Home SecurityNetwork Security Researchers show techniques for malware persistence on F5 and Citrix load balancers