Technology ❯ Cybersecurity ❯ Cyber Attacks ❯ State-Sponsored Attacks
The breach exposed BIG-IP source code along with undisclosed vulnerability research from F5's development systems.