return2ozma@lemmy.world to Technology@lemmy.worldEnglish · 3 days agoThousands of customers imperiled after nation-state ransacks F5’s networkarstechnica.comexternal-linkmessage-square9linkfedilinkarrow-up160arrow-down12
arrow-up158arrow-down1external-linkThousands of customers imperiled after nation-state ransacks F5’s networkarstechnica.comreturn2ozma@lemmy.world to Technology@lemmy.worldEnglish · 3 days agomessage-square9linkfedilink
minus-squareBrkdncr@lemmy.worldlinkfedilinkEnglisharrow-up1·3 days agoThe attackers can access the keys needed to decrypt traffic going through the appliances.
The attackers can access the keys needed to decrypt traffic going through the appliances.