Critical vulnerability in F5 BIG-IP under active exploitation
Full extent of attacks unknown but telecoms thought to be especially exposed
Vulnerabilities in F5's BIG-IP suite are already being exploited after proof of concept (PoC) code began circulating online.…