Today: F5's disclosure that hackers had "long term" access to its systems is just the latest sign that the federal government is focused on the wrong problems, Salesforce does damage control on behalf of its CEO, and the latest enterprise moves.| Runtime
In mid-October 2025, the cybersecurity landscape was dealt a severe blow. F5 disclosed a long-term, sophisticated breach by a nation-state threat actor. This was not a typical vulnerability disclosure. The attackers exfiltrated a strategic critical pair of assets: portions of BIG-IP source code, and internal details of undisclosed (unpatched) vulnerabilities. The U.S. Cybersecurity and Infrastructure […]| Qualys Security Blog
F5 has announced its intent to acquire enterprise AI security company CalypsoAI, whose award-winning platform brings real-time threat defense, red teaming at scale, and data security to enterprises racing to deploy generative and agentic AI.| ITOps Times
Summary: BIG-IP from F5 does not seem to honor the “Expect: 100-Continue” header by default, and changes must be made on the F5 appliance. Recently, an network application, which have worked since 2017, stopped working. The application is straigh forward enough. It checks if a service is working by doing (mainly) two things: After a … Continue reading →| From thoughts to text
Published on| offsec.almond.consulting
Published on| offsec.almond.consulting
Published on| offsec.almond.consulting