The Akamai Blog
Git-Syncing into Trouble: Exploring Command Injection Flaws in Kubernetes
1 year 3 months ago
Tomer Peled
Git-Syncing into Trouble: Exploring Command Injection Flaws in Kubernetes
1 year 3 months ago
Tomer Peled
Gaining Control Over Sky-High Cloud Costs: Our Journey So Far
1 year 3 months ago
Ari Weil
Improving Apache httpd Protections Proactively with Orange Tsai of DEVCORE
1 year 3 months ago
Ryan Barnett & Sam Tinklenberg
Improving Apache httpd Protections Proactively with Orange Tsai of DEVCORE
1 year 3 months ago
Ryan Barnett & Sam Tinklenberg
Cloning Content to Linode Object Storage with RClone
1 year 3 months ago
Stuart Macleod
Living off the VPN — Exploring VPN Post-Exploitation Techniques
1 year 4 months ago
Ori David
Living off the VPN ? Exploring VPN Post-Exploitation Techniques
1 year 4 months ago
Ori David
Akamai Blocked 419 TB of Malicious Traffic in a 24-Hour DDoS Attack
1 year 4 months ago
Sven Dummer
What Is an Event-Driven Microservices Architecture?
1 year 4 months ago
Pavel Despot
It’s a New World: APIs Protected by the Power of N
1 year 4 months ago
The world of APIs is changing fast — as is what it takes to secure them. Our new Power of N campaign explains why.
Stacey Sweeney
PLEASE_READ_ME: The Opportunistic Ransomware Devastating MySQL Servers
1 year 4 months ago
Guardicore Labs uncovers a Ransomware detection campaign targeting MySQL servers. Attackers use Double Extortion and publish data to pressure victims.
Ophir Harpaz
The Nansh0u Campaign – Hackers Arsenal Grows Stronger
1 year 4 months ago
In the beginning of April, three attacks detected in the Guardicore Global Sensor Network (GGSN) caught our attention. All three had source IP addresses originating in South-Africa and hosted by VolumeDrive ISP (see IoCs).
Ophir Harpaz & Daniel Goldberg
The Oracle of Delphi Will Steal Your Credentials
1 year 4 months ago
Our deception technology is able to reroute attackers into honeypots, where they believe that they found their real target. The attacks brute forced passwords for RDP credentials to connect to the victim download and execute a previously undetected malware, which we named Trojan.sysscan.
Daniel Goldberg
Threats Making WAVs - Incident Response to a Cryptomining Attack
1 year 4 months ago
Guardicore security researchers describe and uncover a full analysis of a cryptomining attack, which hid a cryptominer inside WAV files. The report includes the full attack vectors, from detection, infection, network propagation and malware analysis and recommendations for optimizing incident response processes in data centers.
Guardicore Labs Team
Keep Your Tech Flame Alive: Trailblazer Rachel Bayley
1 year 4 months ago
In this Akamai FLAME Trailblazer blog post, Rachel Bayley encourages women to step into the unknown and to be their authentic selves.
Akamai FLAME Team
Akamai’s Strategic and Transparent Implementation of AI
1 year 4 months ago
Berk Veral
Take Cover: Securing Games Truly Is a Battle Royale
1 year 4 months ago
Tricia Howard
Take Cover: Securing Games Truly Is a Battle Royale
1 year 4 months ago
Tricia Howard
Checked
7 hours 36 minutes ago
Visit the Akamai Blog to learn more about what's going on in cybersecurity. Learn about our products and how we provide solutions to our customers.
The Akamai Blog feed