article / Mrz 27, 2017
A common infection vector used by botnet creators is scanning the Internet for web vulnerabilities to exploit for malware or back doors. The advantage of hitting servers over personal consumer devices is the ability to leverage powerful hardware that is......
blog / Mrz 24, 2017
blog / Mrz 20, 2017
blog / Mrz 13, 2017
blog / Mrz 30, 2017
The virtual kidnapping scam is on the rise because of the excessive amount of personal information people volunteer on social...
report / Jan 26, 2017
As security professionals, we often feel like we’re fighting a losing battle when it comes to cyber security.
report / Jan 19, 2017
In just four short years, encryption estimates have gone from almost non-existent (in the low single digits before 2013) to just over 50% by the end of 2016. How much of ...
article / Mrz 10, 2017
Since the Internet can’t survive without DNS, let’s make our best effort to defend it.
blog / Mrz 09, 2017
If you’re running Apache Struts 2 and the vulnerable component, stop reading and update now.
blog / Mrz 03, 2017
Speed to market means IoT and mobile apps are being released with known vulnerab...
in Telnet scans to grow IoT botnets
Spy vs. spy. Use threat intelligence to thwart attacks
TLS and other global encryption trends are advancing
Follow @f5labs for the latest application threat research.
Get the latest application threat intelligence on LinkedIn.