Swante Bleakley public
[search 0]
Download the App!
show episodes
 
Artwork
 
In this companion podcast, the 2019 F5 Labs Application Protection Report researchers examine how both apps and threats are changing, and what security practitioners can do to stay ahead of these changes.
  continue reading
 
Loading …
show series
 
In the fourth and final episode for 2019, Sara, Ray, and Sander talk about attacks against application programming interfaces (APIs), and how they’ve spiked in the last two years. As with the formjacking attacks discussed in Episode Two, API attacks have become more common because of changes in how organizations design and run applications. The tea…
  continue reading
 
The Labs team drills down into the topic of access tier attacks, which were the single most successful attack type in the past year, according to public breach reports. These attacks, which include techniques like phishing, credential stuffing, and brute force attacks, made up a huge proportion of the successful attacks that organizations disclosed…
  continue reading
 
What makes an app, really? Is application security, as we’ve known it, keeping pace with today’s threats? F5 Labs security experts spent a year researching the composition of an app, the increasingly essential role they play in today’s digital world, to better answer these questions. Join threat researchers Sara Boddy and Ray Pompon as they explore…
  continue reading
 
What makes an app, really? Is application security, as we’ve known it, keeping pace with today’s threats? F5 Labs security experts spent a year researching the composition of an app, the increasingly essential role they play in today’s digital world, to better answer these questions. Join threat researchers Sara Boddy and Ray Pompon as they explore…
  continue reading
 
What makes an app, really? Is application security, as we’ve known it, keeping pace with today’s threats? F5 Labs security experts spent a year researching the composition of an app, the increasingly essential role they play in today’s digital world, to better answer these questions. Join threat researchers Sara Boddy and Ray Pompon as they explore…
  continue reading
 
F5 Labs security experts spent a year researching the increasingly essential role of applications with one question in mind: If organizations don’t understand all the ways attackers can compromise their applications and exploit their data, how can they possibly defend their most critical assets? Join threat researchers Sara Boddy and Ray Pompon in …
  continue reading
 
The Labs team dives into the subject of injection—one of the most prevalent and successful attack techniques featured in the breach notifications. Injection techniques have been around for a long time, and constituted a major finding in the 2018 report, but they’re evolving to target different vulnerabilities because of the way that web application…
  continue reading
 
Sara begins by unpacking what’s changed in this year’s research, covering changes in personnel, data sources, and research scope. The team then turns to the first significant finding of the new research series: the discovery of widespread, unsophisticated reconnaissance campaigns targeting PHP. While systems running PHP were a major target last yea…
  continue reading
 
Loading …

Quick Reference Guide