State of App Delivery 2018: Security Again Edges Out Availability as Most Important App Service

blog / ene. 16, 2018 (MODIFIED: ene. 12, 2018)

by Lori MacVittie

Forty-three percent of organizations say security is essential when deploying apps, and more than two thirds use multiple security solutions to protect clients, infrastructure, and web apps.

Ramnit Goes on a Holiday Shopping Spree, Targeting Retailers and Banks

article / ene. 15, 2018 (MODIFIED: ene. 16, 2018)

by Doron Voolf

Ramnit’s latest twist includes targeting the most widely used web services during the holidays: online retailers, entertainment, banking, food delivery, and shipping sites.

Risky Business (Part 2): Why You Need a Risk Treatment Plan

/ ene. 12, 2018

by Preston Hogue

Performing a risk analysis and taking due care are no longer optional.

A Spectre of Meltdowns Could be in Store for 2018, Including Fileless Malware Attacks and More Costly Bots

blog / ene. 10, 2018 (MODIFIED: ene. 15, 2018)

by Lori MacVittie

Every week another bug, vulnerability, or exploit is released - we need a multi-layered security strategy (beyond our standard patch “spin cycles”) to deal with threats like Spectre and Meltdown.

Global Consultancy Overcomes Cloud Security Risks

blog / ene. 09, 2018 (MODIFIED: ene. 15, 2018)

by Ray Pompon

How moving application into the cloud can make your organization stronger and more valuable to your customers.

Mirai is Attacking Again, So We’re Outing its Hilarious, Explicit C&C Hostnames

blog / ene. 04, 2018 (MODIFIED: ene. 15, 2018)

by David Holmes

With Mirai rearing its ugly head again, we’re revealing its C&C hostnames so organizations can update their blacklists and protect themselves.

New Python-Based Crypto-Miner Botnet Flying Under the Radar

article / ene. 03, 2018 (MODIFIED: ene. 16, 2018)

by Maxim Zavodchik, Liron Segal, Aaron Brailsford

A new Python-based botnet that mines Monero spreads via SSH and leverages Pastebin to publish new C&C server addresses.

Liability in an Assume Breach World

blog / ene. 02, 2018 (MODIFIED: ene. 15, 2018)

by Ray Pompon, Sara Boddy

The safest way to run a network is to assume it’s going to breached, but that also means minimizing your liability and ensuring the executive team is fully aware of what is going on.

BrickerBot: Do “Good Intentions” Justify the Means—or Deliver Meaningful Results?

blog / dic. 28, 2017 (MODIFIED: ene. 16, 2018)

by Justin Shattuck

Most security researchers have good intentions, but ethics must play a central role in the decisions they make.

Bleichenbacher Rears its Head Again with the ROBOT Attack

blog / dic. 27, 2017 (MODIFIED: ene. 15, 2018)

by David Holmes

Bleichenbacher attacks will likely continue to pop up until TLS 1.3 is fully adopted, which could take years.

Achieving Multi-Dimensional Security through Information Modeling—Modeling Inversion Part 5

blog / dic. 26, 2017 (MODIFIED: ene. 12, 2018)

by Ravila White

In Part 5 of this blog series, we use inversion modeling techniques to develop a high-level protection strategy.

Risky Business: Understand Your Assets and Align Security with the Business

/ dic. 19, 2017 (MODIFIED: ene. 09, 2018)

by Preston Hogue

Security teams can fulfill the CISOs responsibilities and help business groups become more security-savvy by working through the due diligence and due care process together.

Zealot: New Apache Struts Campaign Uses EternalBlue and EternalSynergy to Mine Monero on Internal Networks

article / dic. 15, 2017 (MODIFIED: ene. 10, 2018)

by Maxim Zavodchik, Liron Segal

New Apache Struts campaign, Zealot, targets vulnerabilities in Windows, Linux, and the DotNetNuke CMS, then leverages leaked NSA exploits to move laterally through internal networks and mine Monero.

The Credential Crisis: It’s Really Happening

blog / dic. 14, 2017 (MODIFIED: ene. 10, 2018)

by Lori MacVittie

With billions of data records compromised, it’s time to reconsider whether passwords are our best means for authenticating users.

To Protect Your Network, You Must First Know Your Network

/ dic. 13, 2017 (MODIFIED: ene. 12, 2018)

by Ray Pompon

Strong security starts with understanding exactly what you need to protect and where it resides within your organization.

Lessons Learned from a Decade of Data Breaches

report / dic. 07, 2017 (MODIFIED: ene. 05, 2018)

by Sara Boddy, Ray Pompon

F5 Labs researched 433 breach cases spanning 12 years, 37 industries, and 27 countries to discover patterns in the initial attacks that lead to the breach.

Avoiding the Epidemic of Hospital Hacks

blog / dic. 05, 2017 (MODIFIED: ene. 09, 2018)

by Ray Pompon

Good security is highly dependent on hospital staff being well trained and having the discipline to follow security processes—manual and otherwise—to the letter.

The Startup Security Challenge: Safe in the Cloud from Day One

blog / nov. 30, 2017 (MODIFIED: ene. 03, 2018)

by Ray Pompon

How this cloud startup met its goals for security and availability right out of the gate by setting goals, doing a risk analysis, and examining tradeoffs.

Achieving Multi-Dimensional Security through Information Modeling—Unwrapping Controls Part 4

blog / nov. 28, 2017 (MODIFIED: ene. 02, 2018)

by Ravila White

In Part 3 of this blog series, we demonstrated modeling the threat landscape along with executive threat-modeling. In this blog, we discuss the importance of defining controls.

If Your Security Question List Looks like a Facebook Favorite List, Start Over Now

blog / nov. 21, 2017 (MODIFIED: dic. 27, 2017)

by Lori MacVittie

Seriously, how many colors are there? And how many of us share the same love of one of those limited choices?

Phishing: The Secret of its Success and What You Can Do to Stop It

report / nov. 16, 2017 (MODIFIED: ene. 04, 2018)

by Ray Pompon

Learn about the tricks attackers use to dupe unsuspecting users and how you can help protect them—and your organization.

A CISO Landmine: No Security Awareness Training

blog / nov. 14, 2017 (MODIFIED: dic. 26, 2017)

by Mike Levin, Center for Information Security Awareness

CISOs who fail to prioritize security awareness training are putting their business and assets at serious risk.

Is a Good Offense the Best Defense Against Hackers?

blog / nov. 09, 2017 (MODIFIED: dic. 19, 2017)

by Ray Pompon

Proposed legislation could change existing laws that bars victims of hacking attacks from striking back.

What Happens to Encryption in a Post-Quantum Computing World?

blog / nov. 07, 2017 (MODIFIED: dic. 15, 2017)

by Debbie Walkowski

As the possibility of quantum computing draws nearer, changes to today’s TLS key exchange algorithms will be required.

Can Engineers Build Networks Too Complicated for Humans to Operate? Part II: Making Sense of Network Activities and System Behaviors

blog / nov. 02, 2017 (MODIFIED: dic. 13, 2017)

by Mike Simon

How to selectively capture packets for further analysis and avoid buying a storage farm.

Academic Research: A Survey of Email Attacks

article / oct. 31, 2017 (MODIFIED: dic. 14, 2017)

by David Hammerstrom, Sara McGarvey, Russel Parham, Kyle Uecker, Anthony Wade

Email has become such an ordinary part of our daily lives that we can forget how vulnerable it is.

Reaper: The Professional Bot Herder’s Thingbot

blog / oct. 26, 2017 (MODIFIED: dic. 18, 2017)

by David Holmes, Justin Shattuck

While Reaper might be considered an “object lesson” today, it should serve as a blistering warning that IoT security needs to be fixed now.

Help Guide the Future of Apps – Ultimately your Threat Landscape – by Responding to our SOAD Survey!

blog / oct. 24, 2017 (MODIFIED: nov. 02, 2017)

by Lori MacVittie

Assessing the State of Application Delivery depends on getting information from you about your applications!

Third-Party Security is Your Security

blog / oct. 24, 2017 (MODIFIED: dic. 05, 2017)

by Ray Pompon

When you must depend on third parties for a variety of products and services, it’s critical that you hold them to high security standards.

Interview with the Experts: The Future of IoT Security through the Eyes of F5 Threat Researchers

blog / oct. 19, 2017 (MODIFIED: nov. 30, 2017)

by Debbie Walkowski

When it comes to IoT threats, we’re nowhere near being out of the woods yet; we’ve just barely entered the forest.

New Threat May Slip through the KRACK in BYOD Policies

blog / oct. 17, 2017 (MODIFIED: nov. 16, 2017)

by Lori MacVittie

Combating this vulnerability might mean you have to force updates on employees’ personal devices or deny them access altogether.

How to Be a More Effective CISO by Aligning Your Security to the Business

blog / oct. 17, 2017 (MODIFIED: nov. 28, 2017)

by Ray Pompon

Security must align to the business needs, not the other way around. Begin with investigation and understanding to be most effective.

Joining Forces with Criminals, Deviants, and Spies to Defend Privacy

blog / oct. 12, 2017 (MODIFIED: nov. 07, 2017)

by Jennifer Chermoshnyuk, Matt Beland

Organizations need to provide clear and specific guidance to employees who travel across national borders when it comes to giving up passwords and surrendering devices.

Academic Research: Web Application Attacks

article / oct. 10, 2017 (MODIFIED: nov. 09, 2017)

by Andrew Cox, Daniel Freese, Matthew Martin, Daniel Massie

Personally identifiable information and user credentials are the primary nuggets attackers are after when they exploit known vulnerabilities in web applications.

The Good News about Breaches

blog / oct. 04, 2017 (MODIFIED: oct. 31, 2017)

by Lori MacVittie

Security breaches in the news serve as a good reminder to check and make sure you have a solid application protection strategy in place, starting with never trusting user input.

Proposed Legislation Calls for Cleaning Up the IoT Security Mess

blog / oct. 03, 2017 (MODIFIED: nov. 14, 2017)

by Ray Pompon, David Holmes

Legislation is a good first step toward persuading IoT manufacturers (who want to stay in business) to do the right thing when it comes to the security of their devices.

Phishing for Information, Part 5: How Attackers Pull It All Together, and How You Can Fight Back

blog / sep. 28, 2017 (MODIFIED: oct. 24, 2017)

by Ray Pompon

Stop feeding attackers every piece of the puzzle they need to pull off their scams.

Five Reasons CISOs Should Keep an Open Mind about Cryptocurrencies

blog / sep. 26, 2017 (MODIFIED: nov. 09, 2017)

by Ray Pompon, Justin Shattuck

Far from a dying breed, cryptocurrencies are not only evolving but being accepted in countless new markets. CISOs need to know the ins and outs, pros and cons.

CISOs: Striving Toward Proactive Security Strategies

report / sep. 19, 2017 (MODIFIED: nov. 09, 2017)

by Mike Convertino

As enterprises more closely align their security and IT operations, they still struggle to shift their security programs from reactive to proactive.

TrickBot Rapidly Expands its Targets in August, Shifting Focus to US Banks and Credit Card Companies

article / sep. 14, 2017 (MODIFIED: oct. 17, 2017)

by Sara Boddy, Jesse Smith, Doron Voolf

TrickBot kicked into high gear coming into August with the most targeted URLs since its launch. It released a new worm module, shifted its focus towards the US, and soared past the one thousand target URL mark in a single configuration.

stay up to date

Get the latest application threat intelligence from F5 Labs.

There was an error signing up.
Thank you, your email address has been signed up.

Follow us on social media.