APPLICATION THREAT INTELLIGENCE

stay up to date

Stay up to date with F5 Labs on social media.

There was an error signing up.
Thank you, your email address has been signed up.

blog / Jun 27, 2017

NSA, CIA Leaks Provide a Roadmap to Stealthier, Faster, More Powerful Malware

Recent NSA and CIA leaks exposed advanced new techniques for building automated malware factories that churn out threats like SambaCry and Petya/NotPetya, which deploy over untraceable networks.

blog / Jun 21, 2017

Russian Hackers, Face to Face

An undercover interview of two infamous Russian hackers speak volumes about skills, passion, and motivation of some of the world’s most dangerous cybercriminals.

blog / Jun 06, 2017

Default Passwords Are Not the Biggest Part of the IoT Botnet Problem

Providers and manufacturers could go a long way toward reducing the very real threat of IoT.

blog / Jun 22, 2017

Achieving Multi-Dimensional Security through Information Modeling—The Master Model Part 2

Understanding the customer segment of your organization is critical to developin...

blog / Jun 01, 2017

The CISO: A Field Guide

Learn to recognize different types of CISOs so you can ensure you’re hiring the right one.

report / May 10, 2017

THE HUNT FOR IoT: The Networks Building Death Star-Sized Botnets

With a growth rate of 1,373% in 2016, the hunt for vulnerable IoT devices rages on...

blog / May 26, 2017

SambaCry: The Linux Sequel to WannaCry

With simple exploits plaguing Windows and Linux SMB week over week, do yourself a favor and patch for CVE-2017-7494 now to av...