Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

F5 Breach Exposes BIG-IP Source Code — Nation-State Hackers Behind Massive Intrusion

Posted on October 15, 2025October 15, 2025 By CWS

Oct 15, 2025Ravie LakshmananVulnerability / Risk Intelligence
U.S. cybersecurity firm F5 on Wednesday disclosed that unidentified risk actors broke into its techniques and stole recordsdata containing a few of BIG-IP’s supply code and data associated to undisclosed vulnerabilities within the product.
It attributed the exercise to a “extremely subtle nation-state risk actor,” including the adversary maintained long-term, persistent entry to its community. The corporate mentioned it realized of the breach on August 9, 2025, per a Kind 8-Okay submitting with the U.S. Securities and Change Fee (SEC).
“We now have taken intensive actions to include the risk actor,” it famous. “Since starting these actions, we now have not seen any new unauthorized exercise, and we imagine our containment efforts have been profitable.”

F5 didn’t say for a way lengthy the risk actors had entry to its BIG-IP product improvement surroundings, however emphasised that it has not noticed any indication that the vulnerabilities have been exploited in a malicious context. It additionally mentioned that the attackers didn’t entry its CRM, monetary, assist case administration, or iHealth techniques.
That mentioned, the corporate acknowledged that a number of the exfiltrated recordsdata from its information administration platform contained configuration or implementation data for a small share of consumers. Impacted clients are anticipated to be instantly notified following a overview of the recordsdata.
Following the invention of the incident, F5 has engaged the companies of Google Mandiant and CrowdStrike, in addition to rotated credentials and strengthened entry controls, deployed tooling to higher monitor threats, bolstered its product improvement surroundings with additional safety controls, and carried out enhancements to its community safety structure.
Customers are suggested to use the newest updates for BIG-IP, F5OS, BIG-IP Subsequent for Kubernetes, BIG-IQ, and APM purchasers as quickly as potential for optimum safety.

The Hacker News Tags:BIGIP, Breach, Code, Exposes, Hackers, Intrusion, Massive, NationState, Source

Post navigation

Previous Post: Hackers Registered 13,000+ Unique Domains and Leverages Cloudflare to Launch Clickfix Attacks
Next Post: SecurityWeek to Host 2025 ICS Cybersecurity Conference October 27-30 in Atlanta

Related Posts

Two Chrome Extensions Caught Secretly Stealing Credentials from Over 170 Sites The Hacker News
Privacy in the Age of Agentic AI The Hacker News
North Korean Hackers Deploy 197 npm Packages to Spread Updated OtterCookie Malware The Hacker News
Hackers Exploit Pandoc CVE-2025-51591 to Target AWS IMDS and Steal EC2 IAM Credentials The Hacker News
The MSP Cybersecurity Readiness Guide: Turning Security into Growth The Hacker News
Four Threat Clusters Using CastleLoader as GrayBravo Expands Its Malware Service Infrastructure The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Microsoft January 2026 Security Update Causes Credential Prompt Failures in Remote Desktop Connections
  • Mandiant Releases Rainbow Tables Enabling NTLMv1 Admin Password Hacking
  • Black Basta Ransomware Leader Added to EU Most Wanted and INTERPOL Red Notice
  • Let’s Encrypt has made 6-day IP-based TLS certificates Generally Available
  • Python-powered Toolkit for Information Gathering and reconnaissance

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Microsoft January 2026 Security Update Causes Credential Prompt Failures in Remote Desktop Connections
  • Mandiant Releases Rainbow Tables Enabling NTLMv1 Admin Password Hacking
  • Black Basta Ransomware Leader Added to EU Most Wanted and INTERPOL Red Notice
  • Let’s Encrypt has made 6-day IP-based TLS certificates Generally Available
  • Python-powered Toolkit for Information Gathering and reconnaissance

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark