CISA exec blames hackers, Democrats for network risk
Exploitable vulnerabilities in F5 BIG-IP devices create imminent risk of lateral access and full compromise of US federal networks; urgent patches and inventories are required.
Breach of F5 requires "emergency action" from BIG-IP users, feds warn
A nation-state hacking group breached F5, stole BIG-IP build systems, source code, and customer configurations, creating imminent supply-chain exploitation risk for thousands of networks.
Fake military IDs, bogus resumes: How North Korean and Chinese hackers use AI tools to infiltrate companies and other targets
North Korean and Chinese hackers use AI tools like ChatGPT and Claude to create fake IDs, résumés, and phishing materials to enable espionage and unauthorized access.