ARTICLES

article /10月 31, 2017

Academic Research: A Survey of Email Attacks

by David Hammerstrom, Sara McGarvey, Russel Parham, Kyle Uecker, Anthony Wade

Email has become such an ordinary part of our daily lives that we can forget how vulnerable it is.

article /10月 10, 2017

Academic Research: Web Application Attacks

by Andrew Cox, Daniel Freese, Matthew Martin, Daniel Massie

Personally identifiable information and user credentials are the primary nuggets attackers are after when they exploit known vulnerabilities in web applications.

article /9月 14, 2017

TrickBot Rapidly Expands its Targets in August, Shifting Focus to US Banks and Credit Card Companies

by Sara Boddy

TrickBot kicked into high gear coming into August with the most targeted URLs since its launch. It released a new worm module, shifted its focus towards the US, and soared past the one thousand target URL mark in a single configuration.

article /7月 27, 2017

TrickBot Focuses on Wealth Management Services from its Dyre Core

by Sara Boddy

As TrickBot evolves, we examine version 24, which heavily targets Nordic financial institutions, and we take a close look at the Dyre–TrickBot connection.

article /4月 12, 2017

Doxing, DoS, and Defacement: Today’s Mainstream Hacktivism Tools

by Ray Pompon

Readily available hacking tools provide new ways for civil disobedience groups to antagonize their targets anonymously.

article /4月 07, 2017

Marcher Gets Close to Users by Targeting Mobile Banking, Android Apps, Social Media, and Email

by Doron Voolf

Marcher targets focused on European, Australian, and Latin American banks, along with PayPal, eBay, Facebook, WhatsApp, Viber, Gmail, and Yahoo—all in the month of March.

article /3月 27, 2017

From DDoS to Server Ransomware: APACHE STRUTS 2 - CVE-2017-5638 Campaign

by Maxim Zavodchik

A common infection vector used by botnet creators is scanning the Internet for web vulnerabilities to exploit for malware or back doors. The advantage of hitting servers over personal consumer devices is the ability to leverage powerful hardware that is...

article /3月 10, 2017

DNS Is Still the Achilles’ Heel of the Internet

by Ray Pompon

Since the Internet can’t survive without DNS, let’s make our best effort to defend it.

article /2月 13, 2017

How Three Low-Risk Vulnerabilities Become One High

by Keiron Shepherd

It’s easy to brush off low-risk vulnerabilities as trivial—until they’re combined to create a deep-impact attack.

article /1月 19, 2017

The New Insider Threat: Automation Frameworks

by Lori MacVittie

One of the pillars of DevOps is - according to its founders - automation. Along with automation naturally comes orchestration, which as you might guess is automation but at a higher level of abstraction. Where automation focuses on using...

article /1月 18, 2017

Welcome to CISO to CISO

by Mike Convertino

Hi. I’m Mike Convertino, CISO of F5 Networks, and I want to welcome you to an experiment we’re conducting here at F5. We’ve laid the foundation of this CISO to CISO portal on an idea that has traditionally been somewhat controversial in the security community: openness.

article /11月 15, 2016

Old Protocols, New Exploits: LDAP Unwittingly Serves DDoS Amplification Attacks

by Liron Segal

A new DDoS attack vector that leverages LDAP for reflection-amplification attacks is seeing increased usage.

article /10月 23, 2016

DARPA Proves Automated Systems Can Detect, Patch Software Flaws at Machine Speed

by Debbie Walkowski

According to DARPA, it takes an average of 312 days for security pros to discover software vulnerabilities such as viruses, malware, and other attacks. In hacker time, that’s a virtual eternity in which bad actors can wreak havoc.

article /10月 06, 2016

Mirai: The IoT Bot that Took Down Krebs and Launched a Tbps Attack on OVH

by Liron Segal

The Mirai botnet has infected hundreds of thousands of Internet of Things (IoT) devices, specifically security cameras, by using vendor default passwords for Telnet access.

article /9月 01, 2016

Malware Targeting Bank Accounts Has a Swapping Pattern

by Doron Voolf

F5 Labs analysts discovered a target pattern in the IBAN number formats as well as weekly changes to the script injection content. In May 2016, the F5 Security Operations Center (SOC) detected a generic form grabber and IBAN (International Bank...

article /8月 24, 2016

When Securing Your Applications, Seeing Is Believing

by Mike Convertino

While the cloud is amazing, a worrying lack of visibility goes along with it. F5 CISO Mike Convertino on things to keep in mind when developing a security approach.  When Securing Your Applications, Seeing is Believing

article /8月 02, 2016

We Expected SSL Everywhere, and It's Well on the Way

by David Holmes

Malicious actors and eavesdroppers are forcing Internet communication into a single cryptographic protocol: SSL.

article /7月 22, 2016

Web Injection Threats: The Cost of Community Engagement on Your Site

by Sara Boddy

Customer engagement drives web application design, but user-generated content brings inherent security challenges.

article /6月 21, 2016

Privacy and Security: Where Do We Go From Here?

by Mike Convertino

Some of you may remember a time when national security was a question of police officers protecting individuals from crime on the street, or the Army’s defence against international threats. Today, that picture looks very different. If anything,...

article /6月 17, 2016

Dridex is Watching You

by Anna Dorfman

And we're watching Dridex. Here's the latest in this malware's evolution.

stay up to date

Get the latest application threat intelligence from F5 Labs.

There was an error signing up.
Thank you, your email address has been signed up.

Follow us on social media.