APPLICATION THREAT INTELLIGENCE

stay up to date

Stay up to date with F5 Labs on social media.

There was an error signing up.
Thank you, your email address has been signed up.

article / abr. 07, 2017

Marcher Gets Close to Users by Targeting Mobile Banking, Android Apps, Social Media, and Email

Marcher targets focused on European, Australian, and Latin American banks, along...

blog / mar. 30, 2017

How to Talk Cyber Risk with Executives

Board level interest in your cyber risk posture is growing, in fact it might be required soon for publicly traded companies. ...

blog / abr. 18, 2017

Profile of a Hacker: The Real Sabu, Part 1 of 2

Notorious hacker of Anonymous and LulzSec fame is challenged by rival hacker, The Jester, to reveal his identity.

article / mar. 27, 2017

From DDoS to Server Ransomware: APACHE STRUTS 2 - CVE-2017-5638 Campaign

A common infection vector used by botnet creators is scanning the Internet for web vulnerabilities to exploit for malware or ...

blog / abr. 20, 2017

Executive Impersonation Fraud Is on the Rise—and It Is Working

Your company could lose hundreds of thousands in an impersonation scam, but here are eight things you can do to protect yours...

article / mar. 10, 2017

DNS Is Still the Achilles’ Heel of the Internet

Since the Internet can’t survive without DNS, let’s make our best effort to defend it.