The Akamai Blog
Negative Exposure: Edimax Network Cameras Used to Spread Mirai
6 months 2 weeks ago
Mirai continues to plague organizations. Read how the Akamai SIRT identified a new command injection vulnerability that’s targeting Edimax devices.
Kyle Lefton & Larry Cashdollar
Detecting and Mitigating the Apache Camel Vulnerabilities
6 months 3 weeks ago
Akamai researchers have created detection scripts and additional details for the Apache Camel vulnerabilities CVE-2025-27636 and CVE-2025-29891.
Akamai Security Intelligence Group
From Good to Great: Mastering Day-2 Network Security Policy
6 months 3 weeks ago
Zohar Furman
Behind the Scenes: Introducing the Akamai Design System
6 months 3 weeks ago
We recently made some design changes to our UI to improve the user experience. Lead Senior Software Engineer Jaalah Ramos expands on the “why” in this Q&A.
Maddie Presland
Magecart: How Akamai Protected a Global Retailer Against a Live Attack
6 months 3 weeks ago
Gal Meiri
Scale Transcoding and AI Workloads with GPU Kubernetes Clusters
6 months 3 weeks ago
Hana Jeddy
Mastering Kubernetes: From Troubleshooting to Simplicity
6 months 4 weeks ago
Billy Thompson
Why Are Airlines a Prime Target for Cyberattacks?
6 months 4 weeks ago
Jim Black & Eric Rubenov
Lightning-Fast Requests with Early Data
7 months ago
Robin Marx & Rafal Myszka
Strengthening Our Emissions Accounting Process
7 months ago
Margot Hines
PCI DSS v4.0.1: The Changes You Need to Know to Qualify for SAQ A
7 months ago
What's changed in PCI DSS v4.0.1? Get a breakdown of what these new requirements mean and how Akamai’s solutions can help.
Mark Carrizosa , Boris Kirzner & Emily Lyons
Zero Trust Network Access Without the Performance Penalty
7 months ago
Jim Black
DevOpsDays 2025
7 months ago
Billy Thompson
Abusing VBS Enclaves to Create Evasive Malware
7 months ago
Ori David
Abusing VBS Enclaves to Create Evasive Malware
7 months ago
Ori David
Accelerate Your Business Success with Akamai Enhanced Partner Portal
7 months 1 week ago
Marcello Scippa
Deepseek: Why it Matters and What the Press Got Wrong
7 months 1 week ago
Robert Blumofe
How to Recognize AI Attacks and Strategies for Securing Your AI Applications
7 months 1 week ago
Ziv Eli & Gal Meiri
Protect Your Critical Assets with Akamai Guardicore DNS Firewall
7 months 1 week ago
Enhance your network security and protect servers, workloads, and IoT devices with Akamai Guardicore DNS Firewall.
Jim Black
Checked
6 hours 34 minutes ago
Visit the Akamai Blog to learn more about what's going on in cybersecurity. Learn about our products and how we provide solutions to our customers.
The Akamai Blog feed