RELATED INTELLIGENCE:
MORE ON Top Risks

2019 Phishing and Fraud Report
In our 2019 edition of the Phishing and Fraud Report, we look at the latest methods and trends attackers are using to exploit the most vulnerable part of your defensive posture: your users.

No articles found matching your filter criteria

F5 Labs in the Industry

FEATURE
What are apps and how are they attacked?

Applications are made up of many independent components, running in separate environments with different requirements and a supporting infrastructure that's glued together over networks. Each component, or tier, can be a target. To evaluate defenses, you need to understand the attack surface of each tier.

‹ Select an app tier or attack type to learn more

Back
FEATURE
What are apps and how are they attacked?

Applications are made up of many independent components, running in separate environments with different requirements and a supporting infrastructure that's glued together over networks. Each component, or tier, can be a target. To evaluate defenses, you need to understand the attack surface of each tier.

‹ Select an app tier or attack type to learn more

88% of the thingbots we know about were discovered since Mirai's source code was leaked.

-Sara Boddy

Threat Reports

In-depth research, analysis, and actionable insights

/breach impact/

A by-the-numbers breakdown from the latest threat intelligence
Exploited Memcached Servers vs GitHub

Hundreds of apps will be attacked by the time you read this.

So, we get to work. We obsess over effective attack methods. We monitor the growth of IoT and its evolving threats. We dive deep into the latest crypto-mining campaigns. We analyze banking Trojan targets. We dissect exploits. We hunt for the latest malware. And then our team of experts share it all with you. For more than 20 years, F5 has been leading the app delivery space. With our experience, we are passionate about educating the security community-providing the intel you need to stay informed so your apps can stay safe.

Every

9 hrs

a critical vulnerability—with the potential for remote code execution—is released.