home.social

#bigip — Public Fediverse posts

Live and recent posts from across the Fediverse tagged #bigip, aggregated by home.social.

  1. 📰 F5 BIG-IP Flaw Escalated to Critical 9.8 RCE, Now Under Active Attack

    🚨 CRITICAL: F5 reclassifies a BIG-IP flaw (CVE-2025-53521) to a 9.8 CVSS RCE, and it's being actively exploited! Unauthenticated attackers can gain root access. CISA added to KEV. Patch NOW! 🔥 #F5 #BIGIP #CVE #RCE #CyberSecurity

    🔗 cyber.netsecops.io/articles/cr

  2. 📰 F5 BIG-IP Flaw Escalated to Critical 9.8 RCE, Now Under Active Attack

    🚨 CRITICAL: F5 reclassifies a BIG-IP flaw (CVE-2025-53521) to a 9.8 CVSS RCE, and it's being actively exploited! Unauthenticated attackers can gain root access. CISA added to KEV. Patch NOW! 🔥 #F5 #BIGIP #CVE #RCE #CyberSecurity

    🔗 cyber.netsecops.io/articles/cr

  3. "F5 said, the hackers took control of the network segment the company uses to create and distribute updates for BIG IP, a line of server appliances that F5 says is used by 48 of the world’s top 50 corporations."

    schneier.com/blog/archives/202

    #BIGIP #CloudServices #LoadBalancing #F5

  4. #Breach of #F5 requires “emergency action” from BIG-IP users, feds warn

    Thousands of networks—many of them operated by the US government and Fortune 500 companies—face an “imminent threat” of being breached by a nation-state #hacking group following the breach of a major maker of software, the federal government warned Wednesday.
    #BIGIP #security

    arstechnica.com/security/2025/

  5. Why the F5 Hack Created an ‘Imminent Threat’ for Thousands of Networks wired.com/story/f5-hack-networ #Security/CyberattacksandHacks #BIGIP

  6. F5 Networks confirms a nation-state breach linked to China. BIG-IP development systems accessed for over a year; source code and vulnerabilities exfiltrated. Federal networks alerted.

    technadu.com/f5-cybersecurity-

    #CyberSecurity #F5 #SupplyChainAttack #BIGIP #ThreatIntel

  7. @beyondmachines1 before you patch your F5 stuff, extract all forensic information you can!

    For any F5 system you have, contact your vendor and press them to give you direct access and ways to gather evidence for yourself.

    Also collect any and all logs and other forensic evidence from devices directly reachable from any F5 stuff you have.

    These are hard earned lessons, people.

    Slow down before you speed up, or your containment and eradication phases will be insufficient or even useless.

    #ioc #cybersecurity #infosec #dfir #bigip #f5 #f5networks

  8. #F5 disclosed a #breach by #nationstate #hackers who stole undisclosed #BIGIP #securityvulnerabilities and #sourcecode. The breach, discovered on 9 August 2025, involved long-term access to F5’s systems, including its BIG-IP product development environment. While the stolen data includes source code and vulnerability information, F5 claims there’s no evidence of attackers exploiting these flaws or compromising its software supply chain. bleepingcomputer.com/news/secu #tech #media #news

  9. 🚨 Another cybersecurity giant breached. #F5 confirms a nation-state attack - hackers stole parts of BIG-IP source code, internal vulnerability data, and limited customer info.

    Read: hackread.com/f5-breach-source-

    #CyberSecurity #DataBreach #BIGIP #Hacking #Infosec #NationState

  10. Find out what Big IP doesn't want you to know

    #f5 #bigip #infosec

  11. I stood up a very simple F5 BIG-IP honeypot this week, and saw some familiar traffic hitting it. Thought it'd be fun to share some observations on what I'm seeing on our Labs blog :)

    labs.greynoise.io/grimoire/202

    @greynoise #honeypot #exploit #poc #f5 #bigip #metasploit

  12. Well it appears our #BigIP, our VPN client is down too which means our phone client is out also.

  13. Angreifer könnten Netzwerke mit F5-Produkten attackieren und sich unrechtmäßig Zugang verschaffen. Sicherheitsupdates schaffen Abhilfe.
    Root-Lücke in F5 BIG-IP Appliances geschlossen
  14. Wrote up a pair of #AttackerKB entries for the two vulnerabilities in #F5 #BigIP that we released today (largely the same as the blog, but more focus on technical and less on the story):

    attackerkb.com/topics/i21EbdNx

    attackerkb.com/topics/ZClTQn4a