TL;DR

  • A critical vulnerability in F5 BIG-IP APM (CVE-2025-53521) is under active exploitation [2]
  • Originally classified as denial-of-service, now reclassified as remote code execution with CVSS 9.8 [2]
  • Chinese nation-state actors linked to the exploit, with systems compromised for months before discovery [2]
  • CISA has ordered U.S. federal agencies to patch by Monday, March 30, 2026 [2]
  • If you're running BIG-IP APM, you need to check for compromise indicators immediately [2]

The Critical Update: From DoS to RCE

On October 15, 2025, F5 published a security advisory for CVE-2025-53521, describing it as a denial-of-service vulnerability in BIG-IP APM versions 17.5.0 to 17.5.1, 17.1.0 to 17.1.2, 16.1.0 to 16.1.6, and 15.1.0 to 15.1.10 [2].​‌‌​​‌‌​‍​​‌‌​‌​‌‍​​‌​‌‌​‌‍​‌‌​​​‌​‍​‌‌​‌​​‌‍​‌‌​​‌‌‌‍​​‌​‌‌​‌‍​‌‌​‌​​‌‍​‌‌‌​​​​‍​​‌​‌‌​‌‍​‌‌​​​​‌‍​‌‌‌​​​​‍​‌‌​‌‌​‌‍​​‌​‌‌​‌‍​‌‌​​​‌‌‍​‌‌‌​‌‌​‍​‌‌​​‌​‌‍​​‌​‌‌​‌‍​​‌‌​​‌​‍​​‌‌​​​​‍​​‌‌​​‌​‍​​‌‌​‌​‌‍​​‌​‌‌​‌‍​​‌‌​‌​‌‍​​‌‌​​‌‌‍​​‌‌​‌​‌‍​​‌‌​​‌​‍​​‌‌​​​‌‍​​‌​‌‌​‌‍​‌‌​​​​‌‍​‌‌​​​‌‌‍​‌‌‌​‌​​‍​‌‌​‌​​‌‍​‌‌‌​‌‌​‍​‌‌​​‌​‌‍​​‌​‌‌​‌‍​‌‌​​‌​‌‍​‌‌‌‌​​​‍​‌‌‌​​​​‍​‌‌​‌‌​​‍​‌‌​‌‌‌‌‍​‌‌​‌​​‌‍​‌‌‌​‌​​‍​‌‌​​​​‌‍​‌‌‌​‌​​‍​‌‌​‌​​‌‍​‌‌​‌‌‌‌‍​‌‌​‌‌‌​‍​​‌​‌‌​‌‍​‌‌‌​​‌‌‍​‌‌​‌‌​‌‍​‌‌​​​‌​‍​​‌​‌‌​‌‍​‌‌​​‌‌‌‍​‌‌‌​‌​‌‍​‌‌​‌​​‌‍​‌‌​​‌​​‍​‌‌​​‌​

‌

That classification was wrong.

Due to new information obtained in March 2026, F5 has reclassified CVE-2025-53521 as a remote code execution vulnerability with CVSS scores of 9.8 (CVSS v3.1) and 9.3 (CVSS v4.0) [2].​‌‌​​‌‌​‍​​‌‌​‌​‌‍​​‌​‌‌​‌‍​‌‌​​​‌​‍​‌‌​‌​​‌‍​‌‌​​‌‌‌‍​​‌​‌‌​‌‍​‌‌​‌​​‌‍​‌‌‌​​​​‍​​‌​‌‌​‌‍​‌‌​​​​‌‍​‌‌‌​​​​‍​‌‌​‌‌​‌‍​​‌​‌‌​‌‍​‌‌​​​‌‌‍​‌‌‌​‌‌​‍​‌‌​​‌​‌‍​​‌​‌‌​‌‍​​‌‌​​‌​‍​​‌‌​​​​‍​​‌‌​​‌​‍​​‌‌​‌​‌‍​​‌​‌‌​‌‍​​‌‌​‌​‌‍​​‌‌​​‌‌‍​​‌‌​‌​‌‍​​‌‌​​‌​‍​​‌‌​​​‌‍​​‌​‌‌​‌‍​‌‌​​​​‌‍​‌‌​​​‌‌‍​‌‌‌​‌​​‍​‌‌​‌​​‌‍​‌‌‌​‌‌​‍​‌‌​​‌​‌‍​​‌​‌‌​‌‍​‌‌​​‌​‌‍​‌‌‌‌​​​‍​‌‌‌​​​​‍​‌‌​‌‌​​‍​‌‌​‌‌‌‌‍​‌‌​‌​​‌‍​‌‌‌​‌​​‍​‌‌​​​​‌‍​‌‌‌​‌​​‍​‌‌​‌​​‌‍​‌‌​‌‌‌‌‍​‌‌​‌‌‌​‍​​‌​‌‌​‌‍​‌‌‌​​‌‌‍​‌‌​‌‌​‌‍​‌‌​​​‌​‍​​‌​‌‌​‌‍​‌‌​​‌‌‌‍​‌‌‌​‌​‌‍​‌‌​‌​​‌‍​‌‌​​‌​​‍​‌‌​​‌​‌

"When a BIG-IP APM access policy is configured on a virtual server, specific malicious traffic can lead to remote code execution. The BIG-IP system in Appliance mode is also vulnerable," F5 now states [2].

This is a critical escalation. A DoS vulnerability that crashes systems is bad. An RCE vulnerability that lets attackers execute arbitrary code on your BIG-IP device is catastrophic.

Why This Matters: The Nation-State Connection

This isn't just another software bug. The October 2025 advisory confirmed a data breach at F5 itself:

  • A "highly sophisticated nation-state threat actor" accessed F5's network [2]
  • Attackers were in F5's network for at least 12 months before discovery [2]
  • They accessed BIG-IP source code and information about undisclosed vulnerabilities [2]
  • Attackers linked to China may have deployed the Brickstorm backdoor on F5 customers' systems [2]

This is supply chain compromise of the worst kind. The attackers who stole F5's intellectual property are now exploiting the very vulnerabilities they discovered.

CISA's addition of CVE-2025-53521 to the Known Exploited Vulnerabilities Catalog confirms what F5 suspected: active exploitation is occurring [2].

Who's Affected?

F5 BIG-IP APM provides access policy enforcement to secure access to apps, APIs, and data [2]. It's primarily used by:

  • Enterprises — for remote access and employee authentication
  • Financial institutions — for secure customer and employee access
  • Government and public sector organizations — for citizen services and internal systems

If your organization uses F5 BIG-IP APM for access control, you're in the crosshairs.

Affected Versions

CVE-2025-53521 affects the apmd process (which processes live traffic) in:

  • BIG-IP APM 17.5.0 to 17.5.1
  • BIG-IP APM 17.1.0 to 17.1.2
  • BIG-IP APM 16.1.0 to 16.1.6
  • BIG-IP APM 15.1.0 to 15.1.10 [2]

If you're running any of these versions, you're vulnerable unless you've already applied the October 2025 patches.

The Exploitation Timeline

What makes this particularly concerning is the timeline. F5 didn't disclose when exploitation began, only that it was discovered in March 2026 [2].

This means:

  • Some BIG-IP APM systems may have been compromised before patches were available
  • Systems patched after October 2025 might already have been backdoored
  • The Chinese nation-state actors responsible have had months of potential access

The threat actor F5 tracks as "malicious software c05d5254" has been observed making modifications that would affect the functioning of sys-eicheck, the BIG-IP system integrity checker [2]. This is sophisticated anti-forensics — the attackers are actively trying to hide their tracks.

Related: 22 Seconds: How Attack Speed Collapsed and Your Defenses Are Now Too Slow

How to Check If You're Compromised

F5 has published known indicators of compromise associated with this threat actor [2]. Here's what to look for:

Files on Disk

Specific files may be present in unexpected locations. F5's IoC document lists exact file paths and hashes.

File Modifications

Legitimate system files may show unexpected changes. The threat actor has been observed modifying system integrity checker components to avoid detection.

Log Entries

Look for:

  • Local user disabling the SELinux security module
  • Unusual HTTP/S traffic from the BIG-IP system
  • Unexpected administrative actions

Webshells

F5 has observed webshells being written to disk, though some variants work in memory only — meaning traditional file-based forensics won't find them [2].

System Integrity Checker Failures

If sys-eicheck reports inconsistencies or fails to run, that's a red flag. The threat actor has specifically targeted this component to evade detection [2].

What You Need to Do Now

1. Check Your Versions

Immediately verify which BIG-IP APM version you're running. If you're on any affected release (15.1.0–15.1.10, 16.1.0–16.1.6, 17.1.0–17.1.2, or 17.5.0–17.5.1) and haven't patched since October 2025, you're vulnerable.

2. Apply Patches Immediately

The patches F5 provided in October 2025 work as intended [2]. Update to a fixed version now.

For U.S. federal civilian agencies, CISA has ordered patching by Monday, March 30, 2026 [2]. Private sector organizations should treat this with the same urgency.

3. Hunt for Indicators of Compromise

Run F5's IoC checks against your BIG-IP systems. Even if you patch now, you may already be compromised.

4. Assume Credential Compromise

If your BIG-IP APM was vulnerable before you patched, assume any credentials, tokens, or authentication material managed by that system is compromised. Rotate everything.

5. Review Access Logs

Look for suspicious access patterns, unusual authentication attempts, or privileged access from unexpected sources during the vulnerability window (October 2025 to present).

The Bigger Picture: Nation-State Supply Chain Attacks

This vulnerability is part of a concerning trend: nation-state actors compromising software vendors to gain access to downstream customers.

The F5 breach mirrors other supply chain attacks:

  • Attackers compromise the vendor (SolarWinds, Kaseya, now F5)
  • Steal source code and zero-day vulnerabilities
  • Use those zero-days to attack the vendor's customers
  • Maintain long-term persistence for espionage

What makes the F5 case particularly serious is the 12-month dwell time — attackers were in F5's network for at least a year before discovery [2]. That's more than enough time to exfiltrate sensitive data, plant backdoors, and map out attack paths into customer networks.

Why BIG-IP Devices Are High-Value Targets

F5 BIG-IP devices sit at the network perimeter, handling:

  • SSL/TLS termination
  • Load balancing
  • Web application firewalls
  • Access policy management (APM)

They're positioned to see all traffic entering and leaving your network. Compromising a BIG-IP device gives attackers:

  • Man-in-the-middle position — intercept, decrypt, and inspect all traffic
  • Authentication bypass — APM controls who accesses what; compromising it means bypassing all access controls
  • Pivoting platform — launch attacks deeper into the network from a trusted position
  • Persistence mechanism — BIG-IP devices are rarely rebooted or re-imaged, giving attackers long-term access

This is why nation-state actors target them. It's not about disrupting operations (that's criminal ransomware). It's about espionage — silent, persistent access to exfiltrate data over months or years.

The lilMONSTER Approach to Critical Infrastructure Security

F5 BIG-IP devices are critical infrastructure. When they're vulnerable, your entire network perimeter is compromised.

Traditional security consulting focuses on compliance and generic best practices. That doesn't help when a zero-day is being actively exploited by nation-state actors.

We help businesses:

1. Rapid Vulnerability Response

  • Emergency patch deployment with minimal downtime
  • Configuration review to identify vulnerable settings
  • Temporary compensating controls while patches are tested

2. Compromise Assessment

  • Hunt for indicators of compromise on BIG-IP devices
  • Network traffic analysis to detect exfiltration or lateral movement
  • Forensic analysis to determine dwell time and blast radius

3. Hardening Strategy

  • Network segmentation so BIG-IP compromise doesn't equal network compromise
  • Zero-trust architecture that doesn't rely on perimeter devices for security
  • Defense-in-depth controls that limit damage if any single layer fails

4. Supply Chain Risk Management

  • Vendor security assessments before deployment
  • Monitoring for vendor breach disclosures
  • Incident response playbooks for supply chain compromises

We don't just tell you to patch. We help you understand if you've already been breached, contain the damage, and rebuild stronger defenses.


FAQ

CVE-2025-53521 is a critical vulnerability in F5 BIG-IP Access Policy Manager (APM). Originally classified as a denial-of-service bug when disclosed in October 2025, it was reclassified in March 2026 as a remote code execution vulnerability with a CVSS score of 9.8. It allows unauthenticated attackers to execute arbitrary code on affected BIG-IP APM systems [2].

Yes. CISA added CVE-2025-53521 to the Known Exploited Vulnerabilities Catalog on March 27, 2026, and ordered U.S. federal civilian agencies to patch by March 30, 2026. F5 has confirmed active exploitation and published indicators of compromise associated with Chinese nation-state threat actors [2].

F5 has linked the exploitation to a "highly sophisticated nation-state threat actor" associated with China. These actors were in F5's network for at least 12 months, stealing BIG-IP source code and information about undisclosed vulnerabilities. They may have deployed the Brickstorm backdoor on F5 customer systems [2].

If you applied F5's October 2025 patches, you're protected against the vulnerability itself — but you may still be compromised. The patches work as intended, but if your system was already backdoored before patching, the patch won't remove the backdoor. You need to hunt for indicators of compromise and assume credential exposure [2].

F5 has published indicators of compromise in advisory K000160486. Look for: unexpected files on disk, file modifications, suspicious log entries (SELinux disabled, unusual HTTP/S traffic), webshells, and sys-eicheck failures. Consider engaging incident response specialists with F5 expertise for thorough forensics [2].


References

[1] U.S. Cybersecurity and Infrastructure Security Agency (CISA), "CISA Adds One Known Exploited Vulnerability to Catalog," CISA.gov, March 27, 2026. [Online]. Available: https://www.cisa.gov/news-events/alerts/2026/03/27/cisa-adds-one-known-exploited-vulnerability-catalog

[2] F5 Networks, "CVE-2025-53521: BIG-IP APM Remote Code Execution Vulnerability," F5 Security Advisory K000156741, October 2025 (updated March 2026). [Online]. Available: https://my.f5.com/manage/s/article/K000156741

[3] F5 Networks, "Indicators of Compromise for CVE-2025-53521," F5 Security Advisory K000160486, March 2026. [Online]. Available: https://my.f5.com/manage/s/article/K000160486

[4] Google Cloud, "Brickstorm: Espionage Campaign Targeting F5 Customers," Google Cloud Security, March 2026. [Online]. Available: https://cloud.google.com/blog/topics/threat-intelligence/brickstorm-espionage-campaign

[5] B. Monzillo, "Attackers are exploiting RCE vulnerability in BIG-IP APM systems (CVE-2025-53521)," Help Net Security, March 28, 2026. [Online]. Available: https://www.helpnetsecurity.com/2026/03/28/big-ip-apm-vulnerability-cve-2025-53521-exploited/

[6] Unit 42, "Threat Brief: March 2026 Escalation of Cyber Risk Related to Iran," Palo Alto Networks, March 2026. [Online]. Available: https://unit42.paloaltonetworks.com/iranian-cyberattacks-2026/

[7] M. Adamski, "Security Navigator 2026," Orange Cyberdefense, March 2026. [Online]. Available: https://thehackernews.com/2026/03/we-are-at-war.html

[8] Cloudflare, "2026 Cloudflare Threat Report," Cloudflare Blog, March 2026. [Online]. Available: https://blog.cloudflare.com/2026-threat-report/

[9] NIST, "National Vulnerability Database - CVE-2025-53521," NIST, 2026. [Online]. Available: https://nvd.nist.gov/vuln/detail/CVE-2025-53521

[10] S. Blake, "Understanding Nation-State Supply Chain Attacks," SANS Institute, 2026. [Online]. Available: https://www.sans.org/white-papers/supply-chain-security/


If you're running F5 BIG-IP APM, you need more than a patch — you need to know if you've already been compromised. Book an emergency consultation to assess your exposure and contain the threat.

TL;DR

  • A popular security device called F5 BIG-IP has a serious flaw that lets bad guys take control [2]
  • Hackers from another country are already using this flaw to break into companies [2]
  • The device was supposed to just stop websites from working (like turning off a light switch), but it actually lets hackers run their own commands (like giving someone else the controller) [2]
  • If your company uses this device, you need to fix it immediately and check if hackers are already inside [2]

What Is F5 BIG-IP? (Like a Security Guard)

Imagine your company's computer network is like a big office building. Lots of people need to get in — employees, customers, delivery people.

You need a security guard at the front door. The guard checks everyone's ID, decides who can enter, and keeps out the wrong people.

F5 BIG-IP is that security guard.

It's a special computer that sits between the internet and your company's network. It:

  • Checks who's trying to get in
  • Makes sure only the right people can access the right things
  • Protects your network from bad traffic
  • Helps websites load faster by distributing the work

Big companies, banks, and government agencies all use F5 BIG-IP devices. They're expensive and important.

What Happened? (The Guard Was Tricked)

In October 2025, F5 (the company that makes BIG-IP) said: "Hey, we found a problem. Our security guard can be tricked."

At first, they said the problem was like this: If someone did something tricky, the security guard would get confused and stop working. Your website would go down. That's annoying, but not terrible — it's like the guard falling asleep. You wake them up, everything's fine.

But in March 2026, F5 said: "We were wrong. It's worse."

The problem isn't that the guard falls asleep. The problem is that bad guys can make the guard work for them.

Instead of checking IDs and keeping people out, the guard starts letting bad guys in and giving them access to everything.

Why This Is Scary

The Bad Guys Are Already Using It

This isn't a "what if" problem. Bad guys are already breaking in through this hole [2].

The U.S. government's cybersecurity agency (CISA) was so worried they told all federal agencies: "Fix this by Monday, March 30, or else." That's how serious it is [2].

The Bad Guys Are From Another Country

These aren't just random hackers in their basements. F5 says the bad guys breaking in are from China — what they call a "nation-state threat actor" [2].

That means:

  • They're really smart
  • They have lots of resources
  • They're not trying to steal money — they're spying

They Stole the Blueprints

Here's the craziest part: Before they started breaking into companies through this hole, they broke into F5 itself [2].

Imagine if someone stole the blueprints for your office building's security system. They'd know exactly how to bypass every lock, camera, and alarm.

That's what happened:

  • Bad guys were inside F5's network for at least 12 months (a whole year!) [2]
  • They stole the computer code that makes BIG-IP work
  • They found secret problems (vulnerabilities) that F5 didn't even know about
  • Now they're using those secret problems to break into F5's customers [2]

This is like a burglar who stole your architect's plans and knows exactly which wall to cut through to get into your safe.

What Happens If Your Company Has This Device

If your company uses F5 BIG-IP and hasn't fixed it since October 2025:

  1. You're vulnerable — bad guys can break in
  2. They might already be inside — they've had months to use this hole
  3. They can see everything — this device sits at the front door, watching all traffic
  4. They can pretend to be anyone — the device controls who gets access to what

Think about it like this: If someone takes control of the security guard, they can walk in wearing a uniform that looks exactly like yours, carrying a fake ID, and nobody will stop them.

How to Tell If You're Already Hacked

F5 published a list of clues that bad guys might be inside your system [2]. It's like finding footprints in your house:

Files That Shouldn't Be There

Like finding a backpack in your closet that you've never seen before. Someone put it there.

Files That Changed

Like finding your diary moved to a different shelf. Someone was looking at it.

Weird Log Entries

Like seeing your front door unlocked when you know you locked it. Someone has a key.

The Security System Turned Off

Like finding your security camera unplugged. Someone disabled it on purpose.

The problem is, these bad guys are smart. They try not to leave footprints. Some of their tools exist only in computer memory — like someone who breaks in, walks through your house, but doesn't touch anything or leave fingerprints [2].

That's why you need experts who know exactly what to look for.

What You Need to Do Right Now

1. Check If You Have This Device

Ask your IT team: "Do we use F5 BIG-IP APM? What version are we running?"

If they say yes and the version is:

  • 15.1.0 to 15.1.10
  • 16.1.0 to 16.1.6
  • 17.1.0 to 17.1.2
  • 17.5.0 to 17.5.1

Then you need to act immediately.

2. Fix It Now (Don't Wait)

F5 has a fix (a patch) that works. Install it today.

Think of it like changing the locks after you realize someone stole your keys. You don't wait until the weekend. You do it now.

3. Assume Bad Guys Might Already Be Inside

If your device was vulnerable before you fixed it, someone might have already broken in. Even after you change the locks, they might still be hiding inside.

You need to:

  • Look for the footprints F5 described
  • Check if anyone unusual accessed your systems
  • Change all the passwords and security keys the device protects

4. Get Help from Experts

This isn't a regular "update your software" problem. This is nation-state espionage.

If someone broke into your house and hid, you'd call the police, not try to find them yourself. Same here — you need cybersecurity experts who know how to hunt for these specific bad guys.

Why Big Companies Are Targets

You might wonder: "Why would hackers want to break into my company?"

Here's why:

For Big Companies

  • Trade secrets — plans for new products, customer lists, financial data
  • Ransom — lock your computers and demand money to unlock them
  • Espionage — steal information for another country

For Small Companies

  • As a stepping stone — break into you, then use your access to reach your bigger customers or suppliers
  • Supply chain attacks — compromise your software to attack everyone who uses it
  • Practice — test their hacking skills on smaller targets before going after big ones

The reality is, if you're in business, someone wants what you have.

The Real Problem: Supply Chain Attacks

What happened to F5 is called a supply chain attack.

Imagine you buy a lock from a hardware store. You trust the lock because it's from a reputable company.

But what if someone broke into the lock factory and stole the designs? Now they know how to pick every lock that factory makes.

That's what happened:

  • Bad guys broke into F5 (the factory)
  • Stole the designs (source code)
  • Found secret flaws in the locks
  • Used those flaws to pick the locks at companies that bought them [2]

This is why big companies are worried. It's not just about their own security — it's about the security of every company they buy from.

Related: A Popular AI Tool Was Hacked

The lilMONSTER Approach

We don't just tell you to patch and walk away. We help you:

Check If You're Already Hacked

  • Hunt for the specific footprints these bad guys leave
  • Check network logs to see if someone unusual broke in
  • Use special tools to find "memory-only" backdoors that don't show up in normal scans

Fix the Problem Properly

  • Not just installing the patch, but making sure it worked
  • Checking that nothing else is broken after the fix
  • Making sure the bad guys can't just get back in another way

Build Better Security

  • Design your network so compromising one device doesn't give access to everything
  • Set up alarms that tell you immediately if someone breaks in
  • Create a plan for what to do when (not if) something like this happens again

We're not selling you fear. We're giving you real security that works against the threats that actually exist.


FAQ

F5 BIG-IP is a security device that big companies use to protect their networks. It's like a super-smart security guard that checks everyone trying to get in, makes sure websites load fast, and blocks bad traffic. Banks, big companies, and government agencies all use it.

CVE-2025-53521 is the official name for the security hole in F5 BIG-IP. It's like a secret backdoor that lets bad guys take control of the device. At first, people thought it just crashed the device (like a light switch turning off), but it's actually worse — it lets bad guys run their own commands (like giving someone else the controller) [2].

Ask your IT team or the people who manage your company's computers and network. Say: "Do we use F5 BIG-IP devices for access management or load balancing?" If they say yes, ask: "What version are we running, and have we installed the October 2025 security patches?"

If your company has a vulnerable F5 BIG-IP device: (1) install the security patch immediately, (2) check the indicators of compromise F5 published to see if bad guys are already inside, (3) assume all passwords and security keys managed by that device are compromised and change them, (4) consider hiring cybersecurity experts who specialize in F5 forensics to make sure you're clean.

Because it's that serious. When the U.S. cybersecurity agency (CISA) sets a deadline for federal agencies, it means they know bad guys are actively using the vulnerability. They're not taking chances. Private companies should treat it with the same urgency [2].


References

[1] U.S. Cybersecurity and Infrastructure Security Agency (CISA), "CISA Adds One Known Exploited Vulnerability to Catalog," CISA.gov, March 27, 2026. [Online]. Available: https://www.cisa.gov/news-events/alerts/2026/03/27/cisa-adds-one-known-exploited-vulnerability-catalog

[2] B. Monzillo, "Attackers are exploiting RCE vulnerability in BIG-IP APM systems (CVE-2025-53521)," Help Net Security, March 28, 2026. [Online]. Available: https://www.helpnetsecurity.com/2026/03/28/big-ip-apm-vulnerability-cve-2025-53521-exploited/

[3] F5 Networks, "CVE-2025-53521: BIG-IP APM Remote Code Execution Vulnerability," F5 Security Advisory, October 2025 (updated March 2026). [Online]. Available: https://my.f5.com/manage/s/article/K000156741

[4] Google Cloud, "Brickstorm: Espionage Campaign Targeting F5 Customers," Google Cloud Security, March 2026. [Online]. Available: https://cloud.google.com/blog/topics/threat-intelligence/brickstorm-espionage-campaign

[5] M. Adamski, "Security Navigator 2026," Orange Cyberdefense, March 2026. [Online]. Available: https://thehackernews.com/2026/03/we-are-at-war.html

[6] Cloudflare, "2026 Cloudflare Threat Report," Cloudflare Blog, March 2026. [Online]. Available: https://blog.cloudflare.com/2026-threat-report/

[7] NIST, "National Vulnerability Database," NIST.gov, 2026. [Online]. Available: https://nvd.nist.gov/

[8] S. Blake, "Understanding Nation-State Supply Chain Attacks," SANS Institute, 2026. [Online]. Available: https://www.sans.org/white-papers/supply-chain-security/


If your company uses F5 BIG-IP, you need to know if bad guys are already inside. Book an emergency consultation to check your systems and fix the problem.

Ready to strengthen your security?

Talk to lilMONSTER. We assess your risks, build the tools, and stay with you after the engagement ends. No clipboard-and-leave consulting.

Get a Free Consultation