0:00
How fierce is the threat coming from
0:03
state related activists and hackers?
0:06
It's actually incredibly fierce and it's
0:08
because there's a very strong motivation
0:10
to do these kinds of attacks. And what
0:12
you'll see is that this particular group
0:15
uh who is you know part of we think silk
0:18
typhoon or maybe a separate group. We've
0:20
been seeing this type of activity
0:21
classified under something called
0:22
brickstorm. And it sounds terrifying
0:24
because it is terrifying. And that's why
0:26
the cyber security agency in the United
0:29
States put out an emergency directive
0:31
just this Wednesday because 48 out of
0:35
the you know fortune 50 are using F5. A
0:38
vast number of the federal government
0:40
are using FI. We suspect that there's
0:42
thousands of devices being deployed. And
0:45
you know really because the source code
0:48
is now out there and in the hands of the
0:50
Chinese that means that a nation state
0:53
attacker is now looking for
0:55
vulnerabilities in this source code and
0:58
has information they never should have
1:00
had about undisclosed vulnerabilities
1:02
that F5 was already investigating. And
1:05
because the attacker was there for more
1:09
studying F5, it's actually quite
1:11
terrifying all the capability they could