article thumbnail

Researchers show techniques for malware persistence on F5 and Citrix load balancers

Network World

Tests show that deploying malware in a persistent manner on load balancer firmware is within reach of less sophisticated attackers.

article thumbnail

Technology Short Take 176

Scott Lowe

Networking Lee Briggs (formerly of Pulumi, now with Tailscale) shows how to use the Tailscale Operator to create “free” Kubernetes load balancers (“free” as in no additional charge above and beyond what it would normally cost to operate a Kubernetes cluster). Think Linux doesn’t have malware?

Linux 112
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

The Hacker Mind Podcast: Shall We Play A Game?

ForAllSecure

Hammond: I grew up, kind of like any kid like oh I want to make video games or oh I want to be a hacker, and they'll go online and kind of Google and research that sort of thing. Vamosi: Today, John has taken his juvenile curiosity in breaking things down to become a security researcher with Huntress Labs.

article thumbnail

The Hacker Mind Podcast: Shall We Play A Game?

ForAllSecure

Hammond: I grew up, kind of like any kid like oh I want to make video games or oh I want to be a hacker, and they'll go online and kind of Google and research that sort of thing. Vamosi: Today, John has taken his juvenile curiosity in breaking things down to become a security researcher with Huntress Labs.