The Akamai Blog
CVE-2020-15915 -- Quest for KACE blind SQLi
4 years ago
At Akamai, the Enterprise Security Red Team (ESRT) continuously strives to evaluate the security of both our external and internal services.
Samuel Erb
Akamai Focused on What's Next Following New Traffic Milestone
4 years ago
Akamai hit a new milestone last week when web traffic delivered across our edge network peaked at 200 terabits per second (Tbps).
Adam Karon
Authentication: Lessons Learned From Microsoft Exchange And F5 Big-IP Hacks
4 years ago
The past month has been a very dynamic time in the world of security for hackers and threat researchers, but it has been an extended nightmare for CSOs responsible for securing their enterprise networks.
Charlie Gero
The Akamai Foundation: Our Chance to Give Back
4 years ago
The Akamai Foundation was set up in 2018 to improve the impact and focus of our long-term philanthropic activities.
Kim Salem-Jackson
Threat Advisory - DCCP for (D)DoS
4 years ago
Recent attacks against Akamai customers have leveraged a networking protocol known as protocol 33, or Datagram Congestion Control Protocol (DCCP).
Chad Seaman
4 Techniques for Early Ransomware Detection
4 years ago
If you receive a ransom note, it?s already too late. Detect and stop ransomware attacks early in the kill chain with these 4 techniques.
Avishag Daniely
The Edge is Becoming More Critical in a World of 5G and IoT
4 years ago
The edge is becoming more critical in a world of 5G and IoT. I've seen the evolution from 1x to 3G to 4G and now 5G over the many years I've worked in the mobile space, and 5G and IoT will drive the biggest changes we have seen on the edge in 10 or 20 years.
Jonathan Morgan
Akamai Launch Cohort 2 of Accelerator Program For Early-Stage Innovations in Water
4 years ago
Akamai Technologies India Pvt. Ltd. has chosen the grantees for Cohort 2 of Accelerator Program for Early-Stage Innovations in Water.
Neha Jain
Finding the Cracks in the Wall - How Modern Scams Bypass MFA
4 years 1 month ago
In my previous blog, I discussed the important role multi-factor authentication (MFA) plays in further securing access to enterprise and consumer services. We also established the fact that although MFA increases authentication security and decreases the risk of account takeover, MFA can, and is, being bypassed in the wild.
Or Katz
Another Golang Crypto Miner On the Loose
4 years 1 month ago
There are many crypto mining malware variants infecting systems on the internet. On Friday, March 4, 2021, I noticed an interesting hit in my honeypot logs. The binary it captured stood out, as it was rather large at 4MB. I immediately thought it would be a crypto miner written in the Go language. I was correct. This one however, has some newer exploits it's using for proliferation.
Larry Cashdollar
Finding the Cracks in the Wall - The Hazard of Single Authentication Factor
4 years 1 month ago
The use of authentication factors, one of the most fundamental and well understood concepts in information security, enables secure access to applications, services, and networks. It can affect an enterprise's security posture, however, as the drastic increase in data breaches and system attacks are largely based on compromised authentication.
Or Katz
Phish-Proof Multi-Factor Authentication with Akamai MFA
4 years 1 month ago
Today, Akamai announced Akamai MFA, a phish-proof multi-factor authentication (MFA) service for the workforce that delivers all of the security benefits of FIDO2 with the frictionless end-user experience of a mobile push on a smartphone. Why has Akamai introduced this new service?
Jim Black
How Akamai Can Help You Fight the Latest Exploitation Attempts Against Microsoft Exchange
4 years 1 month ago
On March 2, 2021, the Microsoft Security Response Center alerted its customers to several?critical security?updates to Microsoft Exchange Server, addressing vulnerabilities currently?under attack.
Amol Mathur
Microsoft Exchange and Verkada Hacks: Isolate Your Apps and APIs from the Internet Cesspool
4 years 1 month ago
It's been an interesting start to March in terms of public security incidents. This month kicked off with multiple zero-day exploits being used to attack on-premises versions of Microsoft Exchange Server. And, as if that wasn't enough, that attack was quickly followed by the news that a hacktivist
Lorenz Jakober
Akamai Offers Free Tier for Client-Side Edge Security
4 years 1 month ago
In March 2020, Akamai saw a dramatic 30% rise in internet traffic -- equivalent to an entire year of growth. Post-pandemic, we believe there will be a return to normal internet traffic growth, but many things will never be the same.
Mike Kane
Act Against Geopiracy with Enhanced Proxy Detection
4 years 1 month ago
According to the description, the service is a virtual private network (VPN) desktop application and proxy browser extension that helps viewers mask their physical location, circumvent censorship, and restore access to blocked content.
Sandeep Singh
Now Launching - SOTI: Research
4 years 1 month ago
Amanda Goedde
EdgeKV: Serverless Storage at the Edge
4 years 1 month ago
We are pleased to announce the launch of EdgeKV, our distributed key-value store, into beta! EdgeKV is enabling technology for EdgeWorkers, our serverless computing platform that enables developers to create services using JavaScript and deploy them across our platform. When writing JavaScript, data persistence is often necessary to save data from a user interaction, or to retrieve contextual data to evaluate inside a function.
Jeffrey Costa
Sensor Architecture Can Help Keep Us Up and Running: Part 2
4 years 1 month ago
Previously, I introduced the field of sensor systems architecture and posed a real world example scenario of the unnecessary resource costs and hazards that can happen when the deployment of sensors isn't carefully thought out.
Kristin Nelson-Patel
Checked
55 minutes 2 seconds ago
Visit the Akamai Blog to learn more about what's going on in cybersecurity. Learn about our products and how we provide solutions to our customers.
The Akamai Blog feed