RELATED INTELLIGENCE:
MORE ON Fraud

2019 Application Protection Series

Why Application Security?

Find out why we care so much about application security, how applications have grown into the weird beasts that they are today, and how our work fits into the bigger picture of securing and running an application.

Explore the Series

No articles found matching your filter criteria

F5 Labs in the Industry

FEATURE
What are apps and how are they attacked?

Applications are made up of many independent components, running in separate environments with different requirements and a supporting infrastructure that's glued together over networks. Each component, or tier, can be a target. To evaluate defenses, you need to understand the attack surface of each tier.

‹ Select an app tier or attack type to learn more

Back
FEATURE
What are apps and how are they attacked?

Applications are made up of many independent components, running in separate environments with different requirements and a supporting infrastructure that's glued together over networks. Each component, or tier, can be a target. To evaluate defenses, you need to understand the attack surface of each tier.

‹ Select an app tier or attack type to learn more

88% of the thingbots we know about were discovered since Mirai's source code was leaked.

-Sara Boddy

Threat Reports

In-depth research, analysis, and actionable insights

/breach impact/

A by-the-numbers breakdown from the latest threat intelligence
Exploited Memcached Servers vs GitHub

Hundreds of apps will be attacked by the time you read this.

So, we get to work. We obsess over effective attack methods. We monitor the growth of IoT and its evolving threats. We dive deep into the latest crypto-mining campaigns. We analyze banking Trojan targets. We dissect exploits. We hunt for the latest malware. And then our team of experts share it all with you. For more than 20 years, F5 has been leading the app delivery space. With our experience, we are passionate about educating the security community-providing the intel you need to stay informed so your apps can stay safe.

Every

9 hrs

a critical vulnerability—with the potential for remote code execution—is released.