Compromised F5 BIG-IP appliances abused in three-year infiltration A state-sponsored attacker used compromised F5 load balancers to gain persistence on a target's network. 2 minutes