MORE ON Cryptojacking

Featured Data

2018 Application Protection Report
90 min. read
In this report, we demystify the complexities of apps, explore how and where they’re attacked, and provide practical steps to take now to start winning the app protection battle.
Read the full report

No articles found matching your filter criteria

F5 Labs in the Industry

Understand the Application
Explore threats and app components
If you were the world's best IoT botnet builder and you wanted to show the world how well-crafted an IoT botnet could be, Reaper is what you'd build.

-David Holmes

Threat Reports

In-depth research, analysis, and actionable insights

/breach impact/

A by-the-numbers breakdown from the latest threat intelligence
Exploited Memcached Servers vs GitHub

Hundreds of apps will be attacked by the time you read this.

So, we get to work. We obsess over effective attack methods. We monitor the growth of IoT and its evolving threats. We dive deep into the latest crypto-mining campaigns. We analyze banking Trojan targets. We dissect exploits. We hunt for the latest malware. And then our team of experts share it all with you. For more than 20 years, F5 has been leading the app delivery space. With our experience, we are passionate about educating the security community-providing the intel you need to stay informed so your apps can stay safe.


9 hrs

a critical vulnerability—with the potential for remote code execution—is released.