Full extent of attacks unknown but telecoms thought to be especially exposed

Vulnerabilities in F5’s BIG-IP suite are already being exploited after proof of concept (PoC) code began circulating online.…