Learn F5 Technologies, Get Answers & Share Community Solutions Join DevCentral

Filter by:
  • Solution
  • Technology
Clear all filters

Articles

Sort results

New BIG-IP ASM v13 WordPress v4.9 Ready Template

F5 has created a specialized ASM template to simplify the configuration process of WordPress v4.9 with the new version of BIG-IP 13.x Click here to access the .zip file that contains the template:  WordPress v4.9 ASM Template for BIG-IP... Read more
0 Reviews

New BIG-IP ASM v13 Drupal v8 Ready Template

ASM Ready Template update for Drupal v8 include Goal/Deployment steps Read more
0 Reviews

Remote Code Execution with Spring OAuth Extension (CVE-2018-1260)

Recently, a new Remote Code Execution vulnerability in Spring OAuth extension was published by Pivotal. The OAuth Protocol OAuth is a protocol that supports authorization processes by enabling users to share their data and resources stored on... Read more
0 Reviews

AppSec Made Easy: Credential Protection

Learn how to use the F5 Advanced Web Application Firewall to protect your credentials. Identities are the keys to our applications and criminals can steal them right from the browser. DataSafe protects the credentials at the most vulnerable point. Read more
1 Review

AppSec Made Easy: L7 Behavioral DoS

Learn how to use the F5 Advanced Web Application Firewall to easily implement Behavioral DoS protections for your application using dynamic signatures to reduce false positives and automate protection. Read more
0 Reviews

AppSec Made Easy: Anti-Bot for Mobile APIs

Learn how to use the F5 Advanced Web Application Firewall to easily lock down your applications so that bots can’t attack your mobile APIs. This video will show you the quick way to add anti-bot and other protections directly into your mobile app. Read more
Average Rating: 4.9
4 Reviews

AppSec Made Easy: Proactive Bot Defense

Learn how to use the F5 Advanced Web Application Firewall to easily protect your applications against bots. Bots can be used as tools for a variety of attacks such as DoS, credential stuffing and brute force, or web scraping. Read more
2 Reviews

Drupal Core Remote Code Execution (CVE-2018-7602)

A new critical Remote Code Execution vulnerability in Drupal core was published. This new vulnerability is similar to CVE-2018-7600, also known as “Drupalgeddon 2”. It was found that the sanitation function that was added to address the... Read more
0 Reviews

Getting In Shape For Summer With BIG-IP Per App Virtual Edition

What happens when you cross a developer with a fitness instructor? You get BIG-IP Per App VE. DevCentral discusses the new per-App instance of BIG-IP providing LTM and WAF functionality wherever your applications reside. Read more
1 Review

Directory Traversal with Spring MVC on Windows (CVE-2018-1271)

Recently a directory traversal vulnerability in the Spring Framework was published (CVE-2018-1271). The Spring application will only be vulnerable when it is deployed on a Microsoft Windows based operating system and the application developer uses... Read more
0 Reviews

Remote Code Execution with Spring Data Commons (CVE-2018-1273)

In the recent days another critical vulnerability in Spring Framework was published (CVE-2018-1273). This time the vulnerable component is Spring Data Commons. Spring Data component goal is to provide a common API for accessing NoSQL and... Read more
0 Reviews

Lightboard Lessons: What is a Web Application Firewall (WAF)?

Traditional network firewalls (Layer 3-4) do a great job preventing outsiders from accessing internal networks. But, these firewalls offer little to no support in the protection of application layer traffic... Read more
1 Review

Spring Framework Spring-Messaging Remote Code Execution (CVE-2018-1270 / CVE-2018-1275)

In the recent days a critical vulnerability in Spring framework was published. The vulnerable component is Spring-Messaging which is the Spring implementation of WebSockets, Spring-Messaging uses the STOMP messaging protocol as the subprotocol for... Read more
0 Reviews

Methods to attach ASM policy to virtual server via REST API requests

Understand different ways to attach ASM security policies to a BIG-IP virtual server with DevCentral. Read more
0 Reviews

Jackson-Databind - A Story of Blacklisting Java Deserialization Gadgets

Jackson is a popular library for parsing JSON documents in Java. Jackson-Databind is a module of the Jackson library that allows automatic transformation from JSON to Java objects and vice versa. In June 2017, an unsafe deserialization... Read more
0 Reviews

Drupal Core SA-CORE-2018-002 Remote Code Execution Vulnerability

The Drupal community woke up to a worrisome morning with the SA-CORE-2018-002 security advisory. The highly critical vulnerability mentions remote code execution vulnerability applicable to multiple Drupal core subsystems. The vulnerability... Read more
0 Reviews

Protect your AWS API Gateway with F5 BIG-IP WAF

This article will help you deploy an F5 BIG-IP WAF in front of your AWS API Gateway to provide additional security. It shows how to deploy a basic WAF policy to protect your API Gateway, and you can expand from there to add Denial of Service or... Read more
Average Rating: 4.9
7 Reviews

New BIG-IP ASM v13.1 Drupal v8 Ready Template_v6.1.2

Drupal 8 ASM Template for BIG-IP v13.x Read more
0 Reviews
0 Reviews

Jenkins Unsafe Deserialization Vulnerability (CVE-2017-1000353)

Jenkins is an open source automation server which can be used to automate all sorts of tasks related to building, testing, and delivering or deploying software. In April 2017 Jenkins have published a security advisory that revealed an unsafe... Read more
0 Reviews

The Top Ten Hardcore F5 Security Features in BIG-IP 13!

David Holmes, Skymall's runner-up for sexiest man over 55, reveals the ten most hardcore security features in versions 13.0 and 13.1. You don't want to miss this one. Read more
Average Rating: 4.9
8 Reviews

New BIG-IP ASM v13 Outlook Web Access (OWA) 2016 Ready Template

Updated ASM Outlook Web Access (OWA) 2016 template for BIG-IP version 13 Read more
0 Reviews

Meltdown and Spectre Web Application Risk Management

The recently disclosed groundbreaking vulnerabilities have set a precedent for how massive a security vulnerability can be. In the recent years, we have witnessed vulnerabilities that affect major frameworks like Java, PHP, OpenSSL and CGI... Read more
2 Reviews

JBoss Arbitrary code execution via unrestricted deserialization in ReadOnlyAccessFilter (CVE-2017-12149)

In late August 2017 Redhat have published a security advisory regarding an arbitrary code execution vulnerability in JBoss and recently a Proof of Concept exploit was publicly released. This vulnerability is added to the long list of unsafe... Read more
0 Reviews

Oracle WebLogic WLS Security Component Remote Code Execution (CVE-2017-10271)

In October 2017 Oracle have published a vulnerability concerning Oracle WebLogic and assigned CVE-2017-10271 to it. Since then no public information regarding this vulnerability was available until a few days ago, when an analysis of the... Read more
2 Reviews