Threat Bulletin
F5 threat researchers investigating 2 Danabot samples discover 2 campaigns. See More...
New cryptocurrency campaign targeting Jenkins instances using Jenkins ACL Bypass and Metaprogramming RCE vulnerability. See More...
RELATED INTELLIGENCE:
MORE ON Attack Campaign

Featured Data

Application Protection Report 2019, Episode 2: 2018 Breach Trends
article
11 min. read
Analysis of public breach reports showed a relationship between business models and breach vectors, with injection and phishing the leading causes.
Read the Full Article

No articles found matching your filter criteria

F5 Labs in the Industry

FEATURE
What are apps and how are they attacked?
<p>Applications are made up of many independent components, running in separate environments with different requirements and a supporting infrastructure that's glued together over networks. Each component, or tier, can be a target. To evaluate defenses, you need to understand the attack surface of each tier.</p> <p><b>‹ Select an app tier or attack type to learn more</b></p>
Back
FEATURE
What are apps and how are they attacked?

Applications are made up of many independent components, running in separate environments with different requirements and a supporting infrastructure that's glued together over networks. Each component, or tier, can be a target. To evaluate defenses, you need to understand the attack surface of each tier.

‹ Select an app tier or attack type to learn more

If you were the world's best IoT botnet builder and you wanted to show the world how well-crafted an IoT botnet could be, Reaper is what you'd build.

-David Holmes

Threat Reports

In-depth research, analysis, and actionable insights

/breach impact/

A by-the-numbers breakdown from the latest threat intelligence
Exploited Memcached Servers vs GitHub

Hundreds of apps will be attacked by the time you read this.

So, we get to work. We obsess over effective attack methods. We monitor the growth of IoT and its evolving threats. We dive deep into the latest crypto-mining campaigns. We analyze banking Trojan targets. We dissect exploits. We hunt for the latest malware. And then our team of experts share it all with you. For more than 20 years, F5 has been leading the app delivery space. With our experience, we are passionate about educating the security community-providing the intel you need to stay informed so your apps can stay safe.

Every

9 hrs

a critical vulnerability—with the potential for remote code execution—is released.