APPLICATION THREAT INTELLIGENCE

stay up to date

Stay up to date with F5 Labs on social media.

There was an error signing up.
Thank you, your email address has been signed up.

article / mar. 27, 2017

From DDoS to Server Ransomware: APACHE STRUTS 2 - CVE-2017-5638 Campaign

A common infection vector used by botnet creators is scanning the Internet for web vulnerabilities to exploit for malware or back doors. The advantage of hitting servers over personal consumer devices is the ability to leverage powerful hardware that is......

report / ene. 26, 2017

Using F5 Labs Application Threat Intelligence

As security professionals, we often feel like we’re fighting a losing battle when it comes to cyber security.

blog / mar. 03, 2017

Why Managing Low-Severity Vulnerabilities Can’t Be Just a Pipe Dream

Putting off fixing low-severity vulnerabilities can have high-impact effects.

report / ene. 19, 2017

The 2016 TLS Telemetry Report

In just four short years, encryption estimates have gone from almost non-existent (in the low single digits before 2013) to just over 50% by the end of 2016. How much of ...

article / mar. 10, 2017

DNS Is Still the Achilles’ Heel of the Internet

Since the Internet can’t survive without DNS, let’s make our best effort to defend it.

blog / mar. 09, 2017

Security’s “Rule Zero” Violated Again with Zero-Day Apache Struts 2 Exploit

If you’re running Apache Struts 2 and the vulnerable component, stop reading and update now.

blog / mar. 03, 2017

Speed Over Security Still Prevalent in Spite of Substantial Risk for IoT Apps

Speed to market means IoT and mobile apps are being released with known vulnerab...