#f5-big-ip

[ follow ]
Information security
fromThe Hacker News
1 day ago

Weekly Recap: F5 Breached, Linux Rootkits, Pixnapping Attack, EtherHiding & More

Long-term, silent breaches are becoming common; prioritize continuous visibility, threat hunting, inventorying exposed services like F5 BIG-IP, and proactive access restrictions and patching.
Science
fromTheregister
5 days ago

CISA exec blames hackers, Democrats for network risk

Exploitable vulnerabilities in F5 BIG-IP devices create imminent risk of lateral access and full compromise of US federal networks; urgent patches and inventories are required.
[ Load more ]