Skip to main navigation
Skip to main content
Skip to footer
FOLLOW US
Twitter
Labs on Twitter
LinkedIn
Labs on LinkedIn
LATEST NEWS
RSS
Subscribe
F5 Sites
DevCentral
F5.com
Sign In
Sign In
My Account
My Profile
Sign Out
Sign Out
Threats
back
Threats
close
All Content
Research Series
Application Protection
reset focus
Learning Center
CISO
open search
close search
Search
reset focus
toggle navigation
Threats
back
Threats
close
All Content
Research Series
Application Protection
reset focus
Learning Center
CISO
FOLLOW US
Twitter
Labs on Twitter
LinkedIn
Labs on LinkedIn
LATEST NEWS
RSS
Subscribe
F5 Sites
DevCentral
F5.com
Sign In
Sign In
My Account
My Profile
Sign Out
Sign Out
reset focus
MFA Coming Soon
F5 Labs will soon be implementing MFA for our site sign-in.
Read more here.
close
Threats
All Content
Application Protection
Threat Reports
In-depth research, analysis, and actionable insights
2022 Application Protection Report
Ransomware
2022 Application Protection Report
Learn how the threat landscape evolved in 2021 so you can tune your defenses to suit.
02/15/2022
report
45 min. read
The Evolving CVE Landscape
Top Risks
The Evolving CVE Landscape
Plus, the 7 Weirdest CVEs (You won’t believe number 6!)
02/28/2023
report
40 min. read
2023 DDoS Attack Trends
Attack Campaign
2023 DDoS Attack Trends
We analyzed the last three years of DDoS data, and found attackers shifting to more complex approaches, and shifting up the stack.
02/21/2023
report
15 min. read
Load more stories
App Infrastructure Attacks
DDoS Attacks
Client-side Attacks
Web Application Attacks
App Infrastructure Attacks
Dictionary attacks
Eavesdropping
Protocol abuse
Key disclosure
DNS hijacking
DNS spoofing
PDoS
Man-in-the-middle
Certificate Spoofing
Password Spraying
Credential Stuffing
App layers compromised:
Load more stories
DDoS Attacks
DNS amplification
SSL-TLS renegotiation
SYN, UDP, and HTTP floods
Heavy URL
HTTP flood
DNS flood
SYN flood
Protocol Abuse
UDP flood
DNS reflection
App layers compromised:
Load more stories
Client-side Attacks
Client-platform malware
Cross-site scripting
Cross-site request forgery
Man-in-the-browser
Phishing
Session hijacking
Man in the middle
Injection
Credential Theft
App layers compromised:
Load more stories
Web Application Attacks
Credential theft
Credential stuffing
Brute force attack
Cross-site scripting
Man-in-the-middle
API Attacks
Protocol abuse
Injection
Cross-site request forgery
Phishing
Abuse of functionality
Malware
Remote Code Execution
App layers compromised:
Load more stories