{"version":"https://jsonfeed.org/version/1","title":"F5 Labs Threat Research","home_page_url":"https://f5labs.fireside.fm","feed_url":"https://f5labs.fireside.fm/json","description":"In this companion podcast, the 2019 F5 Labs Application Protection Report researchers examine how both apps and threats are changing, and what security practitioners can do to stay ahead of these changes.","_fireside":{"subtitle":"2019 Application Protection Report","pubdate":"2019-10-25T14:00:00.000-04:00","explicit":false,"owner":"Swante Bleakley","image":"https://assets.fireside.fm/file/fireside-images/podcasts/images/7/79c31137-4330-45ea-be15-e60d2b419ed1/cover.jpg?v=1"},"items":[{"id":"607d1b87-d062-48d8-a547-40a64a490f71","title":"Season 2: Episode 4 - API Attacks and New Architectures","url":"https://f5labs.fireside.fm/s2e4","content_text":"In the fourth and final episode for 2019, Sara, Ray, and Sander talk about attacks against application programming interfaces (APIs), and how they’ve spiked in the last two years. As with the formjacking attacks discussed in Episode Two, API attacks have become more common because of changes in how organizations design and run applications. The team explains the different kinds of API breaches they’ve seen, what organizations can do to protect their APIs, and make a few predictions about how the security world will adapt to these new risks","content_html":"

In the fourth and final episode for 2019, Sara, Ray, and Sander talk about attacks against application programming interfaces (APIs), and how they’ve spiked in the last two years. As with the formjacking attacks discussed in Episode Two, API attacks have become more common because of changes in how organizations design and run applications. The team explains the different kinds of API breaches they’ve seen, what organizations can do to protect their APIs, and make a few predictions about how the security world will adapt to these new risks

","summary":"","date_published":"2019-10-25T14:00:00.000-04:00","attachments":[{"url":"https://aphid.fireside.fm/d/1437767933/79c31137-4330-45ea-be15-e60d2b419ed1/607d1b87-d062-48d8-a547-40a64a490f71.mp3","mime_type":"audio/mp3","size_in_bytes":66246447,"duration_in_seconds":1656}]},{"id":"1faffac3-1581-45d3-8e55-e5954fbfd8a8","title":"Season 2: Episode 3 - Access Attacks Take Top Spot","url":"https://f5labs.fireside.fm/s2e3","content_text":"The Labs team drills down into the topic of access tier attacks, which were the single most successful attack type in the past year, according to public breach reports. These attacks, which include techniques like phishing, credential stuffing, and brute force attacks, made up a huge proportion of the successful attacks that organizations disclosed. The team explores why these attacks are so successful, what defenders can do to prevent them, and what their ongoing prevalence means for the Internet and its users. ","content_html":"

The Labs team drills down into the topic of access tier attacks, which were the single most successful attack type in the past year, according to public breach reports. These attacks, which include techniques like phishing, credential stuffing, and brute force attacks, made up a huge proportion of the successful attacks that organizations disclosed. The team explores why these attacks are so successful, what defenders can do to prevent them, and what their ongoing prevalence means for the Internet and its users.

","summary":"","date_published":"2019-10-17T16:00:00.000-04:00","attachments":[{"url":"https://aphid.fireside.fm/d/1437767933/79c31137-4330-45ea-be15-e60d2b419ed1/1faffac3-1581-45d3-8e55-e5954fbfd8a8.mp3","mime_type":"audio/mp3","size_in_bytes":84726512,"duration_in_seconds":2118}]},{"id":"c2716c21-0a9d-4fd8-afb1-fe486f5efb1e","title":"Season 1: Episode 3 - Application Protection—Mitigating Risk at the Access Tier","url":"https://f5labs.fireside.fm/s1e3","content_text":"What makes an app, really? Is application security, as we’ve known it, keeping pace with today’s threats? F5 Labs security experts spent a year researching the composition of an app, the increasingly essential role they play in today’s digital world, to better answer these questions. Join threat researchers Sara Boddy and Ray Pompon as they explore these questions and more, sharing their findings from the 2018 Application Protection Report. In this episode, they’ll take a critical look at threats against the Access Tier. This includes one of the most prevalent app client vulnerabilities, cross-site scripting (XSS). They’ll also explore account access hijacking and how you can put the proper security provisions in place to minimize your risk.","content_html":"

What makes an app, really? Is application security, as we’ve known it, keeping pace with today’s threats? F5 Labs security experts spent a year researching the composition of an app, the increasingly essential role they play in today’s digital world, to better answer these questions. Join threat researchers Sara Boddy and Ray Pompon as they explore these questions and more, sharing their findings from the 2018 Application Protection Report. In this episode, they’ll take a critical look at threats against the Access Tier. This includes one of the most prevalent app client vulnerabilities, cross-site scripting (XSS). They’ll also explore account access hijacking and how you can put the proper security provisions in place to minimize your risk.

","summary":"","date_published":"2019-10-15T14:00:00.000-04:00","attachments":[{"url":"https://aphid.fireside.fm/d/1437767933/79c31137-4330-45ea-be15-e60d2b419ed1/c2716c21-0a9d-4fd8-afb1-fe486f5efb1e.mp3","mime_type":"audio/mp3","size_in_bytes":41769341,"duration_in_seconds":1044}]},{"id":"65205c76-38ab-4a9c-8b31-8580a5f2a898","title":"Season 1: Episode 2 - Application Protection—Mitigating Risk at the App Services Tier","url":"https://f5labs.fireside.fm/s1e2","content_text":"What makes an app, really? Is application security, as we’ve known it, keeping pace with today’s threats? F5 Labs security experts spent a year researching the composition of an app, the increasingly essential role they play in today’s digital world, to better answer these questions. Join threat researchers Sara Boddy and Ray Pompon as they explore these questions and more, sharing their findings from the 2018 Application Protection Report. In this episode, they’ll take a critical look at threats against the App Services Tier—including injection attacks against app services—and how you can find, patch, and block these vulnerabilities.","content_html":"

What makes an app, really? Is application security, as we’ve known it, keeping pace with today’s threats? F5 Labs security experts spent a year researching the composition of an app, the increasingly essential role they play in today’s digital world, to better answer these questions. Join threat researchers Sara Boddy and Ray Pompon as they explore these questions and more, sharing their findings from the 2018 Application Protection Report. In this episode, they’ll take a critical look at threats against the App Services Tier—including injection attacks against app services—and how you can find, patch, and block these vulnerabilities.

","summary":"","date_published":"2019-10-15T14:00:00.000-04:00","attachments":[{"url":"https://aphid.fireside.fm/d/1437767933/79c31137-4330-45ea-be15-e60d2b419ed1/65205c76-38ab-4a9c-8b31-8580a5f2a898.mp3","mime_type":"audio/mp3","size_in_bytes":45389501,"duration_in_seconds":1134}]},{"id":"7a8f4c2c-690c-4458-9ca9-027d5490a811","title":"Season 1: Episode 4 - Application Protection—Mitigating DDoS Attacks","url":"https://f5labs.fireside.fm/s1e4","content_text":"What makes an app, really? Is application security, as we’ve known it, keeping pace with today’s threats? F5 Labs security experts spent a year researching the composition of an app, the increasingly essential role they play in today’s digital world, to better answer these questions. Join threat researchers Sara Boddy and Ray Pompon as they explore these questions and more, sharing their findings from the 2018 Application Protection Report. This episode will take a critical look at DDoS attacks which can strike any component of the app—from the network layer to app infrastructure components such as TLS—and how to get a strong DDoS protection strategy in place.","content_html":"

What makes an app, really? Is application security, as we’ve known it, keeping pace with today’s threats? F5 Labs security experts spent a year researching the composition of an app, the increasingly essential role they play in today’s digital world, to better answer these questions. Join threat researchers Sara Boddy and Ray Pompon as they explore these questions and more, sharing their findings from the 2018 Application Protection Report. This episode will take a critical look at DDoS attacks which can strike any component of the app—from the network layer to app infrastructure components such as TLS—and how to get a strong DDoS protection strategy in place.

","summary":"","date_published":"2019-10-15T14:00:00.000-04:00","attachments":[{"url":"https://aphid.fireside.fm/d/1437767933/79c31137-4330-45ea-be15-e60d2b419ed1/7a8f4c2c-690c-4458-9ca9-027d5490a811.mp3","mime_type":"audio/mp3","size_in_bytes":47369981,"duration_in_seconds":1184}]},{"id":"40ae12bf-b199-4d9c-bb7a-f11819f65220","title":"Season 1: Episode1 - Application Protection","url":"https://f5labs.fireside.fm/s1e1","content_text":"F5 Labs security experts spent a year researching the increasingly essential role of applications with one question in mind: If organizations don’t understand all the ways attackers can compromise their applications and exploit their data, how can they possibly defend their most critical assets? Join threat researchers Sara Boddy and Ray Pompon in this four-part series where they’ll share their findings from the 2018 Application Protection Report —some alarming, and others not so surprising at all—to help you prioritize what you should focus on to reduce your risk.","content_html":"

F5 Labs security experts spent a year researching the increasingly essential role of applications with one question in mind: If organizations don’t understand all the ways attackers can compromise their applications and exploit their data, how can they possibly defend their most critical assets? Join threat researchers Sara Boddy and Ray Pompon in this four-part series where they’ll share their findings from the 2018 Application Protection Report —some alarming, and others not so surprising at all—to help you prioritize what you should focus on to reduce your risk.

","summary":"Reducing your risk in today’s threat landscape","date_published":"2019-10-15T12:00:00.000-04:00","attachments":[{"url":"https://aphid.fireside.fm/d/1437767933/79c31137-4330-45ea-be15-e60d2b419ed1/40ae12bf-b199-4d9c-bb7a-f11819f65220.mp3","mime_type":"audio/mp3","size_in_bytes":36479384,"duration_in_seconds":911}]},{"id":"e5b5e900-3755-4acc-8c4d-9b48ed6833ca","title":"Season 2: Episode 2 - Injection, Evolved","url":"https://f5labs.fireside.fm/s2e2","content_text":"The Labs team dives into the subject of injection—one of the most prevalent and successful attack techniques featured in the breach notifications. Injection techniques have been around for a long time, and constituted a major finding in the 2018 report, but they’re evolving to target different vulnerabilities because of the way that web applications are being built. As a result, a new injection technique known as formjacking has surpassed SQL injection as the most common manifestation. Ray and Sander discuss what this means for preventing, detecting, and defending against web application attacks in 2019 and onward, and make some predictions about the future of web app architecture. ","content_html":"

The Labs team dives into the subject of injection—one of the most prevalent and successful attack techniques featured in the breach notifications. Injection techniques have been around for a long time, and constituted a major finding in the 2018 report, but they’re evolving to target different vulnerabilities because of the way that web applications are being built. As a result, a new injection technique known as formjacking has surpassed SQL injection as the most common manifestation. Ray and Sander discuss what this means for preventing, detecting, and defending against web application attacks in 2019 and onward, and make some predictions about the future of web app architecture.

","summary":"The F5 Application Protection Report podcast returns for 2019! Last year, F5 Labs researchers examined the entire landscape of threats facing applications, and offered guidance on how to protect them. This year, they followed up with another research series that examined how both apps and threats are changing, and what security practitioners can do to stay ahead of these changes. In this podcast, host and Director of F5 Labs, Sara Boddy, will be interviewing the two researchers behind the series, Ray Pompon and Sander Vinberg, to talk about their approach, methods and findings","date_published":"2019-10-14T17:00:00.000-04:00","attachments":[{"url":"https://aphid.fireside.fm/d/1437767933/79c31137-4330-45ea-be15-e60d2b419ed1/e5b5e900-3755-4acc-8c4d-9b48ed6833ca.mp3","mime_type":"audio/mp3","size_in_bytes":48566773,"duration_in_seconds":1214}]},{"id":"175515b7-bf99-488a-84e9-12fb61c7ac26","title":"Season 2: Episode 1 - Methods, Easy Targets, and Breach Data","url":"https://f5labs.fireside.fm/s2e1","content_text":"Sara begins by unpacking what’s changed in this year’s research, covering changes in personnel, data sources, and research scope. The team then turns to the first significant finding of the new research series: the discovery of widespread, unsophisticated reconnaissance campaigns targeting PHP. While systems running PHP were a major target last year as well, the proportion of opportunistic traffic looking for old, unprotected PHP vulnerabilities was even higher this year. After that they dive into one of their major data sources, the breach notifications published by individual U.S. states. One of the findings from the breach disclosures was a strong relationship between victims’ industries and the attack methods. Ray, Sara, and Sander look at why that is, and what it means for defenders.","content_html":"

Sara begins by unpacking what’s changed in this year’s research, covering changes in personnel, data sources, and research scope. The team then turns to the first significant finding of the new research series: the discovery of widespread, unsophisticated reconnaissance campaigns targeting PHP. While systems running PHP were a major target last year as well, the proportion of opportunistic traffic looking for old, unprotected PHP vulnerabilities was even higher this year. After that they dive into one of their major data sources, the breach notifications published by individual U.S. states. One of the findings from the breach disclosures was a strong relationship between victims’ industries and the attack methods. Ray, Sara, and Sander look at why that is, and what it means for defenders.

","summary":"The F5 Application Protection Report podcast returns for 2019! Last year, F5 Labs researchers examined the entire landscape of threats facing applications, and offered guidance on how to protect them. This year, they followed up with another research series that examined how both apps and threats are changing, and what security practitioners can do to stay ahead of these changes. In this podcast, host and Director of F5 Labs, Sara Boddy, will be interviewing the two researchers behind the series, Ray Pompon and Sander Vinberg, to talk about their approach, methods and findings. ","date_published":"2019-10-14T16:00:00.000-04:00","attachments":[{"url":"https://aphid.fireside.fm/d/1437767933/79c31137-4330-45ea-be15-e60d2b419ed1/175515b7-bf99-488a-84e9-12fb61c7ac26.mp3","mime_type":"audio/mp3","size_in_bytes":51606382,"duration_in_seconds":1290}]}]}