Compromised F5 BIG-IP appliances abused in three-year infiltration
A state-sponsored attacker used compromised F5 load balancers to gain persistence on a target's network.
2 minutes
AI is automating malware faster than security can adapt.
Get the facts Read the 2026 State of Malware