Threat research. Security leadership. Decades of experience.

Bots Cheat to Win
Latest Article
Bots and Automated Attacks
Bots Cheat to Win
How automated fraudsters tried to ruin a restaurant’s promotional contest.
02/05/2024 article 17 min. read
Sensor Intel Series: Top CVEs in January 2024
Featured Series
Top Risks
Sensor Intel Series: Top CVEs in January 2024
More IoT Targeting, plus a bunch of new CVEs! See what attackers went after in January 2024.
02/19/2024 article 8 min. read
2023 Identity Threat Report: The Unpatchables
Report
Top Risks
2023 Identity Threat Report: The Unpatchables
We are excited to announce a new report covering threats to digital identities. This report goes into detail on credential stuffing, phishing, and multifactor authentication bypass techniques.
11/01/2023 report 80 min. read

All F5 Labs Content

No filters selected
BlackGuard is designed to steal account credentials, cryptocurrency wallet information, session cookies, messaging history, browsing history, and screenshots.

-Aditya Sood

Threat Reports

In-depth research, analysis, and actionable insights
2023 Identity Threat Report: The Unpatchables
Top Risks
2023 Identity Threat Report: The Unpatchables
11/01/2023 report 80 min. read
The Evolving CVE Landscape
Top Risks
The Evolving CVE Landscape
02/28/2023 report 40 min. read
2023 DDoS Attack Trends
Attack Campaign
2023 DDoS Attack Trends
02/21/2023 report 15 min. read

Hundreds of apps will be attacked by the time you read this.

So, we get to work. We obsess over effective attack methods. We monitor the growth of IoT and its evolving threats. We dive deep into the latest crypto-mining campaigns. We analyze banking Trojan targets. We dissect exploits. We hunt for the latest malware. And then our team of experts share it all with you. For more than 20 years, F5 has been leading the app delivery space. With our experience, we are passionate about educating the security community—providing the intel you need to stay informed so your apps can stay safe.

Every

9 hrs
a critical vulnerability—with the potential for remote code execution—is released.