Malicious hackers, hacker groups, nation states, regions
DDoS attacks, web application exploits, malware, phishing, spamming
Continual or seasonal attacks, spikes during specific days/times
Zero-day exploits, unpatched vulnerabilities, social engineering
Financial gain, espionage, notoriety, cyber warfare
Threat findings and predictions for the future
Monitors the dark net for the latest malware variants and threat actor behavior, collects global attack data, and creates threat monitoring tools. F5 Labs publishes the team’s intelligence about which malware is targeting whom, how the malware works, what attack trends the team is seeing, and more.
Protects customers from malware, phishing, and web fraud with proactive, 24x7 real-time global threat monitoring. F5 Labs threat intelligence leverages the SOC’s real-time analysis of current threat actors and attack trends.
Manages the receipt, investigation, and public reporting of security vulnerability information related to F5 products, platforms, and partners. F5 Labs threat intelligence draws on this team’s insights into reported vulnerabilities.
Attempts to exploit F5 products to identify vulnerabilities, define CVEs, and develop patches before malicious hackers do. F5 Labs publishes the threat modeling intelligence and targets the team gathers during its vulnerability research.
Stays on top of DDoS attack and mitigation trends, web application vulnerability scanning and exploit methodologies, and resulting threat actors. The team shares this global intelligence with F5 Labs for awareness stories on trends and management techniques.
Researches global trends in encryption and scans 100% of SSL/TLS sites quarterly to understand the impact on threat visibility, and feeds the trending data back to product development in the form of requirements. F5 Labs leverages this research for quarterly and annual reporting on global encryption usage and exploit trends.
Follow @F5Labs for the latest application threat research.
Get the latest application threat intelligence on LinkedIn.