return2ozma@lemmy.world to Technology@lemmy.worldEnglish · 3 days agoThousands of customers imperiled after nation-state ransacks F5’s networkarstechnica.comexternal-linkmessage-square9fedilinkarrow-up158arrow-down12
arrow-up156arrow-down1external-linkThousands of customers imperiled after nation-state ransacks F5’s networkarstechnica.comreturn2ozma@lemmy.world to Technology@lemmy.worldEnglish · 3 days agomessage-square9fedilink
minus-squareBrkdncr@lemmy.worldlinkfedilinkEnglisharrow-up1·3 days agoThe attackers can access the keys needed to decrypt traffic going through the appliances.
The attackers can access the keys needed to decrypt traffic going through the appliances.