CONTRIBUTOR SARA BODDY

article /Apr 06, 2018

The Global Playing Field is Leveling Out as Europe and Asia Take on More DDoS Attacks

The latest DDoS trends include the return of large volumetric DDoS attacks, the rise of application targeted attacks, and businesses in Europe and Asia are growing targets.

blog /Mrz 22, 2018

When Information Security is a Matter of Public Safety

Seven steps for improving the security of critical infrastructure systems—and protecting the public from unnecessary risk.

report /Mrz 13, 2018

The Hunt for IoT: The Growth and Evolution of Thingbots Ensures Chaos

IoT attacks show no signs of decreasing while infected IoT devices go un-remediated, and discovery of new thingbots is at a decade-long high.

blog /Mrz 02, 2018

Exploited Memcached Servers Lead to Record-Setting 1.3Tbps DDoS Attack

Memcached is just one of many application infrastructure systems that could launch the same types of attacks if they were also misconfigured.

blog /Jan 31, 2018

86 Your Cyber Attackers! Avoid Data Breaches by Protecting Your Most Likely Attack Targets

Critical lessons can be learned from others’ mistakes. Don’t learn the hard way; heed the warnings from our research.

blog /Jan 02, 2018

Liability in an Assume Breach World

The safest way to run a network is to assume it’s going to breached, but that also means minimizing your liability and ensuring the executive team is fully aware of what is going on.

report /Dez 07, 2017

Lessons Learned from a Decade of Data Breaches

F5 Labs researched 433 breach cases spanning 12 years, 37 industries, and 27 countries to discover patterns in the initial attacks that lead to the breach.

article /Sep 14, 2017

TrickBot Rapidly Expands its Targets in August, Shifting Focus to US Banks and Credit Card Companies

TrickBot kicked into high gear coming into August with the most targeted URLs since its launch. It released a new worm module, shifted its focus towards the US, and soared past the one thousand target URL mark in a single configuration.

report /Aug 09, 2017

The Hunt for IoT: The Rise of Thingbots

With “thingbots” now launching Death Star-sized DDoS attacks, hosting banking trojans, and causing physical destruction, all signs point to them becoming the attacker infrastructure of the future.

article /Jul 27, 2017

TrickBot Focuses on Wealth Management Services from its Dyre Core

As TrickBot evolves, we examine version 24, which heavily targets Nordic financial institutions, and we take a close look at the Dyre–TrickBot connection.

blog /Jun 15, 2017

TrickBot Expands Global Targets Beyond Banks and Payment Processors to CRMs

TrickBot shows no signs of slowing down as new targets are added and command and control servers hide within web hosting providers’ networks.

report /Mai 10, 2017

THE HUNT FOR IoT: The Networks Building Death Star-Sized Botnets

With a growth rate of 1,473% in 2016, the hunt for vulnerable IoT devices rages on...

blog /Mrz 30, 2017

How to Talk Cyber Risk with Executives

Board level interest in your cyber risk posture is growing, in fact it might be required soon for publicly traded companies. Presenting cyber risk to your board – effectively – means talking in their terms.

blog /Mrz 24, 2017

Cyber Insurance: Read the Fine Print!

Purchasing cyber insurance can be useful, but claims are often denied due to policy exclusions or lapses in controls.

blog /Mrz 03, 2017

Why Managing Low-Severity Vulnerabilities Can’t Be Just a Pipe Dream

Putting off fixing low-severity vulnerabilities can have high-impact effects.

report /Jan 26, 2017

Using F5 Labs Application Threat Intelligence

As security professionals, we often feel like we’re fighting a losing battle when it comes to cyber security.

report /Okt 08, 2016

DDoS's Newest Minions: IoT Devices (Volume 1)

The latest evolution of cyber weapons is brought to you by the default passwords in Internet of Things (IoT) devices.

article /Jul 22, 2016

Web Injection Threats: The Cost of Community Engagement on Your Site

Customer engagement drives web application design, but user-generated content brings inherent security challenges.

stay up to date

Get the latest application threat intelligence from F5 Labs.

There was an error signing up.
Thank you, your email address has been signed up.

Follow us on social media.