RELATED INTELLIGENCE:
MORE ON Fraud

2020 Phishing and Fraud Report

Phishing attacks peaked at 220% above norms during pandemic lock downs and made use of encryption in 72% of incidents. Our 2020 Phishing and Fraud Report combines five years worth of incidents from the F5 SOC, analyzes hundreds of thousands of phishing sites from Webroot Brightcloud Threat Intelligence and examines new insights from Shape Security.
No filters selected

No articles found matching your filter criteria

Labs in the Industry

How AI Will Automate Cybersecurity in the Post-COVID World
November 05, 2020
Education's Digital Future and the End of Snow Days
October 08, 2020
The New Kid On The Cyber Block: Data Manipulation
August 20, 2020
FEATURE
What are apps and how are they attacked?

Applications are made up of many independent components, running in separate environments with different requirements and a supporting infrastructure that's glued together over networks. Each component, or tier, can be a target. To evaluate defenses, you need to understand the attack surface of each tier.

‹ Select an app tier or attack type to learn more

Back
FEATURE
What are apps and how are they attacked?

Applications are made up of many independent components, running in separate environments with different requirements and a supporting infrastructure that's glued together over networks. Each component, or tier, can be a target. To evaluate defenses, you need to understand the attack surface of each tier.

‹ Select an app tier or attack type to learn more

88% of the thingbots we know about were discovered since Mirai's source code was leaked.

-Sara Boddy

Threat Reports

In-depth research, analysis, and actionable insights

/breach impact/

A by-the-numbers breakdown from the latest threat intelligence
Exploited Memcached Servers vs GitHub

Hundreds of apps will be attacked by the time you read this.

So, we get to work. We obsess over effective attack methods. We monitor the growth of IoT and its evolving threats. We dive deep into the latest crypto-mining campaigns. We analyze banking Trojan targets. We dissect exploits. We hunt for the latest malware. And then our team of experts share it all with you. For more than 20 years, F5 has been leading the app delivery space. With our experience, we are passionate about educating the security community-providing the intel you need to stay informed so your apps can stay safe.

Every

9 hrs

a critical vulnerability—with the potential for remote code execution—is released.