My Apple News app recently served up some targeted marketing that really hit home. There before me was the opportunity to purchase a limited-edition 11 Herbs & Spices Firelog from KFC and Envirolog, sold through Walmart. In addition to the advertising and sales mechanisms that brought me to this point, there are also all of…

Read More

What Does a Typical Brute Force Attack Look Like at a Service Provider? Brute force attack methods vary. It’s not uncommon, for example, for mobile phone service providers to encounter unauthorized online account activity in which an attacker accesses accounts by trying a phone number in combination with a PIN code. These types of attacks…

Read More

Do Gen Z-ers (individuals age 8 to 22) think and behave differently towards technology than previous generations? Specifically, are their attitudes and digital habits around privacy and security different from Millennials (age 23 to 35), who grew up with less technology? What about compared to Gen X-ers (age 36 to 55)? When F5 Labs was…

Read More

Love is purportedly in the air again, but is it being harnessed and channelled in the right direction? This Valentine’s Day, are you doing all you can to lavish protective TLC on your apps? Do you have the right strategies and solutions in place to secure a mutually rewarding, long-term relationship with your apps and,…

Read More

Welcome to the Summary of the 2019 F5 Labs TLS Telemetry Report. This year, we expanded the scope of our research to bring you deeper insights into how encryption on the web is constantly evolving. We look into which ciphers and SSL/TLS versions are being used to secure the Internet’s top websites and, for the…

Read More

After a few days of monitoring the channel, the bot master noticed our activity and registered the nicknames of the admins and white-listed the IRC clients allowed to join the network. This prevented us from pretending to be admins and controlling the bots. During our research, the botnet peaked at around 350 bots, which is…

Read More

In this list, we don’t see any of the significant factored software types, so there are no weights to add here. Calculating the Likelihood of Exploitation of a Vulnerability Now that we have all our factors and weights, we can do some simple math in a spreadsheet.  Factor Weight Base -6.18 Web related 0.06 Reference…

Read More

F5 Labs, in conjunction with our partner Baffin Bay Networks, researches global attack traffic region to region to gain a deeper understanding of the cyber threat landscape. Aside from attack campaigns targeting the entire Internet (IPv4 address space), the attack landscape varies regionally in terms of sources, targets, and attack types. In addition, targeted ports…

Read More

F5 Labs, in conjunction with our partner Baffin Bay Networks, researches global attack traffic region to region to gain a deeper understanding of the cyber threat landscape. Aside from attack campaigns targeting the entire Internet (IPv4 address space), the attack landscape varies regionally in terms of sources, targets, and attack types. In addition, targeted ports…

Read More

When it comes to high-value assets, few industries can come close to financial services. It’s not just the obvious fact that banks are giant warehouses of money—banks represent critical pieces of infrastructure that entire economies rely upon. Some of today’s largest financial institutions have more app developers than bankers. The way these companies interact with…

Read More