Full extent of attacks unknown but telecoms thought to be especially exposed
Vulnerabilities in F5’s BIG-IP suite are already being exploited after proof of concept (PoC) code began circulating online.…
This article has been indexed from The Register – Security
Read the original article: