

Risky Business #811 -- F5 is the tip of the crap software iceberg
24 snips Oct 22, 2025
Jacques Louw, co-founder and Chief Product Officer at Push Security, dives into a LinkedIn phishing campaign that targeted CEOs. He explains how compromised contacts initiated complex phishing chains, exploiting Google and Microsoft services. Louw also highlights Push's browser-centric detection techniques, including session tracing that reconstructs user navigation, enhancing the early identification of similar attacks. The discussion emphasizes the importance of tracking origin links to sharpen detection capabilities and provide actionable insights.
AI Snips
Chapters
Transcript
Episode notes
Edge Device Compromise Is A Supply-Chain Crisis
- F5's breach likely granted long-term access to source code and build environments, creating systemic supply-chain risk.
- Edge devices like Big-IP are high-value targets because they terminate TLS and enable lateral movement.
Market Forces Leave Edge Devices Insecure
- Many mid-tier vendors lack incentive or budget to improve insecure edge-device code.
- Emerging AI tools might make code quality improvements economically viable for some vendors.
Attribution Claims Serve Political Narratives
- China publicly accuses the U.S. of hacking its national time center to deflect scrutiny.
- Such claims often rely on similarities to old tools and target non-expert audiences for influence.