Ransomware now includes data leakage, stealth, attack delay, anti-security, and ransomware as a service. CI Security’s John-Luke Peck shares his thoughts.
Healthcare dramatically adjusted due to the COVID-19 pandemic. But parents around the world are much more concerned with education. F5 Labs' Preston Hogue writes for SecurityWeek, describing how the traditional classroom was turned on its head in a matter of weeks, and which of those changes will be...
Hackers are increasingly turning to data manipulation to accomplish their goals - accessing your data and compromising integrity. F5 Labs' Shahnawaz Backer writes for Businessworld, describing some of the common scenarios and controls to protect yourself.
F5 Labs summer intern describes her experiences building a Python-based HTTPS scanning library for security research and release as an open source tool.
As cybercriminals continue trying to break into applications using legitimate channels, digital identity is a growing target. Learn what digital identity is and the attack methods fraudsters employ at every stage of the identity life cycle.
As organizations make more of their APIs publicly available, it’s important they understand the potential risks of data exposure and establish best practices for securing all APIs.
COVID-19 has changed our business operation models, and attackers have been adapting quickly. Shape's Dan Woods writes for ITProPortal, describing the emerging trends and how different industries need to adapt.