“Due to the ease of accessibility and the amount of publicly known vulnerabilities associated with F5 applications, the service becomes a prime target for adversaries to break into a company’s network via the external perimeter,” says Jonathan Chua, Application Security Consultant at nVisium.

Read the entire article here!