The Akamai Blog
Beware the Unpatchable: Corona Mirai Botnet Spreads via Zero-Day
7 months 2 weeks ago
Kyle Lefton, Larry Cashdollar & Aline Eliovich
How Securing APIs Factors into DORA Compliance
7 months 3 weeks ago
John Natale
Embed API Security into Regulatory Compliance: Six Examples to Watch
7 months 3 weeks ago
Read about how to meet API-related requirements in six key regulations and frameworks to better protect your organization.
John Natale
Edge Computing and 5G: Emerging Technology Shaping the Future of IT
7 months 3 weeks ago
Learn how and why enterprise businesses are using edge computing and 5G to deliver better digital experiences for their customers.
Santiago Giraldo
How We Transformed Akamai from a CDN to a Cloud and Security Company
7 months 3 weeks ago
Tom Leighton
Akamai?s Environmental Management System Meets the ISO 14001 Standard
7 months 3 weeks ago
Katie Robinson
Akamai?s Perspective on August?s Patch Tuesday 2024
7 months 4 weeks ago
Akamai Security Intelligence Group
The Noname Security 3.34 Update Includes Major Enhancements
7 months 4 weeks ago
Stas Neyman
Akamai Guardicore Platform: Microsegmentation Just Got a Whole Lot Better
7 months 4 weeks ago
Akamai introduces new microsegmentation features to the Akamai Guardicore Platform to help organizations further refine their security posture.
Maya Luisan
Taking Steps to Prepare for Quantum Advantage
8 months ago
Rich Salz & Jan Schaumann
Git-Syncing into Trouble: Exploring Command Injection Flaws in Kubernetes
8 months ago
Tomer Peled
Improving Apache httpd Protections Proactively with Orange Tsai of DEVCORE
8 months ago
Ryan Barnett & Sam Tinklenberg
Living off the VPN ? Exploring VPN Post-Exploitation Techniques
8 months ago
Ori David
Akamai Blocked 419 TB of Malicious Traffic in a 24-Hour DDoS Attack
8 months ago
Sven Dummer
What Is an Event-Driven Microservices Architecture?
8 months 1 week ago
Pavel Despot
It?s a New World: APIs Protected by the Power of N
8 months 1 week ago
The world of APIs is changing fast ? as is what it takes to secure them. Our new Power of N campaign explains why.
Stacey Sweeney
PLEASE_READ_ME: The Opportunistic Ransomware Devastating MySQL Servers
8 months 1 week ago
Guardicore Labs uncovers a Ransomware detection campaign targeting MySQL servers. Attackers use Double Extortion and publish data to pressure victims.
Ophir Harpaz
The Nansh0u Campaign ? Hackers Arsenal Grows Stronger
8 months 1 week ago
In the beginning of April, three attacks detected in the Guardicore Global Sensor Network (GGSN) caught our attention. All three had source IP addresses originating in South-Africa and hosted by VolumeDrive ISP (see IoCs).
Ophir Harpaz & Daniel Goldberg
The Oracle of Delphi Will Steal Your Credentials
8 months 1 week ago
Our deception technology is able to reroute attackers into honeypots, where they believe that they found their real target. The attacks brute forced passwords for RDP credentials to connect to the victim download and execute a previously undetected malware, which we named Trojan.sysscan.
Daniel Goldberg
Checked
1 hour 18 minutes ago
Visit the Akamai Blog to learn more about what's going on in cybersecurity. Learn about our products and how we provide solutions to our customers.
The Akamai Blog feed