Blog / Jun 15, 2018
Singapore saw a sharp rise in attacks targeting a variety of ports, from SIP clear-text (5060), Telnet, SQL, and host-to-host ports to those used for remote router management and proxy servers and caching.
Blog / May 4, 2018
US-CERT TL18-106A alert underscores how insecure Internet systems really are and that ignoring the problem only increases the collateral damage.
Blog / May 2, 2018
When it comes to tallying the total cost of a data breach, lawsuits figure prominently, alongside repair costs, loss of reputation and sales, compliance penalties, and operational downtime.
Blog / Apr 17, 2018
Savvy CISOs don’t go it alone; they rely on in-house collaborators (outside of the security team) to help achieve the organization’s security objectives.
Blog / Apr 10, 2018
Critical apps are the ones that must never go down or be hacked. They are also the hardest to defend because they are often massive, ancient, and touch everything.
Blog / Mar 22, 2018
Seven steps for improving the security of critical infrastructure systems—and protecting the public from unnecessary risk.
Blog / Mar 20, 2018
Laptops full of confidential data are still getting stolen, and public Wi-Fi hotspots are being booby-trapped. CISOs need to make users aware of the threat to prevent this from happening.
Blog / Mar 2, 2018
Memcached is just one of many application infrastructure systems that could launch the same types of attacks if they were also misconfigured.
Blog / Feb 15, 2018
As the black-market price for stolen data declines, attackers turn to cryptojacking schemes to maximize their profits—all at your expense.
Blog / Feb 8, 2018
Real estate scams are big business for attackers. Be on the lookout for this one, which can leave home buyers destitute if not caught in time.
Blog / Feb 6, 2018
As security expertise becomes more scarce, CISOs are turning to machine learning to do more with fewer people.
Blog / Jan 31, 2018
Critical lessons can be learned from others’ mistakes. Don’t learn the hard way; heed the warnings from our research.
Blog / Jan 25, 2018 (MODIFIED: Jan 31, 2018)
F5 Labs covered a multitude of threats, vulnerabilities, botnets, attackers, and attacks in 2017. Here are just some of the highlights you might have missed.
Blog / Jan 16, 2018 (MODIFIED: Jan 12, 2018)
Forty-three percent of organizations say security is essential when deploying apps, and more than two thirds use multiple security solutions to protect clients, infrastructure, and web apps.
Blog / Jan 10, 2018 (MODIFIED: Jan 15, 2018)
Every week, another bug, vulnerability, or exploit is released—we need a multi-layered security strategy to deal with threats like Spectre and Meltdown.
Blog / Jan 4, 2018 (MODIFIED: Jan 18, 2018)
With Mirai rearing its ugly head again, we’re revealing its C&C hostnames so organizations can update their blacklists and protect themselves.
Blog / Dec 28, 2017 (MODIFIED: Jan 16, 2018)
Most security researchers have good intentions, but ethics must play a central role in the decisions they make.
Blog / Dec 27, 2017 (MODIFIED: Jan 15, 2018)
Bleichenbacher attacks will likely continue to pop up until TLS 1.3 is fully adopted, which could take years.
Blog / Dec 26, 2017 (MODIFIED: Jan 12, 2018)
In Part 5 of this blog series, we use inversion modeling techniques to develop a high-level protection strategy.