APPLICATION THREAT INTELLIGENCE

stay up to date

Stay up to date with F5 Labs on social media.

There was an error signing up.
Thank you, your email address has been signed up.

blog / jun. 21, 2017

Russian Hackers, Face to Face

An undercover interview of two infamous Russian hackers speak volumes about skills, passion, and motivation of some of the world’s most dangerous cybercriminals.

blog / may. 31, 2017

Fight Credential Stuffing by Taking a New Approach to Authorization

How a token-based authorization model can help organizations dramatically reduce credential stuffing attacks.

blog / jun. 15, 2017

TrickBot Expands Global Targets Beyond Banks and Payment Processors to CRMs

TrickBot shows no signs of slowing down as new targets are added and command and control servers hide within web hosting prov...

blog / jun. 01, 2017

The CISO: A Field Guide

Learn to recognize different types of CISOs so you can ensure you’re hiring the right one.

report / may. 10, 2017

THE HUNT FOR IoT: The Networks Building Death Star-Sized Botnets

With a growth rate of 1,373% in 2016, the hunt for vulnerable IoT devices rages on...

blog / may. 26, 2017

SambaCry: The Linux Sequel to WannaCry

With simple exploits plaguing Windows and Linux SMB week over week, do yourself a favor and patch for CVE-2017-7494 now to av...