Researchers show techniques for malware persistence on F5 and Citrix load balancers
Network World
NOVEMBER 9, 2022
Tests show that deploying malware in a persistent manner on load balancer firmware is within reach of less sophisticated attackers.
Network World
NOVEMBER 9, 2022
Tests show that deploying malware in a persistent manner on load balancer firmware is within reach of less sophisticated attackers.
Scott Lowe
MARCH 15, 2024
Networking Lee Briggs (formerly of Pulumi, now with Tailscale) shows how to use the Tailscale Operator to create “free” Kubernetes load balancers (“free” as in no additional charge above and beyond what it would normally cost to operate a Kubernetes cluster). Think Linux doesn’t have malware?
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
ForAllSecure
JANUARY 27, 2021
Hammond: I grew up, kind of like any kid like oh I want to make video games or oh I want to be a hacker, and they'll go online and kind of Google and research that sort of thing. Vamosi: Today, John has taken his juvenile curiosity in breaking things down to become a security researcher with Huntress Labs.
ForAllSecure
JANUARY 27, 2021
Hammond: I grew up, kind of like any kid like oh I want to make video games or oh I want to be a hacker, and they'll go online and kind of Google and research that sort of thing. Vamosi: Today, John has taken his juvenile curiosity in breaking things down to become a security researcher with Huntress Labs.
Let's personalize your content