Author: nlqip

Attack Types of Top Attacking IP Addresses Many of the IP addresses attacking American systems during the winter of 2019 were involved with abusive port scanning activity. As noted in the Top Target Ports section, Microsoft SMB port 445 was the highest targeted port. We continue to observe high levels of attack traffic pointed toward…

Read More

F5 Labs, in conjunction with our partner Baffin Bay Networks, researches global attack traffic region to region to gain a deeper understanding of the cyberthreat landscape. Aside from attack campaigns targeting the entire Internet (IPv4 address space), the attack landscape varies regionally in terms of sources, targets, and attack types. In addition, targeted ports expose…

Read More

I struggled to assimilate to civilian life after I returned home from serving three military deployments. I had plenty of experience, but I didn’t know how to explain my qualifications in terms an employer would understand. After all, how do you tell a potential employer that your skills hunting down IEDs in Afghanistan make you…

Read More

F5 Labs, in conjunction with our partner Baffin Bay Networks, researches global attack traffic region to region to gain a deeper understanding of the cyberthreat landscape. Aside from attack campaigns targeting the entire Internet (IPv4 address space), the attack landscape varies regionally in terms of sources, targets, and attack types. In addition, targeted ports expose…

Read More

Imagine not being able to escape online surveillance. The Internet of Things (IoT) is composed of technology that optimize our lives and is deployed in the thousands. However, the convenience these devices add to our lives comes at a cost—privacy. In 2019, China had more than 960 million IoT devices, many of them surveillance cameras, making…

Read More

COVID-19, aka the Coronavirus, is really starting to worry people. It’s an unfamiliar, seemingly unnatural new threat dragging a lot of uncertain baggage with it. It has already caused global disruptions on both the macro- and micro-scale. All over the world, organizations and individuals are mobilizing response plans, and that’s a good thing. The U.S.…

Read More

Mirai is an IoT botnet (or thingbot) that F5 has discussed since 2016. It infamously took down large sections of the Internet in late 2016 and has remained active ever since. Its source code was released online in September 2016, allowing unskilled attackers to create a malicious botnet with relative ease. Mirai continues to target…

Read More

Authentication Attacks: Growing Every Year Credential stuffing and brute force attacks have been the biggest threats for financial services recently, and the trend shows no sign of slowing. This is unsurprising, given the capability that legitimate credentials represent for attackers. If attackers are able to guess or simply re-use already compromised credentials and gain access…

Read More

In the current era driven by automation and connectivity, retaining top IT talent is becoming increasingly important for enterprises to deliver world-class customer experiences in order to stand out and stay ahead in the race. However, as companies pursue digitization to drive transformation and innovation, they simultaneously become vulnerable to cyberattacks. Last year, Hong Kong…

Read More

This is the full-spectrum, director’s cut version of the Application Protection Report, untrammeled by petty concerns like brevity or toner prices (for the shorter version, please see our Summary). This report pulls together the various threats, data sources, and patterns in the episodes into a unified line of inquiry that began in early 2019, picking…

Read More