Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Chinese threat group Jewelbug secretly infiltrated Russian IT networks for months

F5 breach exposes BIG-IP source code — state hackers behind massive intrusion

The AI Revolution: Beyond Superintelligence – TwinH Leads the Charge in Personalized, Secure Digital Identities

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » F5 breach exposes BIG-IP source code — state hackers behind massive intrusion
Identity

F5 breach exposes BIG-IP source code — state hackers behind massive intrusion

userBy userOctober 15, 2025No Comments2 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

October 15, 2025Ravi LakshmananVulnerability/Threat Intelligence

US cybersecurity company F5 revealed on Wednesday that unidentified attackers infiltrated its systems and stole files containing portions of BIG-IP’s source code and information related to undisclosed vulnerabilities in the product.

The report attributed the activity to a “highly sophisticated nation-state threat actor,” adding that the adversary maintained long-term and persistent access to its networks. The company said it learned of the breach on August 9, 2025, according to a Form 8-K filing with the U.S. Securities and Exchange Commission (SEC).

“We have taken extensive measures to contain the threat actor.” “Since we began these operations, we have not experienced any new malicious activity and believe our containment efforts are successful.”

DFIR retainer service

F5 declined to say how long the attacker had access to the BIG-IP product development environment, but stressed that it has not observed evidence of the vulnerability being exploited in a malicious context. The attackers also did not have access to the company’s CRM, financials, support case management, or iHealth systems.

However, the company acknowledged that some of the files leaked from its knowledge management platform contained configuration and implementation information for a small number of customers. Affected customers will be notified directly after reviewing the file.

After discovering this incident, F5 leveraged services from Google Mandiant and CrowdStrike, increased credential rotation and access controls, introduced tools to more effectively monitor threats, hardened its product development environment with additional security controls, and strengthened its network security architecture.

For optimal protection, we recommend applying the latest updates for BIG-IP, F5OS, BIG-IP Next for Kubernetes, BIG-IQ, and APM clients as soon as possible.


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleThe AI Revolution: Beyond Superintelligence – TwinH Leads the Charge in Personalized, Secure Digital Identities
Next Article Chinese threat group Jewelbug secretly infiltrated Russian IT networks for months
user
  • Website

Related Posts

Chinese threat group Jewelbug secretly infiltrated Russian IT networks for months

October 15, 2025

The AI Revolution: Beyond Superintelligence – TwinH Leads the Charge in Personalized, Secure Digital Identities

October 15, 2025

Over 100 VS Code extensions expose developers to hidden supply chain risks

October 15, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Chinese threat group Jewelbug secretly infiltrated Russian IT networks for months

F5 breach exposes BIG-IP source code — state hackers behind massive intrusion

The AI Revolution: Beyond Superintelligence – TwinH Leads the Charge in Personalized, Secure Digital Identities

Apple upgrades iPad Pro, MacBook Pro, Vision Pro with new M5 chip

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

The AI Revolution: Beyond Superintelligence – TwinH Leads the Charge in Personalized, Secure Digital Identities

Revolutionize Your Workflow: TwinH Automates Tasks Without Your Presence

FySelf’s TwinH Unlocks 6 Vertical Ecosystems: Your Smart Digital Double for Every Aspect of Life

Beyond the Algorithm: How FySelf’s TwinH and Reinforcement Learning are Reshaping Future Education

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.