Threat research. Security leadership. Decades of experience.

2025 Advanced Persistent Bots Report
Report
Bots and Automated Attacks
2025 Advanced Persistent Bots Report

In today’s digital landscape, bots dominate the internet, with some estimates suggesting they account for over 50% of all website and mobile API activity. Beneficial bots support search engines, fulfill genuine business needs, and automate repetitive tasks. While some are outright malicious and enable fraud, many other bots operate somewhere in the middle—in the murky grey area between illegal and immoral. They ignore website terms of use, prevent customers from purchasing goods and services, and can even weaken security. Existing research often examines uncontrolled bot traffic across the entire internet, but this report takes a different approach and, instead, focuses on how automated traffic changes after bot mitigation is put in place.

03/28/2025 report 40 min. read
2025 Advanced Persistent Bot Report: Scraper Bots Deep-Dive
2025 APB Report
Bots and Automated Attacks
2025 Advanced Persistent Bot Report: Scraper Bots Deep-Dive
How much do scraper bots affect your industry?
03/28/2025 article 5 min. read
Prevent Web Scraping by Applying the Pyramid of Pain
2025 APB Report
Bots and Automated Attacks
Prevent Web Scraping by Applying the Pyramid of Pain
The Bots Pyramid of Pain: a framework for effective bot defense.
03/28/2025 article 4 min. read
Why Critical MongoDB Library Flaws Won't See Mass Exploitation
Latest Article
MongoDB
Why Critical MongoDB Library Flaws Won't See Mass Exploitation
Discover how to mitigate CVE-2024-53900 and CVE-2025-23061, which expose Node.js APIs to remote attacks.
03/13/2025 article 6 min. read
Analyzing the Global Increase in Vulnerability Scanning in 2024
Featured Series
Sensor Intel Series
Analyzing the Global Increase in Vulnerability Scanning in 2024
BotPoke comes to the foreground yet again.
03/21/2025 article 7 min. read

All F5 Labs Content

No filters selected
BlackGuard is designed to steal account credentials, cryptocurrency wallet information, session cookies, messaging history, browsing history, and screenshots.

-Aditya Sood

Threat Reports

In-depth research, analysis, and actionable insights
2024 DDoS Attack Trends
DDoS
2024 DDoS Attack Trends
07/16/2024 report 30 min. read
2023 Identity Threat Report: The Unpatchables
Bots and Automated Attacks
2023 Identity Threat Report: The Unpatchables
11/01/2023 report 80 min. read
2025 Advanced Persistent Bots Report
Bots and Automated Attacks
2025 Advanced Persistent Bots Report
03/28/2025 report 40 min. read

Vulnerability Trends

A by-the-numbers breakdown from the latest threat intelligence
Sensor Intel Series: Comparing 2024 to 2023

Hundreds of apps will be attacked by the time you read this.

So, we get to work. We obsess over effective attack methods. We monitor the growth of IoT and its evolving threats. We dive deep into the latest crypto-mining campaigns. We analyze banking Trojan targets. We dissect exploits. We hunt for the latest malware. And then our team of experts share it all with you. For more than 20 years, F5 has been leading the app delivery space. With our experience, we are passionate about educating the security community—providing the intel you need to stay informed so your apps can stay safe.

Every

9 hrs
a critical vulnerability—with the potential for remote code execution—is released.