Skip To Content
  • Company

    Company

    • About Praetorian

      • About Us
      • Leadership Team
      • Board of Directors
      • Advisory Board
    • Latest News

      • In the News
      • Press Releases
      • Blog
      • CISO Corner
      • Media Library
  • Careers

    Careers

      • Work at Praetorian
      • Current Openings
      • Tech Challenges
      • Survival Kit
  • Services

    Services

    What We Do

    We emulate attackers to locate the critical exposures that hackers, ransomware, cybercriminals, and nation states will leverage to compromise your organization.

    Learn More
    • Penetration Testing

      • Application Penetration Testing
      • Automotive Penetration Testing
      • Cloud Penetration Testing
      • IoT Penetration Testing
      • Network Penetration Testing
    • Advanced Offensive Security

      • Red Team Exercise
      • Purple Team
      • Attack Path Mapping
      • CI/CD Attack Chains
      • LLM Attack Chains
      • Assumed Breach Exercise
      • NIST CSF Benchmark
    • Continuous Offensive Security

      • Attack Surface Management
      • Breach & Attack Simulation
      • Continuous Red Teaming
      • Penetration Testing as a Service
  • Platform
  • Use Cases

    Use Cases

    Use Cases

    Every organization has digital assets to protect. Which of these scenarios sounds like you?

      • Vendor Risk Management
      • M&A Due Diligence
      • Ransomware Prevention
      • Tool and Vendor Consolidation
      • Bug Bounty Reduction
      • FDA Cybersecurity Requirements
      • Rogue IT Breach
  • Customers

    Customers

    Customers

    We are fanatical about delivering security solutions and fixated on customer success.

    • Our Customers

      Put the customer first and everything else will work out. Our lifetime NPS of 02 reflects this core value commitment to our customers.

      • Customer Profiles
      • Video Testimonials
      • NPS Satisfaction
      • Customer Quotes
    • Featured Case Studies

      Several customers have jumped on camera to share their Praetorian experience. Check out their success stories.

      • 21st Century Fox
      • Nielsen
      • Samsung
      • Twitter
    • Case Studies Continued

      Our customers love getting on camera for us!

      • Open Table
      • Priceline
      • Booking Holdings
  • Resources

    Resources

    Resources

    We build innovative, sustainable solutions that solve real-world problems for our customers and ourselves.

    • Solution Datasheets

      Learn about our offerings, their methodologies, and the outcomes you can expect.

      • Explore Datasheets
    • Whitepapers

      Our whitepapers blend data and thought leadership across a range of security matters, to help you understand an issue, solve a problem, or make a decision.

      • Read the Whitepapers
    • Blog

      Keep up-to-date on cybersecurity industry trends and the latest tools & techniques from the world’s foremost cybersecurity experts.

      • Blog
    • Github

      Praetorian is committed to opensourcing as much of our research as possible.

      • Explore Development Projects
  • Contact
October 30, 2023 Help Net Security

F5 fixes critical BIG-IP vulnerability, PoC is public

Subscribe To Our Blog

Share
  • LinkedIn
  • Twitter
  • Facebook

For more information:

Nathan Sportsman

media@praetorian.com

About PraetorianPraetorian is a cybersecurity company whose mission is to make the digital world safer and more secure.

Through expertise and engineering, Praetorian helps today’s leading organizations solve complex cybersecurity problems across critical enterprise assets and product portfolios. At Praetorian, we are bringing together the world’s security expertise to solve the cybersecurity problem and secure the next-wave innovation.

Who We Are
  • LinkedIn
  • Twitter
  • Facebook
  • Github
  • Youtube
Praetorian
  • Services
    • Web & Mobile Application Penetration Testing
    • Cloud Penetration Testing
    • IoT Penetration Testing
    • Network Penetration Testing
    • Red Team Exercise
    • Purple Team
    • Attack Path Mapping
    • CI/CD Attack Chains
    • LLM Attack Chains
    • Assumed Breach Exercise
    • NIST CSF Benchmark
    • Attack Surface Management
    • Breach & Attack Simulation
    • Continuous Red Teaming
    • Penetration Testing as a Service (PTaaS)
  • Use Cases
    • Vendor Risk Management
    • M&A Due Diligence
    • Ransomware Prevention
    • Bug Bounty Cost Reduction
    • FDA Pre- and Post-Market Requirements
    • Rogue IT Identification
  • Schedule a Demo
  • Company
    • Overview
    • Who We Are
    • News & Press
    • Careers
    • Contact
      • Labs
        • The Praetorian Blog
        • Whitepapers
        • Challenges
        • GitHub

© 2023 All Rights Reserved.

  • Privacy Policy
  • Responsible Disclosure Policy

We don't support Internet Explorer

Please use Chrome, Safari, Firefox, or Edge to view this site.