REPORTS

report /Dez 07, 2017

Lessons Learned from a Decade of Data Breaches

by Sara Boddy

F5 Labs researched 433 breach cases spanning 12 years, 37 industries, and 27 countries to discover patterns in the initial attacks that lead to the breach.

report /Nov 16, 2017

Phishing: The Secret of its Success and What You Can Do to Stop It

by Ray Pompon

Learn about the tricks attackers use to dupe unsuspecting users and how you can help protect them—and your organization.

report /Sep 19, 2017

CISOs: Striving Toward Proactive Security Strategies

by Mike Convertino

As enterprises more closely align their security and IT operations, they still struggle to shift their security programs from reactive to proactive.

report /Aug 09, 2017

The Hunt for IoT: The Rise of Thingbots

by Sara Boddy

With “thingbots” now launching Death Star-sized DDoS attacks, hosting banking trojans, and causing physical destruction, all signs point to them becoming the attacker infrastructure of the future.

report /Jul 13, 2017

How Quantum Computing Will Change Browser Encryption

by David Holmes

Safeguarding TLS against attack in the quantum computing age will require changes to today’s TLS key exchange algorithms.

report /Mai 10, 2017

THE HUNT FOR IoT: The Networks Building Death Star-Sized Botnets

by Sara Boddy

With a growth rate of 1,473% in 2016, the hunt for vulnerable IoT devices rages on...

report /Jan 26, 2017

Using F5 Labs Application Threat Intelligence

by Ray Pompon

As security professionals, we often feel like we’re fighting a losing battle when it comes to cyber security.

report /Jan 19, 2017

The 2016 TLS Telemetry Report

by David Holmes

In just four short years, encryption estimates have gone from almost non-existent (in the low single digits before 2013) to just over 50% by the end of 2016. How much of a victory is this?

report /Okt 08, 2016

DDoS's Newest Minions: IoT Devices (Volume 1)

by Justin Shattuck

The latest evolution of cyber weapons is brought to you by the default passwords in Internet of Things (IoT) devices.

report /Dez 14, 2015

Yasuo-Bot: Flexible, Customized, Fraudulent Content

by Shaul Vilkomir-Preisman

Standard mobile banking trojans post their own fraudulent content over banking applications. Yasuo-Bot goes further.

report /Dez 12, 2015

Webinject Analysis: Newsidran.com

by Elman Reyes

Webinject attacks modify webpages to allow fraudsters to collect credentials, or act more directly against user accounts.

report /Jun 24, 2015

Slave Malware Analysis: Evolving from IBAN Swaps to Persistent Webinjects

by Nathan Jester

Slave is financial malware written in Visual Basic. Since 2015 it has evolved from relatively simple IBAN swapping.

report /Apr 12, 2015

Dyre In-Depth: Server-side Webinjects, I2P Evasion, and Sophisticated Encryption

by Avi Shulman

Dyre is one of the most sophisticated banking malware agents in the wild.

report /Okt 15, 2014

Tinba Malware: Domain Generation Algorithm Means New, Improved, and Persistent

by Pasel Asinovsky

Tinba, also known as "Tinybanker", "Zusy" and "HµNT€R$", is a banking Trojan.

report /Okt 10, 2014

Shellshock: Malicious Bash, Obfuscated perlb0t, Echo Probes, and More

by Maxim Zavodchik

Shellshock can take advantage of HTTP headers as well as other mechanisms to enable unauthorized access to Bash.

stay up to date

Get the latest application threat intelligence from F5 Labs.

There was an error signing up.
Thank you, your email address has been signed up.

Follow us on social media.