You've Already Been Hacked

Your F5 is in the Crosshairs


Listen Later

**Title:**

🚨 “Your F5 is in the Crosshairs – Why Your Network Might Already Be Hacked”


---


### **Hosts**

- **Professor CyberRisk**


### **Live Cyber Maps**

- **Bitdefender Threat Map** – https://threatmap.bitdefender.com/

- **Checkpoint Live Cyber Threat Map** – https://threatmap.checkpoint.com/

- **Kaspersky Cyber Threat Map** – https://cybermap.kaspersky.com/

- **Talos Intelligence – EBC Spam Map** – https://talosintelligence.com/ebc_spam


---


## Episode Information


**Title:** *Your F5 is in the Crosshairs – Why Your Network Might Already Be Hacked*

**Episode Number:** 3x28


### Overview

In this episode we unpack a nation‑state supply‑chain attack that exposed the source code of F5’s BIG‑IP platform, explore the weaponization of public infrastructure at Canadian and U.S. airports, and dive into the new AI security best‑practices IBM presented at TechXchange 2025. We also cover alarming firmware flaws in popular motherboards and Meta’s new partnership with Arm for energy‑efficient AI GPUs.


### Guest Information

- **Professor CyberRisk** – Security strategist and researcher.

- **Cyber Cowboy** – Field operations expert in incident response.


### Topics Covered

1. Nation‑state breach of F5 BIG‑IP source code

2. IoT exploitation in airport public‑announcement systems

3. Secure AI pipelines: IBM’s takeaways from TechXchange 2025

4. Firmware vulnerabilities in mainstream motherboards

5. Meta + Arm partnership and the security implications of next‑gen AI GPUs

6. Practical steps: patching, zero‑trust, and incident‑response readiness


---


## Top Stories


### 1. Nation‑State Threat Cracks F5’s BIG‑IP Source Code

- **Summary:** F5 disclosed that a sophisticated nation‑state actor accessed its internal systems, exfiltrated portions of BIG‑IP source code, and is now forcing emergency patches for all customers.

- **Why it Matters:** The BIG‑IP platform sits in millions of data‑center, cloud, and edge deployments, meaning a single code compromise threatens countless enterprises, government agencies, and critical infrastructure.

- **What to Do:** Verify inventory, apply patches, enforce MFA, isolate admin access, audit supply chain, and update incident‑response playbooks.

- **Link:** [SiliconANGLE – F5 says nation‑state actor breached internal systems, stole BIG‑IP development files](https://siliconangle.com/2025/10/15/f5-says-nation-state-actor-breached-internal-systems-stole-big-ip-development-files/)


---


## Additional Cybersecurity News


| Title | URL |

|-------|-----|

| **Airport Hijack: Pro‑Hamas Messages Blare Across Canadian & US Terminals** | https://www.israelnationalnews.com/news/416318 |

| **IBM’s TechXchange 2025: AI Revolution & Security Takeaways** | https://siliconangle.com/2025/10/15/ibm-techxchange-2025-navigating-ai-revolution/ |

| **Firmware Flaws: Motherboard Manufacturers Show Little Security Care** | https://www.xda-developers.com/firmware-security-failures-show-motherboard-manufacturers-dont-care/ |

| **Meta Partners with Arm for Energy‑Efficient AI GPUs** | https://siliconangle.com/2025/10/15/meta-platforms-use-arms-energy-efficient-neoverse-gpus-ai-workloads/ |


---


## Resources & Links

_None this episode_


---


## Call to Action

- **Subscribe**: Stay updated on the latest cyber threats.

- **Leave a Review**: Let us know what you think.

- **Join the Conversation**: Follow our community and ask questions.


---


## Sponsor (if applicable)

_No sponsors this episode_


---


## Podcast Socials & Website

- **Website:** https://www.youvealreadybeenhacked.com

- **X:** @professorcyberrisk

- **YouTube:** https://www.youtube.com/@YABHPodcast

- **Discord / Community Forum:** https://discord.gg/cz3xdsrqAE *(copyable raw link)*

...more
View all episodesView all episodes
Download on the App Store

You've Already Been HackedBy Professor CyberRisk

  • 5
  • 5
  • 5
  • 5
  • 5

5

4 ratings