News

Latest news about B2B cyber security >>> PR agencies: add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

DDoS attacks are getting more violent - up to 1,4 TB per second
F5 news

An F5 study shows: Distributed Denial of Service (DDoS) attacks are becoming increasingly violent and complex. The largest attack used 1,4 TB/s. Combined attacks are also increasing. While the number of Distributed Denial of Service (DDoS) attacks has decreased slightly in 2021, they are becoming more violent and complex. Last year, for example, the record for the largest attack of all time was broken several times. That shows a new analysis by F5. Q4: average attack size over 21 GBit/s According to this, the total volume of DDoS attacks fell by 3 percent compared to the previous year. But in the fourth quarter of 2021, the average...

Read more

SaaS platform with Distributed Cloud Services
SaaS platform with Distributed Cloud Services

F5 has launched the new F5 Distributed Cloud Services. They offer security, multi-cloud networking and edge-based solutions on a unified Software-as-a-Service (SaaS) platform. F5 also presents the first new solution for the platform: F5 Distributed Cloud WAAP (Web Application and API Protection). It includes multiple security capabilities across F5 technologies in one SaaS offering. Enterprises are increasingly using complex application portfolios and multi-cloud implementations. For example, F2022's upcoming 5 State of Application Strategy Report shows that 88 percent of companies are running both legacy and modern application architectures. 70 percent also use multiple clouds. This…

Read more

Errors in the DNS configuration lead to failures
F5 news

Most corporate DNS problems arise from misconfiguration. Roman Borovits, Senior Systems Engineer DACH at F5, describes the most common errors and simple protective measures for the DNS. The Domain Name System (DNS) is one of the most important protocols on the Internet. It is often boldly referred to as the “Internet phone book”. In fact, DNS is a decentralized directory with which individual host names such as “www.f5.com” are translated into an IP address such as “18.66.122.15”. Small mistake - big effect So it is clear: If there is a problem with the service, find ...

Read more

Now we start with 5G and the security priorities 
F5 news

Around half of the mobile network operators are already installing their own 5G network or are planning to do so in concrete terms and are also setting security priorities. This is shown by a worldwide IDG survey of service providers on behalf of F5. Currently, almost no provider has a dedicated 5G core network. Such standalone networks are likely to spring up like mushrooms: 18 percent of the network operators surveyed installed a 2020G standalone core at the end of 5, and a further 29 percent want to follow soon. Of the European participants, 21 percent are working on a 5G standalone core, and a further 21 percent are in the planning phase. Europe is not far behind Asia, ...

Read more

DDoS attacks will continue to rise in 2021
DDoS attacks will continue to rise in 2021

An old friend will also become more and more dangerous in 2021: Distributed Denial of Service (DDoS). Corresponding attacks are increasing in both number and complexity. Roman Borovits, Senior Systems Engineer at F5, evaluates current data, according to which the incidents are becoming increasingly violent and complex. The number of DDoS attacks rose by 2020 percent from January 2021 to March 55. Most (54%) used multiple attack vectors. This is shown by current data collected by the F5 Silverline Security Operations Center (SOC) and the F5 Security Incident Response Team (SIRT). Different DDoS variants ...

Read more

Cloud service fails - websites cannot be reached
F5 news

“On June 08.06.2021th, 5, many websites will no longer work or will only work with a delay. According to media reports, some large providers are affected. The reason for this is said to be a failure at the cloud service provider Fastly. A statement from David Warburton, Principal Threat Research Evangelist at F40 Labs, on the current global Internet issues. The failure highlights a thoroughly unpleasant long-term development of the Internet, centralization to a few providers. However, it is not due to the Internet itself. Even after almost XNUMX years, it still proves how well it was designed. Because it has many layers for resilience...

Read more

Most frequent attacks: Denial of service and password login
F5 news

Most common attacks: Denial of Service (DoS) and password login. According to the new F5 study, financial services and many European companies are particularly hard hit. Denial-of-service (DoS) and password login attacks such as brute force and credential stuffing attacks are on the rise. This is shown by a new study by F5 Labs1. The analysis is based on incidents over the past three years that have been reported to the F5 Security Incident Response Team (SIRT). As a result, attacks on APIs (Application Programming Interface) are also increasing. DoS attacks are ubiquitous According to F5 Labs, almost one in three (32%) incidents reported annually was a DoS attack. The percentage increases slightly ...

Read more

iMFA: invisible multifactor authentication
B2B Cyber ​​Security ShortNews

Users often find passwords annoying, even though they can cause security gaps if used carelessly. A Google study has shown that not even 10 percent of users switch to the more secure variant of multi-factor authentication (MFA) because it seems too complex to them - and that after their account has already been hacked. In fact, any method of authentication is a balancing act between ease of use, security, and practicality. A solution that is supposed to replace passwords must be equally effective in all three points and better in at least one of them. One possible solution is invisible multi-factor authentication (invisible multifactor ...

Read more

F5 improves security of apps and APIs
F5 improves security of apps and APIs

F5 improves the security of apps and APIs for modern digital offerings. The new SaaS products ensure the security of applications: Device ID and Shape Recognize use unique data and analysis functions that eliminate login problems and at the same time protect against fraud. The new offers also strengthen the technological leadership position of F5. The company combines multi-cloud security and deployment for applications with protection technologies against bots and fraud. This protects companies and people from current threats. APIs are always a target for hackers "APIs play an essential role in the reach of digital offerings for companies every ...

Read more

Access data misuse doubles

F5 study: Incidents with login data doubled since 2016. Credential Stuffing Report extensively investigates credential abuse. The number of annual credential-related incidents nearly doubled from 2016 to 2020. This is shown by the current Credential Stuffing Report from F5. The largest study of its kind found a 46 percent decrease in the number of stolen credentials over the same period. The average amount of data fell from 63 million records in 2016 to 17 million last year. The mean size increased in 2020 (2 million records) to 234 percent compared to 2019 and was ...

Read more