REPORTS

report / 1月 26, 2017 (MODIFIED: 4月 07, 2017)

Using F5 Labs Application Threat Intelligence

by Ray Pompon

As security professionals, we often feel like we’re fighting a losing battle when it comes to cyber security.

report / 1月 19, 2017 (MODIFIED: 3月 30, 2017)

The 2016 TLS Telemetry Report

by David Holmes

In just four short years, encryption estimates have gone from almost non-existent (in the low single digits before 2013) to just over 50% by the end of 2016. How much of a victory is this?

report / 10月 08, 2016 (MODIFIED: 4月 25, 2017)

DDoS's Newest Minions: IoT Devices (Volume 1)

by Justin Shattuck

The latest evolution of cyber weapons is brought to you by the default passwords in Internet of Things (IoT) devices.

report / 12月 14, 2015 (MODIFIED: 2月 22, 2017)

Yasuo-Bot: Flexible, Customized, Fraudulent Content

by Shaul Vilkomir-Preisman

Standard mobile banking trojans post their own fraudulent content over banking applications. Yasuo-Bot goes further.

report / 12月 12, 2015 (MODIFIED: 2月 22, 2017)

Webinject Analysis: Newsidran.com

by Elman Reyes

Webinject attacks modify webpages to allow fraudsters to collect credentials, or act more directly against user accounts.

report / 6月 24, 2015 (MODIFIED: 2月 22, 2017)

Slave Malware Analysis: Evolving from IBAN Swaps to Persistent Webinjects

by Nathan Jester

Slave is financial malware written in Visual Basic. Since 2015 it has evolved from relatively simple IBAN swapping.

report / 4月 12, 2015 (MODIFIED: 2月 22, 2017)

Dyre In-Depth: Server-side Webinjects, I2P Evasion, and Sophisticated Encryption

by Avi Shulman

Dyre is one of the most sophisticated banking malware agents in the wild.

report / 10月 15, 2014 (MODIFIED: 2月 22, 2017)

Tinba Malware: Domain Generation Algorithm Means New, Improved, and Persistent

by Pasel Asinovsky

Tinba, also known as "Tinybanker", "Zusy" and "HµNT€R$", is a banking Trojan.

report / 10月 10, 2014 (MODIFIED: 2月 22, 2017)

Shellshock: Malicious Bash, Obfuscated perlb0t, Echo Probes, and More

by Maxim Zavodchik

Shellshock can take advantage of HTTP headers as well as other mechanisms to enable unauthorized access to Bash.

stay up to date

Get the latest application threat intelligence from F5 Labs.

There was an error signing up.
Thank you, your email address has been signed up.

Follow us on social media.