A critical vulnerability in F5’s BIG-IP Access Policy Manager (APM) is being exploited in the wild. The bug, allocated CVE-2025-53521, gives a remote attacker unauthenticated remote code execution (pre-auth RCE) powers. IOCs published by F5 today point to sophisticated attacks in which the threat group is disabling the SELinux
Read the full storyThe Stack
Interviews, insight, intelligence, and exclusive events for digital leaders.
All the latest
All the latest
"Cache misses have this weird massive non-linear effect into how much work the GPUs are doing, because we suddenly need to start recomputing all this stuff."
"We're taking on one piece of the network step-by-step. eBPF is making a lot of things possible and with cloud native, all aspects of the network and of connectivity have an opportunity to be redone better."
"We are actively investigating the incident and coordinating with law enforcement and regulatory authorities.”
Executives are getting more worried about the risk of being too dependent on one cloud. But the dominance of the cloud giants makes it hard to avoid.
SolarWinds’ poor controls... false and misleading statements and omissions, and the other misconduct... would have violated the federal securities laws even if SolarWinds had not experienced a major, targeted cybersecurity attack"
"I've very rarely seen so much industry traction on a big platform shift like this"