 riskiest devices, surpassing endpoints, warns Forescout. Attackers are targeting the 'messy middle' of networks for lateral movement. #CyberSecurity #Forescout #IoT #OT

🔗 https://cyber.netsecops.io/articles/network-infrastructure-now-the-top-cyber-risk-forescout-report-warns/?utm_source=mastodon&utm_medium=social&utm_campaign=twitter_auto

Network Gear Surpasses Endpoints as Top Cyber Risk, Forescout Warns

Forescout's 2026 'Riskiest Connected Devices' report reveals a major shift in enterprise risk, with network infrastructure now posing a greater threat than traditional endpoints.

CyberNetSec.io

中國駭客升高全球攻擊,台灣首當其衝、韓國亦在列;鎖定外交官員寄假美國政策檔案,開啟即遭駭入

中央通訊社 2026-02-04 09:54:00 CST中國國家級駭客組織數量居全球之首,其攻擊已從資料竊取,轉向對關鍵基礎設施的長期滲透,台灣為主要目標。攻擊結合 AI 自動化與匿蹤技術,手法日益進化,構成結構性及戰略性威脅。
https://www.thenewslens.com/article/264407
#Mustang Panda #Dream Security #韓國 #台灣 #北韓 #預先部署 #就地取材 #DDoS #Forescout #關鍵基礎設施 #國際 #人工智慧 #美國 #AI代理人 #以色列 #國安局 #網路釣魚 #匿蹤攻擊 #中國駭客 #公開金鑰基礎建設 #伊朗 #Sophos #俄羅斯

中國駭客升高全球攻擊,台灣首當其衝、韓國亦在列;鎖定外交官員寄假美國政策檔案,開啟即遭駭入 - TNL The News Lens 關鍵評論網

中國國家級駭客組織數量居全球之首,其攻擊已從資料竊取,轉向對關鍵基礎設施的長期滲透,台灣為主要目標。攻擊結合 AI 自動化與匿蹤技術,手法日益進化,構成結構性及戰略性威脅。

TNL The News Lens 關鍵評論網
New blog posted discussing various forms of “micro-segmentation”, and use of tags instead of IP addresses in ACL’s. With callout to a great post about flows by Daniel Dib with some great comments. https://www.linkedin.com/pulse/microsegmentation-versus-nac-ip-based-acls-peter-welcher-rtoae/
Tags: #PeterWelcher #CCIE1773 #Security #MicroSegmentation #NAC #SecurityGroupTag #Cisco #Elisity #ForeScout #Flows
📢 Forescout piège le groupe TwoNet avec un honeypot imitant un réseau d’eau néerlandais
📝 Selon The Record, Forescout indique qu’un groupe de pirates nommé **TwoNet** s’est fait piéger par un **honeypot** conçu pour...
📖 cyberveille : https://cyberveille.ch/posts/2025-10-10-forescout-piege-le-groupe-twonet-avec-un-honeypot-imitant-un-reseau-deau-neerlandais/
🌐 source : https://therecord.media/fake-water-utility-honeypot-hacked-pro-russian-group
#Forescout #TwoNet #Cyberveille
Forescout piège le groupe TwoNet avec un honeypot imitant un réseau d’eau néerlandais

Selon The Record, Forescout indique qu’un groupe de pirates nommé TwoNet s’est fait piéger par un honeypot conçu pour ressembler au réseau d’un service des eaux néerlandais. Un groupe pro-russe se vante d’avoir piraté… une fausse station d’eau piégée par des chercheurs Le groupe de hackers pro-russe TwoNet a récemment revendiqué une cyberattaque contre une infrastructure de distribution d’eau aux Pays-Bas, affirmant avoir perturbé son fonctionnement en prenant le contrôle de ses systèmes industriels. En réalité, les hackers ont infiltré un honeypot — un faux réseau déployé par la société Forescout pour attirer et étudier les attaquants.

CyberVeille

Yet another example of a “security product” causing more harm than good 🤦

CVE-2025-4660: #Forescout SecureConnector #RCE

https://www.netspi.com/blog/technical-blog/red-teaming/cve-2025-4660-forescout-secureconnector-rce/

CVE-2025-4660: Forescout SecureConnector RCE 

Learn about the high-risk RCE vulnerability in Forescout SecureConnector allows attackers to turn security agents into C2 channels.

NetSPI

CVE‑2025‑4660: Forescout SecureConnector RCE vulnerability

Remote code execution in Windows SecureConnector via misconfigured named pipe allows Red team attackers to control agent as C2.

https://github.com/NetSPI/CVE-2025-4660

#Forescout #RCE

GitHub - NetSPI/CVE-2025-4660: PoC for CVE-2025-4660 demonstrating exploitation of the Forescout SecureConnector on Windows

PoC for CVE-2025-4660 demonstrating exploitation of the Forescout SecureConnector on Windows - NetSPI/CVE-2025-4660

GitHub

#Solarkomponenten angreifbar: 35.000 #Admin-Panels frei zugänglich im #Netz

Ein Großteil der ungeschützten Admin-Panels entfällt auf Deutschland. Betroffen sind #Wechselrichter, #Datenlogger und andere #Solarkomponenten.

#Sicherheitsforscher von #Forescout haben unter Einsatz der #Suchmaschine #Shodan öffentlich zugängliche #Admin-Panels von weltweit mehr als 35.000 #Solarkomponenten entdeckt.

https://www.golem.de/news/solarkomponenten-angreifbar-35-000-admin-panels-frei-zugaenglich-im-netz-2506-196831.html

Solarkomponenten angreifbar: 35.000 Admin-Panels frei zugänglich im Netz - Golem.de

Ein Großteil der ungeschützten Admin-Panels entfällt auf Deutschland. Betroffen sind Wechselrichter, Datenlogger und andere Solarkomponenten.

Golem.de

Zwecks Auffindbarkeit ein paar Hastags dazu:
Untersuchte Hersteller: #Huawei #Sungrow #GinlongSolis #Goodwatt #GoodWe #SMA
Allgemein: #PV #WR #Wechselrichter #Solar #Inverter #SunDown #Forescout #China #Hacker #SmartHome #IoT
https://www.forescout.com/research-labs/sun-down-a-dark-side-to-solar-energy-grids/
@bsi

Recommendations
Manufacturers
Development • Devices: holistic security architecture including secure boot, binary hardening, anti-exploitation features, permission separation etc
• Applications: proper authorization checks on web applications, mobile applications and cloud backends
Testing • Regular penetration testing on applications and devices • Consider bug bounty programs
Monitoring Web Application Firewalls Remember that a WAF does not protect against logical flaws

Users
Residential and commercial users • Change default passwords and credentials • Use role-based access control • Configure the recording of events in a log • Update software regularly • Backup system information • Disable unused features • Protect communication connections
Commercial and utility installations (in addition) •
Include security requirements into procurement considerations
• Conduct a risk assessment when setting up devices • Ensure network visibility into solar power systems • Segment these devices into their own sub-networks • Monitor those network segments

SUNDOWN A Dark Side to Solar Energy Grids - Forescout

Forescout Research shares the top cybersecurity trends in its annual threat report that tracks cyber attacks by country and by vertical.

Forescout

"🔍 Blind Spots in IP Networking: A Forescout Study 🌐"

Forescout researchers shed light on overlooked vulnerabilities in the Border Gateway Protocol. A must-read for all network security enthusiasts!

Source: [Dark Reading](https://www.darkreading.com/)

Tags: #IPNetworking #Cybersecurity #Forescout #BGP #Vulnerabilities 🌐🔍

Dark Reading | Security | Protect The Business

Cyber security's comprehensive news site is now an online community for security professionals, outlining cyber threats and the technologies for defending against them.

Dark Reading