return2ozma@lemmy.world to Technology@lemmy.worldEnglish · 14 hours agoThousands of customers imperiled after nation-state ransacks F5’s networkarstechnica.comexternal-linkmessage-square9fedilinkarrow-up150arrow-down12
arrow-up148arrow-down1external-linkThousands of customers imperiled after nation-state ransacks F5’s networkarstechnica.comreturn2ozma@lemmy.world to Technology@lemmy.worldEnglish · 14 hours agomessage-square9fedilink
minus-squareBrkdncr@lemmy.worldlinkfedilinkEnglisharrow-up1·8 hours agoThe attackers can access the keys needed to decrypt traffic going through the appliances.
The attackers can access the keys needed to decrypt traffic going through the appliances.