Resource Center
Welcome to our cybersecurity resource center where we uncover how malicious actors exploit weaknesses in systems, while going beyond the technical aspects and examining real-world perspectives across various industries.
Filters
Showing 367–372 of 473 results
Threat actors reportedly exploiting critical vulnerability in F5 BIG-IP devices
SC Media: 05/9/22 This latest news followed reports over the weekend by the Horizon3 Attack Team and Positive Technologies’ PT Swarm that they had created working exploits and urged security teams to immediately patch the critical vulnerability, which has a 9.8 severity rating. Read the entire article here
Read More BIG-IP: Proof-of-concept released for RCE vulnerability in F5 network management tool
The Daily Swig: 05/9/22 Disclosed last week, the bug affects multiple versions of the network management software, which is said to be used by more than 35,000 companies. Read the entire article here
Read More Exploits Created for Critical Flaw in F5 Networks’ BIG-IP
Bank Info Security: 05/9/22 The vulnerability, which affects iControl REST authentication, has a CVSS score of 9.8 out of 10 and is ranked highly critical. It is a remote command execution flaw in the BIG-IP network traffic security management appliance. Read the entire article here
Read More Corporate M&A Under Attack by Cyber Espionage Gang That Enters via Unsecured IoT Devices, Quietly Monitors Emails
CPO Magazine: 05/9/22 UNC3524 and other threat actors are adapting their tactics as enterprises improve detections for past actions such as moving off Windows hosts, which are highly monitored, and ensuring network traffic to compromise email services originate from the internal network. Read the entire article here
Read More Exploits created for critical F5 BIG-IP flaw, install patch immediately
Bleeping Computer: 05/8/22 Security researchers are warning F5 BIG-IP admins to immediately install the latest security updates after creating exploits for a recently disclosed critical CVE-2022-1388 remote code execution vulnerability. Read the entire article here
Read More F5, Cisco admins: Stop what you’re doing and check if you need to install these patches
The Register: 05/6/22 Experts at Horizon3.ai wrote that the vulnerability “is trivial to exploit. We spent some time chasing unrelate diffs within the newest version, but [exploit developer James Horseman] ultimately got first blood.” Read the entire article here
Read More