Critical vulnerability in F5 BIG-IP under active exploitation
Full extent of attacks unknown but telecoms thought to be especially exposed Vulnerabilities in F5's BIG-IP suite are already being exploited after proof of concept (PoC) code began circulating online.... [...]