The Akamai Blog
The WireX Botnet: An Example of Cross-Organizational Cooperation
7 years 5 months ago
On August 17th, 2017, multiple Content Delivery Networks (CDNs) and content providers were subject to significant attacks from a botnet dubbed WireX. The botnet is named for an anagram for one of the delimiter strings in its command and control protocol. The WireX botnet comprises primarily Android devices running malicious applications and is designed to create DDoS traffic. The botnet is sometimes associated with ransom notes to targets.
Akamai InfoSec
How to Build Virtual Python Environment
7 years 8 months ago
In the DevOps world, getting a consistent development environment is crucial. In this post, I'll show you how to set up a virtual Python environment and install the correct libraries to achieve a consistent development environment.
Akshay Ranganath
The Bondnet Army: Questions & Answers
7 years 9 months ago
The following is a select list of questions and answers that we hope will shed more light on the botnet.
Ravit Greitser
What You Need to Know About Caching Video Series
7 years 10 months ago
In this "unofficial" video series, Akamai Solutions Engineers Tedd Smith and CJ Arnesen explain the basics of caching: what it is, why it's important, and how to get the most out of it. A great introduction to Akamai, caching, and content delivery network (CDN) basics, this series supplements Akamai Quick Starts and User Guides to help you level set new team members and other departments within your organization.
Mario Korf
SambaCry, the Seven Year Old Samba Vulnerability, is the Next Big Threat (for now)
7 years 10 months ago
As Samba is used as part of many organizations storage systems, we will discuss the impact of the vulnerability on organizations and home users.
Daniel Goldberg
0.2 BTC Strikes Back, Now Attacking MySQL Databases
7 years 11 months ago
In this post we will describe how GGSN detected a wide ransomware attack targeting MySQL databases and provide recommendations on how to protect your database.
Ofri Ziv
17 Essential Skills for Performance Engineers
8 years 1 month ago
Most people in the performance engineering field agree that our skillset is derived from an intersection of disciplines that include testing, optimization, and systems engineering.
Eric Proegler
Convenient Mobile Commerce is the Key to Success this Holiday Season
8 years 2 months ago
With the Black Friday, Cyber Monday holiday weekend upon us, retailers in the U.S. and abroad are preparing for another peak period for customer acquisition and commerce revenues. In 2016, the U.S. eCommerce market is the second largest globally and...
Ari Weil
Yes, My Name is ||
8 years 3 months ago
Different cultures and nationalities have different naming conventions; I came from a one that led me to face the universe with a personal name "Or". I fact, my name has different meanings in different languages. In English the meaning of "Or" is function word that indicate alternatives and in computer coding languages the name "Or" is being used as Boolean operator that enable us to write conditions in our code.
Or Katz
Planning for the End of 2016: A Leap Second and the End-of-Support for SHA-1 TLS Certificates
8 years 3 months ago
A leap second and the final end of browser support for SHA-1 TLS certificates will happen and can potentially break software systems and applications.
Erik Nygren
The PhotoMiner Campaign
8 years 8 months ago
In this report we will share our research on the PhotoMiner?s timelines, infection strategies, C&C servers and provide tools to help detect the malware.
Daniel Goldberg
How to Report Your Performance Test Results Like a Pro
8 years 10 months ago
Performance tests try to reduce the risks of downtime or outages on multi-user systems by conducting experiments that use load to reveal limitations and errors in the system. Testing usually involves assessing the performance and capacity of systems that were expensive and time-consuming to build.
Eric Proegler
Revealing Guardicore Reveal?
8 years 11 months ago
Lior Neudorfer
Redirecting On the Edge
9 years ago
On the web, every second counts. Service engineers and operations teams are looking for ways to save milliseconds from web pages' load times. One of the simpler ways to squeeze better performance from web pages already using a Content Delivery Network (CDN) is to move the redirection responses from origin to the edge.
Danny Stern
Data Center Ransomware
9 years 7 months ago
Misha Yaverbaum
Launching Forward with IPv6
12 years 8 months ago
With the era of freely available IPv4 addresses nearing its end, I'm pleased to see that 2012 appears to be the year when the IPv6 Internet will finally reach maturity and launch into wide-scale commercial use. For over a decade, the groundwork for the migration to version 6 of the Internet Protocol (IPv6) has been built, with changes to operating systems, client and server software, routers, and Internet backbone networks. To-date, however, the availability of IPv6 content and end-users has remained slim with few Web sites being available over IPv6 and with just over 0.5% of global Internet users having IPv6 connectivity that their machines will elect to use.
Erik Nygren
Checked
1 hour 26 minutes ago
Visit the Akamai Blog to learn more about what's going on in cybersecurity. Learn about our products and how we provide solutions to our customers.
The Akamai Blog feed