F5 Labs

@F5Labs

We process application threat data from F5 and our partners into actionable intelligence. We analyze and share information to benefit the security community.

Seattle, WA
Vrijeme pridruživanja: rujan 2016.

Tweetovi

Blokirali ste korisnika/cu @F5Labs

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @F5Labs

  1. prije 1 sat
    Poništi
  2. 2. velj

    Security Researchers detected a 100% increase of new threat campaigns in December as compared to November 2019. This makes sense as attackers often increase their activity during the busy holiday season. A whole overview of the month is on F5 Labs.

    Poništi
  3. 31. sij

    In December threat actors focused on a variety of different attack vectors ranging from to sandbox exploitation. Read the full write up by Harsh Chawla, Debbie Walkowski and :

    Poništi
  4. 23. sij

    infrastructure should include guardrails to ensure secure standards are chosen by default including pre-security certified libraries, frameworks, environments, configurations.

    Poništi
  5. 22. sij

    We’re currently examining a few samples of / . Most of the targets are users of large financial services institutions, mostly in North America. Attached is one target list where the technique redirects users out of the original entered page.

    Poništi
  6. 20. sij

    Good and operational maturity means strong service Portfolio management including tracking of your environment, applications, deployed platforms, and ongoing IT projects.

    Poništi
  7. 20. sij

    is currently targeting high profile banks in Australia and New Zealand, initially using heavy (see images), then generating an anonymous script to remove itself.

    Poništi
  8. 17. sij

    As with anything in and , the strategy and priority decisions should come before the technological reasons.

    Poništi
  9. 16. sij

    A new IRC botnet spotted targeting PHPunit systems (-2017-9841) is spreading itself using an certified server. 106 victims so far.

    Poništi
  10. 15. sij

    In the , your infrastructure can shrink, grow, appear, disappear, and transform in the blink of an eye. The implications are immense.

    Poništi
  11. 8. sij

    executes the (CVE-2013-3660 or CVE-2014-4113) if it has a specific windows version and doesn’t have specific updates.

    Poništi
  12. 7. sij

    The is a new pathway for anyone to become a software startup without having to hire operations or infrastructure personnel. That sword cuts both ways.

    Poništi
  13. 7. sij

    The organizations who lift and shift to the cloud drag along their pre-cloud security problems, on top of all the new problems created by operations.

    Poništi
  14. 5. sij

    Some breaches are really breaches. Yes, it's problem in the cloud, but not necessarily unique to the cloud.

    Poništi
  15. 4. sij

    Access attacks, such as , credential stuffing, and credential theft are just as prominent in the attacks as they are in every other environment.

    Poništi
  16. 3. sij

    As noticed, ’s malicious JavaScript is hosted in googlead. Tech is still active in some online stores and was modified in the last two weeks. Magecart is using an technique with an infinite loop executing the debugger statement.

    Poništi
  17. 3. sij

    New technique extracts an executable to the Temp folder and runs it as a legitimate Svchost process. It’s using 0x22 as a XOR key to decrypt the malicious svchost content.

    Poništi
  18. 3. sij

    New variant targeting attempts to kill off 48 rival malwares, with 56% of those being other . Full write up on F5 Labs:

    Poništi
  19. 3. sij

    New campaign targeting servers vulnerable to CVE-2018-1000861 detected. Payload is constructed using built-in Linux command xxd -r which converts hexdump to binary. Downloaded payload kills existing cryptominers and downloads another malicious file.

    Poništi
  20. 2. sij

    is not a new type of attack, but it has exploded in popularity over the last two years - 83 breaches attributable with 1,396,969 payment cards compromised. See the 2019 F5 Labs Application Protection Report for details.

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·