Lädt...

📰 Best Practices to Configure BIG-IP LTM Systems to Encrypt HTTP Persistence Cookies


Nachrichtenbereich: 📰 IT Security Nachrichten
🔗 Quelle: cisa.gov

CISA has observed cyber threat actors leveraging unencrypted persistent cookies managed by the F5 BIG-IP Local Traffic Manager (LTM) module to enumerate other non-internet facing devices on the network. F5 BIG-IP is a suite of hardware and software solutions designed to manage and secure network traffic. A malicious cyber actor could leverage the information gathered from unencrypted persistence cookies to infer or identify additional network resources and potentially exploit vulnerabilities found in other devices present on the network.  
 

CISA urges organizations to encrypt persistent cookies employed in F5 BIG-IP devices and review the following article for details on how to configure the BIG-IP LTM system to encrypt HTTP cookies.

...

📰 Best Practices to Configure BIG-IP LTM Systems to Encrypt HTTP Persistence Cookies


📈 105.13 Punkte
📰 IT Security Nachrichten

🕵️ F5 BIG-IP LTM up to 12.1.3.6/13.0.1 TMM denial of service


📈 33.1 Punkte
🕵️ Sicherheitslücken

🕵️ F5 BIG-IP on VIPRION Log /var/log/ltm Password information disclosure


📈 33.1 Punkte
🕵️ Sicherheitslücken

🕵️ F5 BIG-IP Log /var/log/ltm Password Information Disclosure


📈 33.1 Punkte
🕵️ Sicherheitslücken

🕵️ Vuln: F5 BIG-IP LTM Products CVE-2016-5745 Security Bypass Vulnerability


📈 33.1 Punkte
🕵️ Sicherheitslücken

🕵️ Vuln: F5 BIG-IP LTM Products CVE-2016-5745 Security Bypass Vulnerability


📈 33.1 Punkte
🕵️ Sicherheitslücken

🔧 Demonstrating Persistence vs. Non-Persistence in Kubernetes with MongoDB


📈 30.77 Punkte
🔧 Programmierung

🔧 Managing Data with Docker Compose Volumes: Best Practices for Persistence and Sharing


📈 26.96 Punkte
🔧 Programmierung

🔧 Mastering Java Persistence: Best Practices for Cloud-Native Applications and Modernization


📈 26.96 Punkte
🔧 Programmierung

🔧 Introducing LTM-2: A Leap Forward in Workflow Management


📈 26.96 Punkte
🔧 Programmierung

🔧 Introducing LTM-2: A Leap Forward in Workflow Management


📈 26.96 Punkte
🔧 Programmierung

📰 Fortnite : Entkommt der gefährlichen Insel: Neuer LTM gestartet!


📈 26.96 Punkte
📰 IT Nachrichten

🔧 Data Persistence (Cookies, Sessions, Tokens, LocalStorage and SessionStorage)


📈 26.94 Punkte
🔧 Programmierung

🔧 Battle of the Cookies: Regular Cookies vs. HTTP-Only


📈 25.9 Punkte
🔧 Programmierung

📰 How to configure Nginx with Let’s Encrypt on CentOS 8


📈 24.51 Punkte
📰 IT Security Nachrichten

📰 CISA Urges Encryption of Cookies in F5 BIG-IP Systems


📈 23.92 Punkte
📰 IT Security Nachrichten

📰 Best Practices for Using Cookies and Cookie Consent


📈 23.13 Punkte
📰 IT Security Nachrichten

🔧 React Cookies: A Complete Guide to Managing Cookies in React Applications


📈 23.12 Punkte
🔧 Programmierung

🔧 Third-Party-Cookies bleiben länger: Darum verschiebt Google das Aus der Drittanbieter-Cookies


📈 23.12 Punkte
🔧 Programmierung

📰 Third-Party-Cookies vor dem Aus: Auch Google verbannt Drittanbieter-Cookies


📈 23.12 Punkte
📰 IT Nachrichten

📰 Ein Internet ohne Cookies? Google verabschiedet sich von Third-Party-Cookies


📈 23.12 Punkte
📰 IT Security Nachrichten

🐧 Chrome 69 will keep Google Cookies when you tell it to delete all cookies


📈 23.12 Punkte
🐧 Linux Tipps