A critical vulnerability in F5’s BIG-IP Access Policy Manager (APM) is being exploited in the wild. The bug, allocated CVE-2025-53521, gives a remote attacker unauthenticated remote code execution (pre-auth RCE) powers. IOCs published by F5 today point to sophisticated attacks in which the threat group is disabling the SELinux
Read the full storyThe Stack
Interviews, insight, intelligence, and exclusive events for digital leaders.
All the latest
All the latest
If you are in the middle of a transformation exercise, how do you ensure data compatibility while you are switching systems?
Courier dispatched with a USB stick carrying trade settlement details after systems disrupted...
Incident follows record HTTP2 "Rapid Reset" attack warnings as well as CISA note on exploitation of Service Location Protocol vulnerability for DDoS purposes.
Former Chief Information Officer David Walker welcomes the new wave of flexible thinking and shares some advice on how to capitalise on this latest trend
“Our model targets the most common vulnerable coding patterns, including hardcoded credentials, SQL injections, and path injections" says "refounded" company.
More than just hot air: waste heat is a problem for data centres, and using it to warm up cold homes could be the answer.
How not to share a root cause analysis: Lessons from Australia's Optus and Canada's Rogers...