News

Latest news about B2B cyber security >>> PR agencies: add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

Errors in the DNS configuration lead to failures
F5 news

Most corporate DNS problems arise from misconfiguration. Roman Borovits, Senior Systems Engineer DACH at F5, describes the most common errors and simple protective measures for the DNS. The Domain Name System (DNS) is one of the most important protocols on the Internet. It is often boldly referred to as the “Internet phone book”. In fact, DNS is a decentralized directory with which individual host names such as “www.f5.com” are translated into an IP address such as “18.66.122.15”. Small mistake - big effect So it is clear: If there is a problem with the service, find ...

Read more

10 tips to ward off ransomware

According to F2021 Labs' Application Protection Report 5, ransomware is one of the biggest threats to data security. Here are 10 tips for companies on which current security measures they should implement. By Roman Borovits, Senior Systems Engineer DACH F5. 1. Multifactor authentication Conventional passwords are no longer sufficient: Multifactor authentication (MFA) should be required to access all systems with important data. If MFA cannot be set up everywhere, it should be used with all administrative accounts first. Remote access has the next priority. Then MFA for e-mails has to be introduced, whereby most of the ...

Read more

Now we start with 5G and the security priorities 
F5 news

Around half of the mobile network operators are already installing their own 5G network or are planning to do so in concrete terms and are also setting security priorities. This is shown by a worldwide IDG survey of service providers on behalf of F5. Currently, almost no provider has a dedicated 5G core network. Such standalone networks are likely to spring up like mushrooms: 18 percent of the network operators surveyed installed a 2020G standalone core at the end of 5, and a further 29 percent want to follow soon. Of the European participants, 21 percent are working on a 5G standalone core, and a further 21 percent are in the planning phase. Europe is not far behind Asia, ...

Read more

Cloud service fails - websites cannot be reached
F5 news

“On June 08.06.2021th, 5, many websites will no longer work or will only work with a delay. According to media reports, some large providers are affected. The reason for this is said to be a failure at the cloud service provider Fastly. A statement from David Warburton, Principal Threat Research Evangelist at F40 Labs, on the current global Internet issues. The failure highlights a thoroughly unpleasant long-term development of the Internet, centralization to a few providers. However, it is not due to the Internet itself. Even after almost XNUMX years, it still proves how well it was designed. Because it has many layers for resilience...

Read more

Most frequent attacks: Denial of service and password login
F5 news

Most common attacks: Denial of Service (DoS) and password login. According to the new F5 study, financial services and many European companies are particularly hard hit. Denial-of-service (DoS) and password login attacks such as brute force and credential stuffing attacks are on the rise. This is shown by a new study by F5 Labs1. The analysis is based on incidents over the past three years that have been reported to the F5 Security Incident Response Team (SIRT). As a result, attacks on APIs (Application Programming Interface) are also increasing. DoS attacks are ubiquitous According to F5 Labs, almost one in three (32%) incidents reported annually was a DoS attack. The percentage increases slightly ...

Read more

iMFA: invisible multifactor authentication
B2B Cyber ​​Security ShortNews

Users often find passwords annoying, even though they can cause security gaps if used carelessly. A Google study has shown that not even 10 percent of users switch to the more secure variant of multi-factor authentication (MFA) because it seems too complex to them - and that after their account has already been hacked. In fact, any method of authentication is a balancing act between ease of use, security, and practicality. A solution that is supposed to replace passwords must be equally effective in all three points and better in at least one of them. One possible solution is invisible multi-factor authentication (invisible multifactor ...

Read more

F5 improves security of apps and APIs
F5 improves security of apps and APIs

F5 improves the security of apps and APIs for modern digital offerings. The new SaaS products ensure the security of applications: Device ID and Shape Recognize use unique data and analysis functions that eliminate login problems and at the same time protect against fraud. The new offers also strengthen the technological leadership position of F5. The company combines multi-cloud security and deployment for applications with protection technologies against bots and fraud. This protects companies and people from current threats. APIs are always a target for hackers "APIs play an essential role in the reach of digital offerings for companies every ...

Read more

220% phishing attacks from COVID-19
F5 Phishing Fraud report

F5 Labs' Phishing and Fraud Report shows: COVID-19-related scams and increasingly sophisticated attacks are exacerbating global threats. Phishing attacks increase by 19 percent due to COVID-220. The COVID-19 pandemic continues to lead to significantly increased phishing and fraud attempts, as a current analysis by F5 Labs shows. According to the fourth edition of the Phishing and Fraud Report released today, phishing incidents rose 220 percent year-on-year at the height of the global pandemic. Based on the data from the Security Operations Center (SOC) from F5, the number of phishing incidents in 2020 will be ...

Read more

Q5: Solution protects websites from bots and credential stuffing
News B2B Cyber ​​Security

F5 protects websites with the new security solution Silverline Shape Defense from the increasing flood of fake Internet traffic. With this new, fully managed service, companies can protect themselves against bots, credential stuffing, scraping and other automated attacks that lead to fraud and abuse. This in turn prevents loss of efficiency, loss of revenue and brand damage. Silverline Shape Defense uses artificial intelligence to determine in real time exactly whether an application request is from a human or a bot. The solution also differentiates between a malicious actor and an authorized person. This approach stops malicious traffic without ...

Read more