/3 13, 2018
IoT attacks show no signs of decreasing while infected IoT devices go un-remediated, and discovery of new thingbots is at a decade-long high.
/3 02, 2018
Memcached is just one of many application infrastructure systems that could launch the same types of attacks if they were also misconfigured.
/1 31, 2018
Critical lessons can be learned from others’ mistakes. Don’t learn the hard way; heed the warnings from our research.
/1 02, 2018
The safest way to run a network is to assume it’s going to breached, but that also means minimizing your liability and ensuring the executive team is fully aware of what is going on.
/12 07, 2017
F5 Labs researched 433 breach cases spanning 12 years, 37 industries, and 27 countries to discover patterns in the initial attacks that lead to the breach.
/9 14, 2017
TrickBot kicked into high gear coming into August with the most targeted URLs since its launch. It released a new worm module, shifted its focus towards the US, and soared past the one thousand target URL mark in a single configuration.
/8 09, 2017
With “thingbots” now launching Death Star-sized DDoS attacks, hosting banking trojans, and causing physical destruction, all signs point to them becoming the attacker infrastructure of the future.
/7 27, 2017
As TrickBot evolves, we examine version 24, which heavily targets Nordic financial institutions, and we take a close look at the Dyre–TrickBot connection.
/6 15, 2017
TrickBot shows no signs of slowing down as new targets are added and command and control servers hide within web hosting providers’ networks.
/5 10, 2017
With a growth rate of 1,473% in 2016, the hunt for vulnerable IoT devices rages on...
/3 30, 2017
Board level interest in your cyber risk posture is growing, in fact it might be required soon for publicly traded companies. Presenting cyber risk to your board – effectively – means talking in their terms.
/3 24, 2017
Purchasing cyber insurance can be useful, but claims are often denied due to policy exclusions or lapses in controls.
/3 03, 2017
Putting off fixing low-severity vulnerabilities can have high-impact effects.
/1 26, 2017
As security professionals, we often feel like we’re fighting a losing battle when it comes to cyber security.
/10 08, 2016
The latest evolution of cyber weapons is brought to you by the default passwords in Internet of Things (IoT) devices.
/7 22, 2016
Customer engagement drives web application design, but user-generated content brings inherent security challenges.
Get the latest application threat intelligence from F5 Labs.
Follow us on social media.