“Due to the ease of accessibility and the amount of publicly known vulnerabilities associated with F5 applications, the service becomes a prime target for adversaries to break into a company’s network via the external perimeter,” says Jonathan Chua, Application Security Consultant at nVisium.
- WhatsApp’s End-to-End Encryption Isn’t Actually Broken
- 13 Troubling Tech Vulnerabilities the Industry Needs to Address
- Microsoft Moves to Fix First-Ever Cross-Account Takeover on a Public Cloud Platform
- NTFS Support in New Linux Kernel Promises to Make New Release More Cryptographically Sound
- Spoofing Bug Highlights Cybersecurity for Digital Vaccine Passports