The Akamai Blog
Akamai?s Environmental Management System Meets the ISO 14001 Standard
3 months 2 weeks ago
Katie Robinson
Akamai?s Perspective on August?s Patch Tuesday 2024
3 months 2 weeks ago
Akamai Security Intelligence Group
The Noname Security 3.34 Update Includes Major Enhancements
3 months 2 weeks ago
Stas Neyman
Akamai Guardicore Platform: Microsegmentation Just Got a Whole Lot Better
3 months 3 weeks ago
Akamai introduces new microsegmentation features to the Akamai Guardicore Platform to help organizations further refine their security posture.
Maya Luisan
Taking Steps to Prepare for Quantum Advantage
3 months 3 weeks ago
Rich Salz & Jan Schaumann
Git-Syncing into Trouble: Exploring Command Injection Flaws in Kubernetes
3 months 3 weeks ago
Tomer Peled
Improving Apache httpd Protections Proactively with Orange Tsai of DEVCORE
3 months 3 weeks ago
Ryan Barnett & Sam Tinklenberg
Living off the VPN ? Exploring VPN Post-Exploitation Techniques
3 months 4 weeks ago
Ori David
Akamai Blocked 419 TB of Malicious Traffic in a 24-Hour DDoS Attack
3 months 4 weeks ago
Sven Dummer
What Is an Event-Driven Microservices Architecture?
3 months 4 weeks ago
Pavel Despot
It?s a New World: APIs Protected by the Power of N
3 months 4 weeks ago
The world of APIs is changing fast ? as is what it takes to secure them. Our new Power of N campaign explains why.
Stacey Sweeney
PLEASE_READ_ME: The Opportunistic Ransomware Devastating MySQL Servers
4 months ago
Guardicore Labs uncovers a Ransomware detection campaign targeting MySQL servers. Attackers use Double Extortion and publish data to pressure victims.
Ophir Harpaz
The Nansh0u Campaign ? Hackers Arsenal Grows Stronger
4 months ago
In the beginning of April, three attacks detected in the Guardicore Global Sensor Network (GGSN) caught our attention. All three had source IP addresses originating in South-Africa and hosted by VolumeDrive ISP (see IoCs).
Ophir Harpaz & Daniel Goldberg
The Oracle of Delphi Will Steal Your Credentials
4 months ago
Our deception technology is able to reroute attackers into honeypots, where they believe that they found their real target. The attacks brute forced passwords for RDP credentials to connect to the victim download and execute a previously undetected malware, which we named Trojan.sysscan.
Daniel Goldberg
Threats Making WAVs - Incident Response to a Cryptomining Attack
4 months ago
Guardicore security researchers describe and uncover a full analysis of a cryptomining attack, which hid a cryptominer inside WAV files. The report includes the full attack vectors, from detection, infection, network propagation and malware analysis and recommendations for optimizing incident response processes in data centers.
Guardicore Labs Team
Keep Your Tech Flame Alive: Trailblazer Rachel Bayley
4 months ago
In this Akamai FLAME Trailblazer blog post, Rachel Bayley encourages women to step into the unknown and to be their authentic selves.
Akamai FLAME Team
Akamai?s Strategic and Transparent Implementation of AI
4 months ago
Berk Veral
Take Cover: Securing Games Truly Is a Battle Royale
4 months ago
Tricia Howard
Why (and How) APIs and Web Applications Are Under Siege
4 months ago
Read a summary of the latest SOTI report, which tackles the security risks in web applications and APIs, and the infrastructure that powers them
Mitch Mayne
Checked
5 hours 34 minutes ago
Visit the Akamai Blog to learn more about what's going on in cybersecurity. Learn about our products and how we provide solutions to our customers.
The Akamai Blog feed