RELATED INTELLIGENCE:
MORE ON Education

2021 Cred Stuffing Report

Credential stuffing is a multifaceted and enduring risk to all organizations. This report is a comprehensive examination of the entire life cycle of stolen credentials—from their theft, to their resale, and their repeated use in credential stuffing attacks.
We explore the challenges of discovering credential theft, the tools attackers use, and how advanced attackers make it possible for less skilled criminals to get in on the action.
No filters selected

No articles found matching your filter criteria

Labs in the Industry

How AI Will Automate Cybersecurity in the Post-COVID World
November 05, 2020
Education's Digital Future and the End of Snow Days
October 08, 2020
The New Kid On The Cyber Block: Data Manipulation
August 20, 2020
FEATURE
What are apps and how are they attacked?

Applications are made up of many independent components, running in separate environments with different requirements and a supporting infrastructure that's glued together over networks. Each component, or tier, can be a target. To evaluate defenses, you need to understand the attack surface of each tier.

‹ Select an app tier or attack type to learn more

Back
FEATURE
What are apps and how are they attacked?

Applications are made up of many independent components, running in separate environments with different requirements and a supporting infrastructure that's glued together over networks. Each component, or tier, can be a target. To evaluate defenses, you need to understand the attack surface of each tier.

‹ Select an app tier or attack type to learn more

88% of the thingbots we know about were discovered since Mirai's source code was leaked.

-Sara Boddy

Threat Reports

In-depth research, analysis, and actionable insights

/breach impact/

A by-the-numbers breakdown from the latest threat intelligence
Exploited Memcached Servers vs GitHub

Hundreds of apps will be attacked by the time you read this.

So, we get to work. We obsess over effective attack methods. We monitor the growth of IoT and its evolving threats. We dive deep into the latest crypto-mining campaigns. We analyze banking Trojan targets. We dissect exploits. We hunt for the latest malware. And then our team of experts share it all with you. For more than 20 years, F5 has been leading the app delivery space. With our experience, we are passionate about educating the security community-providing the intel you need to stay informed so your apps can stay safe.

Every

9 hrs

a critical vulnerability—with the potential for remote code execution—is released.