return2ozma@lemmy.world to Technology@lemmy.worldEnglish · 2 days agoThousands of customers imperiled after nation-state ransacks F5’s networkarstechnica.comexternal-linkmessage-square9linkfedilinkarrow-up158arrow-down12
arrow-up156arrow-down1external-linkThousands of customers imperiled after nation-state ransacks F5’s networkarstechnica.comreturn2ozma@lemmy.world to Technology@lemmy.worldEnglish · 2 days agomessage-square9linkfedilink
minus-squareBrkdncr@lemmy.worldlinkfedilinkEnglisharrow-up1·2 days agoThe attackers can access the keys needed to decrypt traffic going through the appliances.
The attackers can access the keys needed to decrypt traffic going through the appliances.