F5 DevCentral (@devcentral) 's Twitter Profile
F5 DevCentral

@devcentral

DevCentral is @F5 Online Community of Technical Peers dedicated to learning, exchanging ideas, and solving problems โ€“ Together
linktr.ee/devcentral

ID: 8232052

linkhttps://community.f5.com calendar_today16-08-2007 20:27:28

17,17K Tweet

5,5K Takipรงi

3,3K Takip Edilen

F5 DevCentral (@devcentral) 's Twitter Profile Photo

With the release of #TMOS version 17.5.1, #BIGIP now supports the latest AWS CloudHSM hardware security module (HSM) type along with the AWS CloudHSM Client SDK, version 5. This article covers: ๐Ÿ”น Step-by-step instructions to configure BIG-IP with #AWS CloudHSM ๐Ÿ”น

F5 DevCentral (@devcentral) 's Twitter Profile Photo

๐Ÿ”’ Get Ready for the August 2025 Quarterly Security Notification (QSN) F5 Quarterly Security Notifications (QSNs) help keep your systems secure by disclosing vulnerabilities and exposures in our products. The next QSN is scheduled for Wednesday, August 13, 2025, so nowโ€™s the

F5 DevCentral (@devcentral) 's Twitter Profile Photo

#F5 Distributed Cloud API Discovery continuously scans your environment to detect, catalog, and classify all APIs, including those shadow and zombie endpoints you may not even be aware of. This foundational step is essential for robust #APIsecurity and compliance.

F5 DevCentral (@devcentral) 's Twitter Profile Photo

The latest edition in This Week in Cybersecurity is brought to you by the #F5SIRT with spotlights on some crucial developments in the #cybersecurity landscape. Highlights include: ๐Ÿ›ก๏ธ A sophisticated Business Email Compromise (BEC) scam targeting a transportation executive's

F5 DevCentral (@devcentral) 's Twitter Profile Photo

Karthik Hadagali walks you through integrating log data from F5 Distributed Cloudโ€™s Global Log Receiver (GLR) with #Grafana Loki, transforming the way you visualize and explore logs. ๐Ÿ”‘ What You'll Learn: - How to set up a lightweight Python webhook to bridge #F5XC GLR and

F5 DevCentral (@devcentral) 's Twitter Profile Photo

Aubrey King is back with another addition to our AI Step-By-Step Labs, and this time, with a mini lab focused on installing n8n using #Docker! In this lab, you'll not only learn how to install #n8n but also how to create an AI agent that proxies requests to the LLM instance set

F5 DevCentral (@devcentral) 's Twitter Profile Photo

Koichi from #F5 #SIRT has gathered critical security updates that showcase the ever-evolving landscape of #cyberthreats. This week: ๐Ÿ›ก๏ธ BYOEDR: Imagine a new attack vector that leverages free trial versions of Endpoint Detection and Response systems to evade detection ๐Ÿ”

F5 DevCentral (@devcentral) 's Twitter Profile Photo

Quantum computers can potentially crack RSA and elliptic curve #cryptography at an unprecedented scale. #F5โ€™s latest update BIG-IP TMOS 17.5.1 introduces support for #postquantum cryptographic algorithms including ML-KEM and ML-DSA, ensuring your network security is not only

F5 DevCentral (@devcentral) 's Twitter Profile Photo

AI adoption shouldnโ€™t mean choosing between simplicity and security. Organizations can deploy #AI at scale, using Red Hat #OpenShift and trusted partners. Accelerate adoption while staying protected.

F5 DevCentral (@devcentral) 's Twitter Profile Photo

Recently, a customer faced a perplexing issue: their #F5 Container Ingress Services (#CIS) created a Virtual IP (VIP) that was unreachable, despite being configured correctly. The twist? When they manually recreated the same VIP, it worked! ๐Ÿค” This prompted a deep dive into how

F5 DevCentral (@devcentral) 's Twitter Profile Photo

The August 2025 F5 Quarterly Security Notification is now available. For more information, refer to the following documentation: โ€ข K000152635: Overview of Security Advisories (August 2025): go.f5.net/4wlcpk0m โ€ข K12201527: Overview of Quarterly Security Notifications:

F5 DevCentral (@devcentral) 's Twitter Profile Photo

In cybersecurity, the debate between Zero Trust Network Access (#ZTNA) and Zero Trust Application Access (#ZTAA) is increasingly favoring ZTAA for enterprises seeking high-performance, application-centric protection. F5's #BIGIP Access Policy Manager leads the charge in this

F5 DevCentral (@devcentral) 's Twitter Profile Photo

Discover how attackers exploit cloud environments, manipulate user accounts, and leverage system processes to embed themselves in your network. - Account Manipulation: Rogue accounts are created to hijack email permissions. - Boot or Logon Autostart Executions: Modifying

F5 DevCentral (@devcentral) 's Twitter Profile Photo

Matt Mabis shares his latest article on automating #F5 infrastructure modernization with Ansible! He has been working on innovative solutions to help customers seamlessly migrate from legacy #BIGIP to next-gen platforms like VELOS and rSeries. The #Ansible Playbook simplifies

F5 DevCentral (@devcentral) 's Twitter Profile Photo

From Microsoftโ€™s Wassette to fuzzing and time-travel debugging ๐Ÿ•’๐Ÿชฒ this episode of WebAssembly Unleashed explores how Wasm is reshaping AI security and reliability with rising research stars Khan Karimov & Arjun Ramesh. #Wasm #WebAssembly youtu.be/OhybI5aUy5M?feโ€ฆ

F5 DevCentral (@devcentral) 's Twitter Profile Photo

Whether you use dedicated hardware or provision a virtual machine, this guide to the #AST (Application Study Tool) for monitoring and observing your BIG-IP ecosystem will help you make sure you have the right pre-installation configuration. community.f5.com/kb/TechnicalArโ€ฆ

F5 DevCentral (@devcentral) 's Twitter Profile Photo

APIs are the backbone of modern software, enabling seamless communication between different systems. In the newly published #OWASP #APISecurity Top 10 (2023), critical vulnerabilities are highlighted that could jeopardize your applications. community.f5.com/kb/TechnicalArโ€ฆ

F5 DevCentral (@devcentral) 's Twitter Profile Photo

As #AgenticAI continues to gain traction, there has been an increase in the adoption of remote Model Context Protocol (MCP) Servers. #F5 Distributed Cloud WAF is designed to safeguard your Web Apps and APIs while integrating with MCP Servers. community.f5.com/kb/TechnicalArโ€ฆ

F5 DevCentral (@devcentral) 's Twitter Profile Photo

Stay informed and stay secure! The top security stories from this week include: -Taiwan Under Siege by APT Group UAT-7237 -CrossC2 Expands Cobalt Strike's Reach -Tightening Budgets Push for #AI-Driven Defense -CISA Calls for Enhanced OT Cybersecurity community.f5.com/kb/security-inโ€ฆ

F5 DevCentral (@devcentral) 's Twitter Profile Photo

Parsing discrepancies between servers can lead to cache poisoning, credential theft, or site takeover. Upstream #HTTP2, supported by #F5AWAF, is the best defense. community.f5.com/kb/security-inโ€ฆ