Possible vulnerability in F5 BIG-IP LTM

Possible vulnerability in F5 BIG-IP LTM
About a year ago, while I was performing a web site penetration test for a customer, I run a manual fuzzing phase, where I like to “question” even the most basic networking and application conventions, and this time it paid off more than the usual… The site was behind a “F5 Networks” BIG-IP device, running ...

A thought about the essence of vulnerability

  I would like to offer slightly differently way of thinking about the concept of vulnerability. Vulnerability, in the context of information security, refers to one or more weaknesses, and following its exploitation, the probability of damaging data or information systems and/or processes. Vulnerability as a concept, originates from the human life, of human weakness ...