<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" encoding="UTF-8" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:sy="http://purl.org/rss/1.0/modules/syndication/" xmlns:admin="http://webns.net/mvcb/" xmlns:atom="http://www.w3.org/2005/Atom/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:podcast="https://podcastindex.org/namespace/1.0" xmlns:fireside="https://fireside.fm/modules/rss/fireside">
  <channel>
    <fireside:hostname>feed01.fireside.fm</fireside:hostname>
    <fireside:genDate>Mon, 20 Oct 2025 18:05:19 -0500</fireside:genDate>
    <generator>Fireside (https://fireside.fm)</generator>
    <title>F5 Labs Threat Research</title>
    <link>https://f5labs.fireside.fm</link>
    <pubDate>Tue, 29 Oct 2019 12:30:12 -0400</pubDate>
    <description>In this companion podcast, the 2019 F5 Labs Application Protection Report researchers examine how both apps and threats are changing, and what security practitioners can do to stay ahead of these changes.
</description>
    <language>en-us</language>
    <copyright>© 2025 F5 Labs Threat Research</copyright>
    <itunes:type>episodic</itunes:type>
    <itunes:subtitle>2019 Application Protection Report</itunes:subtitle>
    <itunes:author>Swante Bleakley</itunes:author>
    <itunes:summary>In this companion podcast, the 2019 F5 Labs Application Protection Report researchers examine how both apps and threats are changing, and what security practitioners can do to stay ahead of these changes.
</itunes:summary>
    <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/7/79c31137-4330-45ea-be15-e60d2b419ed1/cover.jpg?v=1"/>
    <itunes:explicit>no</itunes:explicit>
    <itunes:owner>
      <itunes:name>Swante Bleakley</itunes:name>
      <itunes:email>s.bleakley@f5.com</itunes:email>
    </itunes:owner>
    <podcast:locked email="s.bleakley@f5.com">yes</podcast:locked>
<itunes:category text="Technology"/>
<itunes:category text="Business"/>
<itunes:category text="Education"/>
    <item>
      <title>Season 2: Episode 4 -  API Attacks and New Architectures</title>
      <link>https://f5labs.fireside.fm/s2e4</link>
      <guid isPermaLink="false">607d1b87-d062-48d8-a547-40a64a490f71</guid>
      <pubDate>Fri, 25 Oct 2019 14:00:00 -0400</pubDate>
      <author>Swante Bleakley</author>
      <enclosure url="https://aphid.fireside.fm/d/1437767933/79c31137-4330-45ea-be15-e60d2b419ed1/607d1b87-d062-48d8-a547-40a64a490f71.mp3" length="66246447" type="audio/mp3"/>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:author>Swante Bleakley</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:duration>27:36</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <itunes:image href="https://assets.fireside.fm/file/fireside-images-2024/podcasts/images/7/79c31137-4330-45ea-be15-e60d2b419ed1/episodes/6/607d1b87-d062-48d8-a547-40a64a490f71/cover.jpg?v=1"/>
      <description>In the fourth and final episode for 2019, Sara, Ray, and Sander talk about attacks against application programming interfaces (APIs), and how they’ve spiked in the last two years. As with the formjacking attacks discussed in Episode Two, API attacks have become more common because of changes in how organizations design and run applications. The team explains the different kinds of API breaches they’ve seen, what organizations can do to protect their APIs, and make a few predictions about how the security world will adapt to these new risks 
</description>
      <content:encoded>
        <![CDATA[<p>In the fourth and final episode for 2019, Sara, Ray, and Sander talk about attacks against application programming interfaces (APIs), and how they’ve spiked in the last two years. As with the formjacking attacks discussed in Episode Two, API attacks have become more common because of changes in how organizations design and run applications. The team explains the different kinds of API breaches they’ve seen, what organizations can do to protect their APIs, and make a few predictions about how the security world will adapt to these new risks</p>]]>
      </content:encoded>
      <itunes:summary>
        <![CDATA[<p>In the fourth and final episode for 2019, Sara, Ray, and Sander talk about attacks against application programming interfaces (APIs), and how they’ve spiked in the last two years. As with the formjacking attacks discussed in Episode Two, API attacks have become more common because of changes in how organizations design and run applications. The team explains the different kinds of API breaches they’ve seen, what organizations can do to protect their APIs, and make a few predictions about how the security world will adapt to these new risks</p>]]>
      </itunes:summary>
      <fireside:playerURL>https://fireside.fm/player/v2/vkW0TiKZ+qp1_mKFk</fireside:playerURL>
      <fireside:playerEmbedCode>
        <![CDATA[<iframe src="https://fireside.fm/player/v2/vkW0TiKZ+qp1_mKFk" width="740" height="200" frameborder="0" scrolling="no">]]>
      </fireside:playerEmbedCode>
      <podcast:person email="" href="" role="host">Raymond Pompon</podcast:person>
      <podcast:person email="" href="" role="host">Sander Vinberg</podcast:person>
      <podcast:person email="" href="" role="host">Sara Boddy</podcast:person>
    </item>
    <item>
      <title>Season 2: Episode 3 - Access Attacks Take Top Spot</title>
      <link>https://f5labs.fireside.fm/s2e3</link>
      <guid isPermaLink="false">1faffac3-1581-45d3-8e55-e5954fbfd8a8</guid>
      <pubDate>Thu, 17 Oct 2019 16:00:00 -0400</pubDate>
      <author>Swante Bleakley</author>
      <enclosure url="https://aphid.fireside.fm/d/1437767933/79c31137-4330-45ea-be15-e60d2b419ed1/1faffac3-1581-45d3-8e55-e5954fbfd8a8.mp3" length="84726512" type="audio/mp3"/>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:author>Swante Bleakley</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:duration>35:18</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <itunes:image href="https://assets.fireside.fm/file/fireside-images-2024/podcasts/images/7/79c31137-4330-45ea-be15-e60d2b419ed1/episodes/1/1faffac3-1581-45d3-8e55-e5954fbfd8a8/cover.jpg?v=1"/>
      <description>The Labs team drills down into the topic of access tier attacks, which were the single most successful attack type in the past year, according to public breach reports. These attacks, which include techniques like phishing, credential stuffing, and brute force attacks, made up a huge proportion of the successful attacks that organizations disclosed. The team explores why these attacks are so successful, what defenders can do to prevent them, and what their ongoing prevalence means for the Internet and its users.  
</description>
      <content:encoded>
        <![CDATA[<p>The Labs team drills down into the topic of access tier attacks, which were the single most successful attack type in the past year, according to public breach reports. These attacks, which include techniques like phishing, credential stuffing, and brute force attacks, made up a huge proportion of the successful attacks that organizations disclosed. The team explores why these attacks are so successful, what defenders can do to prevent them, and what their ongoing prevalence means for the Internet and its users. </p>]]>
      </content:encoded>
      <itunes:summary>
        <![CDATA[<p>The Labs team drills down into the topic of access tier attacks, which were the single most successful attack type in the past year, according to public breach reports. These attacks, which include techniques like phishing, credential stuffing, and brute force attacks, made up a huge proportion of the successful attacks that organizations disclosed. The team explores why these attacks are so successful, what defenders can do to prevent them, and what their ongoing prevalence means for the Internet and its users. </p>]]>
      </itunes:summary>
      <fireside:playerURL>https://fireside.fm/player/v2/vkW0TiKZ+sIcxFe2X</fireside:playerURL>
      <fireside:playerEmbedCode>
        <![CDATA[<iframe src="https://fireside.fm/player/v2/vkW0TiKZ+sIcxFe2X" width="740" height="200" frameborder="0" scrolling="no">]]>
      </fireside:playerEmbedCode>
      <podcast:person email="" href="" role="host">Raymond Pompon</podcast:person>
      <podcast:person email="" href="" role="host">Sander Vinberg</podcast:person>
      <podcast:person email="" href="" role="host">Sara Boddy</podcast:person>
    </item>
    <item>
      <title>Season 1: Episode 3 - Application Protection—Mitigating Risk at the Access Tier</title>
      <link>https://f5labs.fireside.fm/s1e3</link>
      <guid isPermaLink="false">c2716c21-0a9d-4fd8-afb1-fe486f5efb1e</guid>
      <pubDate>Tue, 15 Oct 2019 14:00:00 -0400</pubDate>
      <author>Swante Bleakley</author>
      <enclosure url="https://aphid.fireside.fm/d/1437767933/79c31137-4330-45ea-be15-e60d2b419ed1/c2716c21-0a9d-4fd8-afb1-fe486f5efb1e.mp3" length="41769341" type="audio/mp3"/>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:author>Swante Bleakley</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:duration>17:24</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <itunes:image href="https://assets.fireside.fm/file/fireside-images-2024/podcasts/images/7/79c31137-4330-45ea-be15-e60d2b419ed1/episodes/c/c2716c21-0a9d-4fd8-afb1-fe486f5efb1e/cover.jpg?v=1"/>
      <description>What makes an app, really? Is application security, as we’ve known it, keeping pace with today’s threats? F5 Labs security experts spent a year researching the composition of an app, the increasingly essential role they play in today’s digital world, to better answer these questions. Join threat researchers Sara Boddy and Ray Pompon as they explore these questions and more, sharing their findings from the 2018 Application Protection Report. In this episode, they’ll take a critical look at threats against the Access Tier. This includes one of the most prevalent app client vulnerabilities, cross-site scripting (XSS). They’ll also explore account access hijacking and how you can put the proper security provisions in place to minimize your risk.
</description>
      <content:encoded>
        <![CDATA[<p>What makes an app, really? Is application security, as we’ve known it, keeping pace with today’s threats? F5 Labs security experts spent a year researching the composition of an app, the increasingly essential role they play in today’s digital world, to better answer these questions. Join threat researchers Sara Boddy and Ray Pompon as they explore these questions and more, sharing their findings from the 2018 Application Protection Report. In this episode, they’ll take a critical look at threats against the Access Tier. This includes one of the most prevalent app client vulnerabilities, cross-site scripting (XSS). They’ll also explore account access hijacking and how you can put the proper security provisions in place to minimize your risk.</p>]]>
      </content:encoded>
      <itunes:summary>
        <![CDATA[<p>What makes an app, really? Is application security, as we’ve known it, keeping pace with today’s threats? F5 Labs security experts spent a year researching the composition of an app, the increasingly essential role they play in today’s digital world, to better answer these questions. Join threat researchers Sara Boddy and Ray Pompon as they explore these questions and more, sharing their findings from the 2018 Application Protection Report. In this episode, they’ll take a critical look at threats against the Access Tier. This includes one of the most prevalent app client vulnerabilities, cross-site scripting (XSS). They’ll also explore account access hijacking and how you can put the proper security provisions in place to minimize your risk.</p>]]>
      </itunes:summary>
      <fireside:playerURL>https://fireside.fm/player/v2/vkW0TiKZ+4DJbB2DP</fireside:playerURL>
      <fireside:playerEmbedCode>
        <![CDATA[<iframe src="https://fireside.fm/player/v2/vkW0TiKZ+4DJbB2DP" width="740" height="200" frameborder="0" scrolling="no">]]>
      </fireside:playerEmbedCode>
      <podcast:person email="" href="" role="host">Raymond Pompon</podcast:person>
      <podcast:person email="" href="" role="host">Sara Boddy</podcast:person>
    </item>
    <item>
      <title>Season 1: Episode 2 - Application Protection—Mitigating Risk at the App Services Tier</title>
      <link>https://f5labs.fireside.fm/s1e2</link>
      <guid isPermaLink="false">65205c76-38ab-4a9c-8b31-8580a5f2a898</guid>
      <pubDate>Tue, 15 Oct 2019 14:00:00 -0400</pubDate>
      <author>Swante Bleakley</author>
      <enclosure url="https://aphid.fireside.fm/d/1437767933/79c31137-4330-45ea-be15-e60d2b419ed1/65205c76-38ab-4a9c-8b31-8580a5f2a898.mp3" length="45389501" type="audio/mp3"/>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:author>Swante Bleakley</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:duration>18:54</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <itunes:image href="https://assets.fireside.fm/file/fireside-images-2024/podcasts/images/7/79c31137-4330-45ea-be15-e60d2b419ed1/episodes/6/65205c76-38ab-4a9c-8b31-8580a5f2a898/cover.jpg?v=1"/>
      <description>What makes an app, really? Is application security, as we’ve known it, keeping pace with today’s threats? F5 Labs security experts spent a year researching the composition of an app, the increasingly essential role they play in today’s digital world, to better answer these questions. Join threat researchers Sara Boddy and Ray Pompon as they explore these questions and more, sharing their findings from the 2018 Application Protection Report. In this episode, they’ll take a critical look at threats against the App Services Tier—including injection attacks against app services—and how you can find, patch, and block these vulnerabilities.
</description>
      <content:encoded>
        <![CDATA[<p>What makes an app, really? Is application security, as we’ve known it, keeping pace with today’s threats? F5 Labs security experts spent a year researching the composition of an app, the increasingly essential role they play in today’s digital world, to better answer these questions. Join threat researchers Sara Boddy and Ray Pompon as they explore these questions and more, sharing their findings from the 2018 Application Protection Report. In this episode, they’ll take a critical look at threats against the App Services Tier—including injection attacks against app services—and how you can find, patch, and block these vulnerabilities.</p>]]>
      </content:encoded>
      <itunes:summary>
        <![CDATA[<p>What makes an app, really? Is application security, as we’ve known it, keeping pace with today’s threats? F5 Labs security experts spent a year researching the composition of an app, the increasingly essential role they play in today’s digital world, to better answer these questions. Join threat researchers Sara Boddy and Ray Pompon as they explore these questions and more, sharing their findings from the 2018 Application Protection Report. In this episode, they’ll take a critical look at threats against the App Services Tier—including injection attacks against app services—and how you can find, patch, and block these vulnerabilities.</p>]]>
      </itunes:summary>
      <fireside:playerURL>https://fireside.fm/player/v2/vkW0TiKZ+TDyBQu3W</fireside:playerURL>
      <fireside:playerEmbedCode>
        <![CDATA[<iframe src="https://fireside.fm/player/v2/vkW0TiKZ+TDyBQu3W" width="740" height="200" frameborder="0" scrolling="no">]]>
      </fireside:playerEmbedCode>
      <podcast:person email="" href="" role="host">Raymond Pompon</podcast:person>
      <podcast:person email="" href="" role="host">Sara Boddy</podcast:person>
    </item>
    <item>
      <title>Season 1: Episode 4 - Application Protection—Mitigating DDoS Attacks</title>
      <link>https://f5labs.fireside.fm/s1e4</link>
      <guid isPermaLink="false">7a8f4c2c-690c-4458-9ca9-027d5490a811</guid>
      <pubDate>Tue, 15 Oct 2019 14:00:00 -0400</pubDate>
      <author>Swante Bleakley</author>
      <enclosure url="https://aphid.fireside.fm/d/1437767933/79c31137-4330-45ea-be15-e60d2b419ed1/7a8f4c2c-690c-4458-9ca9-027d5490a811.mp3" length="47369981" type="audio/mp3"/>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:author>Swante Bleakley</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:duration>19:44</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <itunes:image href="https://assets.fireside.fm/file/fireside-images-2024/podcasts/images/7/79c31137-4330-45ea-be15-e60d2b419ed1/episodes/7/7a8f4c2c-690c-4458-9ca9-027d5490a811/cover.jpg?v=1"/>
      <description>What makes an app, really? Is application security, as we’ve known it, keeping pace with today’s threats? F5 Labs security experts spent a year researching the composition of an app, the increasingly essential role they play in today’s digital world, to better answer these questions. Join threat researchers Sara Boddy and Ray Pompon as they explore these questions and more, sharing their findings from the 2018 Application Protection Report. This episode will take a critical look at DDoS attacks which can strike any component of the app—from the network layer to app infrastructure components such as TLS—and how to get a strong DDoS protection strategy in place.
</description>
      <content:encoded>
        <![CDATA[<p>What makes an app, really? Is application security, as we’ve known it, keeping pace with today’s threats? F5 Labs security experts spent a year researching the composition of an app, the increasingly essential role they play in today’s digital world, to better answer these questions. Join threat researchers Sara Boddy and Ray Pompon as they explore these questions and more, sharing their findings from the 2018 Application Protection Report. This episode will take a critical look at DDoS attacks which can strike any component of the app—from the network layer to app infrastructure components such as TLS—and how to get a strong DDoS protection strategy in place.</p>]]>
      </content:encoded>
      <itunes:summary>
        <![CDATA[<p>What makes an app, really? Is application security, as we’ve known it, keeping pace with today’s threats? F5 Labs security experts spent a year researching the composition of an app, the increasingly essential role they play in today’s digital world, to better answer these questions. Join threat researchers Sara Boddy and Ray Pompon as they explore these questions and more, sharing their findings from the 2018 Application Protection Report. This episode will take a critical look at DDoS attacks which can strike any component of the app—from the network layer to app infrastructure components such as TLS—and how to get a strong DDoS protection strategy in place.</p>]]>
      </itunes:summary>
      <fireside:playerURL>https://fireside.fm/player/v2/vkW0TiKZ+G6SRh8Gj</fireside:playerURL>
      <fireside:playerEmbedCode>
        <![CDATA[<iframe src="https://fireside.fm/player/v2/vkW0TiKZ+G6SRh8Gj" width="740" height="200" frameborder="0" scrolling="no">]]>
      </fireside:playerEmbedCode>
      <podcast:person email="" href="" role="host">Raymond Pompon</podcast:person>
      <podcast:person email="" href="" role="host">Sara Boddy</podcast:person>
    </item>
    <item>
      <title>Season 1: Episode1 - Application Protection</title>
      <link>https://f5labs.fireside.fm/s1e1</link>
      <guid isPermaLink="false">40ae12bf-b199-4d9c-bb7a-f11819f65220</guid>
      <pubDate>Tue, 15 Oct 2019 12:00:00 -0400</pubDate>
      <author>Swante Bleakley</author>
      <enclosure url="https://aphid.fireside.fm/d/1437767933/79c31137-4330-45ea-be15-e60d2b419ed1/40ae12bf-b199-4d9c-bb7a-f11819f65220.mp3" length="36479384" type="audio/mp3"/>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:author>Swante Bleakley</itunes:author>
      <itunes:subtitle>Reducing your risk in today’s threat landscape</itunes:subtitle>
      <itunes:duration>15:11</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <itunes:image href="https://assets.fireside.fm/file/fireside-images-2024/podcasts/images/7/79c31137-4330-45ea-be15-e60d2b419ed1/episodes/4/40ae12bf-b199-4d9c-bb7a-f11819f65220/cover.jpg?v=1"/>
      <description>F5 Labs security experts spent a year researching the increasingly essential role of applications with one question in mind: If organizations don’t understand all the ways attackers can compromise their applications and exploit their data, how can they possibly defend their most critical assets? Join threat researchers Sara Boddy and Ray Pompon in this four-part series where they’ll share their findings from the 2018 Application Protection Report —some alarming, and others not so surprising at all—to help you prioritize what you should focus on to reduce your risk.
</description>
      <content:encoded>
        <![CDATA[<p>F5 Labs security experts spent a year researching the increasingly essential role of applications with one question in mind: If organizations don’t understand all the ways attackers can compromise their applications and exploit their data, how can they possibly defend their most critical assets? Join threat researchers Sara Boddy and Ray Pompon in this four-part series where they’ll share their findings from the 2018 Application Protection Report —some alarming, and others not so surprising at all—to help you prioritize what you should focus on to reduce your risk.</p>]]>
      </content:encoded>
      <itunes:summary>
        <![CDATA[<p>F5 Labs security experts spent a year researching the increasingly essential role of applications with one question in mind: If organizations don’t understand all the ways attackers can compromise their applications and exploit their data, how can they possibly defend their most critical assets? Join threat researchers Sara Boddy and Ray Pompon in this four-part series where they’ll share their findings from the 2018 Application Protection Report —some alarming, and others not so surprising at all—to help you prioritize what you should focus on to reduce your risk.</p>]]>
      </itunes:summary>
      <fireside:playerURL>https://fireside.fm/player/v2/vkW0TiKZ+IhVzo9L9</fireside:playerURL>
      <fireside:playerEmbedCode>
        <![CDATA[<iframe src="https://fireside.fm/player/v2/vkW0TiKZ+IhVzo9L9" width="740" height="200" frameborder="0" scrolling="no">]]>
      </fireside:playerEmbedCode>
      <podcast:person email="" href="" role="host">Raymond Pompon</podcast:person>
      <podcast:person email="" href="" role="host">Sara Boddy</podcast:person>
    </item>
    <item>
      <title>Season 2: Episode 2 - Injection, Evolved</title>
      <link>https://f5labs.fireside.fm/s2e2</link>
      <guid isPermaLink="false">e5b5e900-3755-4acc-8c4d-9b48ed6833ca</guid>
      <pubDate>Mon, 14 Oct 2019 17:00:00 -0400</pubDate>
      <author>Swante Bleakley</author>
      <enclosure url="https://aphid.fireside.fm/d/1437767933/79c31137-4330-45ea-be15-e60d2b419ed1/e5b5e900-3755-4acc-8c4d-9b48ed6833ca.mp3" length="48566773" type="audio/mp3"/>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:author>Swante Bleakley</itunes:author>
      <itunes:subtitle>The F5 Application Protection Report podcast returns for 2019! Last year, F5 Labs researchers examined the entire landscape of threats facing applications, and offered guidance on how to protect them. This year, they followed up with another research series that examined how both apps and threats are changing, and what security practitioners can do to stay ahead of these changes. In this podcast, host and Director of F5 Labs, Sara Boddy, will be interviewing the two researchers behind the series, Ray Pompon and Sander Vinberg, to talk about their approach, methods and findings</itunes:subtitle>
      <itunes:duration>20:14</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <itunes:image href="https://assets.fireside.fm/file/fireside-images-2024/podcasts/images/7/79c31137-4330-45ea-be15-e60d2b419ed1/episodes/e/e5b5e900-3755-4acc-8c4d-9b48ed6833ca/cover.jpg?v=1"/>
      <description>The Labs team dives into the subject of injection—one of the most prevalent and successful attack techniques featured in the breach notifications. Injection techniques have been around for a long time, and constituted a major finding in the 2018 report, but they’re evolving to target different vulnerabilities because of the way that web applications are being built. As a result, a new injection technique known as formjacking has surpassed SQL injection as the most common manifestation. Ray and Sander discuss what this means for preventing, detecting, and defending against web application attacks in 2019 and onward, and make some predictions about the future of web app architecture.  
</description>
      <content:encoded>
        <![CDATA[<p>The Labs team dives into the subject of injection—one of the most prevalent and successful attack techniques featured in the breach notifications. Injection techniques have been around for a long time, and constituted a major finding in the 2018 report, but they’re evolving to target different vulnerabilities because of the way that web applications are being built. As a result, a new injection technique known as formjacking has surpassed SQL injection as the most common manifestation. Ray and Sander discuss what this means for preventing, detecting, and defending against web application attacks in 2019 and onward, and make some predictions about the future of web app architecture. </p>]]>
      </content:encoded>
      <itunes:summary>
        <![CDATA[<p>The Labs team dives into the subject of injection—one of the most prevalent and successful attack techniques featured in the breach notifications. Injection techniques have been around for a long time, and constituted a major finding in the 2018 report, but they’re evolving to target different vulnerabilities because of the way that web applications are being built. As a result, a new injection technique known as formjacking has surpassed SQL injection as the most common manifestation. Ray and Sander discuss what this means for preventing, detecting, and defending against web application attacks in 2019 and onward, and make some predictions about the future of web app architecture. </p>]]>
      </itunes:summary>
      <fireside:playerURL>https://fireside.fm/player/v2/vkW0TiKZ+qNBMg1Qp</fireside:playerURL>
      <fireside:playerEmbedCode>
        <![CDATA[<iframe src="https://fireside.fm/player/v2/vkW0TiKZ+qNBMg1Qp" width="740" height="200" frameborder="0" scrolling="no">]]>
      </fireside:playerEmbedCode>
      <podcast:person email="" href="" role="host">Raymond Pompon</podcast:person>
      <podcast:person email="" href="" role="host">Sander Vinberg</podcast:person>
    </item>
    <item>
      <title>Season 2: Episode 1 - Methods, Easy Targets, and Breach Data</title>
      <link>https://f5labs.fireside.fm/s2e1</link>
      <guid isPermaLink="false">175515b7-bf99-488a-84e9-12fb61c7ac26</guid>
      <pubDate>Mon, 14 Oct 2019 16:00:00 -0400</pubDate>
      <author>Swante Bleakley</author>
      <enclosure url="https://aphid.fireside.fm/d/1437767933/79c31137-4330-45ea-be15-e60d2b419ed1/175515b7-bf99-488a-84e9-12fb61c7ac26.mp3" length="51606382" type="audio/mp3"/>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:author>Swante Bleakley</itunes:author>
      <itunes:subtitle>The F5 Application Protection Report podcast returns for 2019! Last year, F5 Labs researchers examined the entire landscape of threats facing applications, and offered guidance on how to protect them. This year, they followed up with another research series that examined how both apps and threats are changing, and what security practitioners can do to stay ahead of these changes. In this podcast, host and Director of F5 Labs, Sara Boddy, will be interviewing the two researchers behind the series, Ray Pompon and Sander Vinberg, to talk about their approach, methods and findings. </itunes:subtitle>
      <itunes:duration>21:30</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <itunes:image href="https://assets.fireside.fm/file/fireside-images-2024/podcasts/images/7/79c31137-4330-45ea-be15-e60d2b419ed1/episodes/1/175515b7-bf99-488a-84e9-12fb61c7ac26/cover.jpg?v=1"/>
      <description>Sara begins by unpacking what’s changed in this year’s research, covering changes in personnel, data sources, and research scope. The team then turns to the first significant finding of the new research series: the discovery of widespread, unsophisticated reconnaissance campaigns targeting PHP. While systems running PHP were a major target last year as well, the proportion of opportunistic traffic looking for old, unprotected PHP vulnerabilities was even higher this year. After that they dive into one of their major data sources, the breach notifications published by individual U.S. states. One of the findings from the breach disclosures was a strong relationship between victims’ industries and the attack methods. Ray, Sara, and Sander look at why that is, and what it means for defenders. 
</description>
      <content:encoded>
        <![CDATA[<p>Sara begins by unpacking what’s changed in this year’s research, covering changes in personnel, data sources, and research scope. The team then turns to the first significant finding of the new research series: the discovery of widespread, unsophisticated reconnaissance campaigns targeting PHP. While systems running PHP were a major target last year as well, the proportion of opportunistic traffic looking for old, unprotected PHP vulnerabilities was even higher this year. After that they dive into one of their major data sources, the breach notifications published by individual U.S. states. One of the findings from the breach disclosures was a strong relationship between victims’ industries and the attack methods. Ray, Sara, and Sander look at why that is, and what it means for defenders.</p>]]>
      </content:encoded>
      <itunes:summary>
        <![CDATA[<p>Sara begins by unpacking what’s changed in this year’s research, covering changes in personnel, data sources, and research scope. The team then turns to the first significant finding of the new research series: the discovery of widespread, unsophisticated reconnaissance campaigns targeting PHP. While systems running PHP were a major target last year as well, the proportion of opportunistic traffic looking for old, unprotected PHP vulnerabilities was even higher this year. After that they dive into one of their major data sources, the breach notifications published by individual U.S. states. One of the findings from the breach disclosures was a strong relationship between victims’ industries and the attack methods. Ray, Sara, and Sander look at why that is, and what it means for defenders.</p>]]>
      </itunes:summary>
      <fireside:playerURL>https://fireside.fm/player/v2/vkW0TiKZ+pBT87qgr</fireside:playerURL>
      <fireside:playerEmbedCode>
        <![CDATA[<iframe src="https://fireside.fm/player/v2/vkW0TiKZ+pBT87qgr" width="740" height="200" frameborder="0" scrolling="no">]]>
      </fireside:playerEmbedCode>
      <podcast:person email="" href="" role="host">Raymond Pompon</podcast:person>
      <podcast:person email="" href="" role="host">Sander Vinberg</podcast:person>
    </item>
  </channel>
</rss>
