November 20, 2025
Time: 1:00 pm ET | 10:00 am PT
Speakers: Paul Asadoorian, Principal Security Researcher, Wes Dobry, Vice President of Solution Engineering and Chase Snyder, Director of Product Marketing
F5's source code leak underscored a critical reality: thousands of organizations run vulnerable edge devices that attackers are actively exploiting. Combined with Cisco ASA compromises, the RedNovember campaign, and recent CISA emergency directives, network infrastructure has become the most active battleground in cybersecurity.
These attacks succeed because most organizations can't see what's happening on their routers, VPNs, and firewalls. Attackers exploit this blindness to maintain hidden access for months, enabling data theft and ransomware deployment.
This webinar delivers immediate, actionable defense strategies:
- Which devices and firmware versions are being targeted right now
- The specific monitoring gaps attackers exploit to stay hidden
- Detection rules and log sources you can implement today
- A prioritized checklist to find and stop active compromises

