Threat research. Security leadership. Decades of experience.

Three Ways AI Can Hack the U.S. Election
Latest Article
Generative AI
Three Ways AI Can Hack the U.S. Election

The growing capability of AI content poses three very real threats to modern elections.

10/27/2024 article 10 min. read
Continued Intense Scanning From One IP in Lithuania
Featured Series
Sensor Intel Series
Continued Intense Scanning From One IP in Lithuania
Plus a few interesting changes in the CVEs we track, and some notes on just what kinds of malware stagers we see.
10/21/2024 article 5 min. read
2024 DDoS Attack Trends
Report
DDoS
2024 DDoS Attack Trends
Unveiling the rise of Hacktivism in a tense global climate.
07/16/2024 report 30 min. read

All F5 Labs Content

No filters selected
BlackGuard is designed to steal account credentials, cryptocurrency wallet information, session cookies, messaging history, browsing history, and screenshots.

-Aditya Sood

Threat Reports

In-depth research, analysis, and actionable insights
2024 DDoS Attack Trends
DDoS
2024 DDoS Attack Trends
07/16/2024 report 30 min. read
2023 Identity Threat Report: The Unpatchables
Top Risks
2023 Identity Threat Report: The Unpatchables
11/01/2023 report 80 min. read
The Evolving CVE Landscape
Top Risks
The Evolving CVE Landscape
02/28/2023 report 40 min. read

Vulnerability Trends

A by-the-numbers breakdown from the latest threat intelligence
Sensor Intel Series: September 2024

Hundreds of apps will be attacked by the time you read this.

So, we get to work. We obsess over effective attack methods. We monitor the growth of IoT and its evolving threats. We dive deep into the latest crypto-mining campaigns. We analyze banking Trojan targets. We dissect exploits. We hunt for the latest malware. And then our team of experts share it all with you. For more than 20 years, F5 has been leading the app delivery space. With our experience, we are passionate about educating the security community—providing the intel you need to stay informed so your apps can stay safe.

Every

9 hrs
a critical vulnerability—with the potential for remote code execution—is released.